privacy tools and techniques for developers
play

Privacy Tools and Techniques for Developers -Amber Welch - PowerPoint PPT Presentation

Privacy Tools and Techniques for Developers -Amber Welch bit.ly/2x1UXWX Amber Welch MA, CISSP, CISA, CIPP/E, CIPM, FIP, CCSK, and ISO 27001 Lead Auditor linkedin.com/in/amberwelch1 github.com/msamberwelch @MsAmberWelch bit.ly/2WRAGh8


  1. Privacy Tools and Techniques for Developers -Amber Welch bit.ly/2x1UXWX

  2. Amber Welch MA, CISSP, CISA, CIPP/E, CIPM, FIP, CCSK, and ISO 27001 Lead Auditor linkedin.com/in/amberwelch1 github.com/msamberwelch @MsAmberWelch bit.ly/2WRAGh8

  3. ● Privacy Engineering Intro ● Privacy by Design ● Privacy Enhancing Technologies bit.ly/2WXJTcR

  4. First, an apology. bit.ly/2x1UXWX

  5. Legal teams have often kept tech out of privacy. bit.ly/2ZBiEBz

  6. Developers don’t know privacy concepts. Privacy teams haven’t taught them. bit.ly/2J3yEWn

  7. Privacy Impact Assessment bit.ly/2x1UXWX

  8. Description A Privacy Impact Assessment (PIA) is a method to: ● Identify privacy risk ● Map personal data flows ● Document privacy risk mitigations ● Fulfill regulatory requirements bit.ly/2KmuLyI

  9. bit.ly/2x7BlRh

  10. Use Cases ● New applications ● Adding functions and features ● Collecting new sensitive personal data ● Annual reviews or audits

  11. Tasting Notes Benefits ● Legal compliance ● Identify and reduce privacy risks ● Catch privacy errors bit.ly/2qbrnu5

  12. Tasting Notes Benefits Limitations ● Legal compliance ● High time investment ● Identify and reduce ● Ineffective if not privacy risks completed well ● Catch privacy errors ● Not a security risk assessment bit.ly/2qbrnu5

  13. Data Minimization and Retention bit.ly/2x1UXWX

  14. Description Data minimization is: ● Collecting only necessary data ● Maintaining and updating data ● Deleting old data that isn’t needed bit.ly/2KmuLyI

  15. Use Cases ● New applications ● API integrations ● Adding functions and features ● Collecting new personal data ● Customer termination

  16. Tasting Notes Benefits ● Legal compliance ● Minimize volume of data to be breached ● Improve data quality bit.ly/2qbrnu5

  17. Tasting Notes Benefits Limitations ● Legal compliance ● Users may be frustrated ● Minimize volume of data ● Companies like to keep to be breached all the data ● Improve data quality bit.ly/2qbrnu5

  18. Default Settings bit.ly/2x1UXWX

  19. Description Default settings for privacy should: ● Minimize personal data collected ● Prevent default data sharing ● Require enabling of intrusive settings ● Avoid making data public by default bit.ly/2KmuLyI

  20. Less than 5% of general users change any default settings, while programmers change 40% of settings. bit.ly/2UmLXEP

  21. bit.ly/2Hic0qm

  22. bit.ly/2Yg4i9D

  23. Tasting Notes Benefits ● Reputation for privacy ● Reduce user frustration ● Protect less educated users bit.ly/2qbrnu5

  24. Tasting Notes Benefits Limitations ● Legal compliance ● Companies may want to ● Reputation for privacy monetize intrusive apps ● Reduce user frustration ● Requires privacy ● Protect less educated awareness at design users bit.ly/2qbrnu5

  25. Encryption bit.ly/2x1UXWX

  26. Encrypt these: ● TLS ● Email and messaging ● Databases ● Cloud storage ● Backups ● Password management ● Endpoint devices bit.ly/2qbrnu5

