{"id":644,"date":"2018-03-01T17:36:02","date_gmt":"2018-03-01T17:36:02","guid":{"rendered":"https:\/\/live-infoblox-blog.pantheonsite.io\/?p=644"},"modified":"2020-05-06T10:27:08","modified_gmt":"2020-05-06T17:27:08","slug":"part-3-4-practical-advice-to-network-and-security-operations","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/community\/part-3-4-practical-advice-to-network-and-security-operations\/","title":{"rendered":"[Part 3\/4] Practical Advice to Network and Security Operations Pros Regarding GDPR Compliance"},"content":{"rendered":"<p>This is the third in a four-part blog series. Check out\u00a0<a href=\"\/community\/part-1-4-practical-advice-to-network-and-security-operations\" target=\"_self\" rel=\"noopener noreferrer\">part 1<\/a