  27. Don’t: ● Make your own crypto ● Use deprecated crypto (i.e., SHA1) ● Hard code keys ● Store keys on the same server as the data ● Use one key for everything ● Skip password hash and salt ● Forget to restore certificates after testing ● Use old crypto libraries bit.ly/2qbrnu5

  28. Differential Privacy bit.ly/2x1UXWX

  29. Description Differential privacy: ● Adds statistical noise to a data set ● Prevents identification of one individual’s record ● Provides the same results as the raw data would, with or without one record bit.ly/2KmuLyI

  30. bit.ly/2IwDufR

  31. bit.ly/2Pk7fEG

  32. bit.ly/2Pk7fEG

  33. Tasting Notes Benefits ● Limit insider threats ● Increase data usability ● Allows for collaboration without exposing data bit.ly/2qbrnu5

  34. Tasting Notes Benefits Limitations ● Legal compliance ● Works best on large ● Limit exposure from databases security incidents ● Must be tuned well ● Limit insider threats bit.ly/2qbrnu5

  35. Privacy Preserving Ad Click Attribution bit.ly/2x1UXWX

  36. Description Privacy preserving ad click attribution: ● Allows ad attribution monetization ● Prevents user ad click tracking ● Uses the browser to mediate ad clicks bit.ly/2KmuLyI

  37. bit.ly/30FFBoj

  38. bit.ly/30FFBoj

  39. Available now as an experimental feature bit.ly/30FFBoj

  40. Tasting Notes Benefits ● Allows websites to still monetize content ● Could become a W3C web standard bit.ly/2qbrnu5

  41. Tasting Notes Benefits Limitations ● Allows websites to still ● Needs widespread monetize content adoption to be effective ● Could become a W3C ● Users may not believe web standard any ads respect privacy bit.ly/2qbrnu5

  42. Federated Learning bit.ly/2x1UXWX

  43. Description Federated learning: ● Trains a central model on decentralized data ● Never transmits device data ● Sends iterative model updates to devices which return new results ● Uses secure aggregation to decrypt only the aggregate and no user data bit.ly/2KmuLyI

  44. bit.ly/2J4Fx9H

  45. bit.ly/2J4Fx9H

  46. Use Cases ● Android’s Gboard prediction model ● Health diagnostics ● Behavioral preference learning ● Driver behavior

  47. Tasting Notes Benefits ● Speeds up modeling and testing ● Minimally intrusive ● Individual data is not accessible to the central model bit.ly/2qbrnu5

  48. Tasting Notes Benefits Limitations ● Speeds up modeling ● Errors could cause and testing private data leakage ● Minimally intrusive ● Requires a large user ● Individual data is not base accessible to the central model bit.ly/2qbrnu5

  49. Homomorphic Encryption bit.ly/2x1UXWX

  50. Description Homomorphic encryption: ● Allows computation on ciphertext ● Enables collaboration without disclosing confidential data ● Only the calculation results can be decrypted bit.ly/2KmuLyI

  51. bit.ly/2WWvkB4

  52. Use Cases ● Computations on data shared across organizations ● Research using highly sensitive records ● Processing by employees with a lower clearance ● Google’s open source Private Join and Compute

  53. Tasting Notes Benefits ● Reduces insider threat ● Increases collaboration ● Increases data usability bit.ly/2qbrnu5

  54. Tasting Notes Benefits Limitations ● Reduces insider threat ● Resource-intensive ● Increases collaboration ● Limited functions ● Increases data usability ● No fully homomorphic encryption available yet bit.ly/2qbrnu5

  55. Becoming a Privacy Champion bit.ly/2x1UXWX

  56. Amber Welch MA, CISSP, CISA, CIPP/E, CIPM, FIP, CCSK, and ISO 27001 Lead Auditor linkedin.com/in/amberwelch1 github.com/msamberwelch @MsAmberWelch bit.ly/2WRAGh8

Recommend


More recommend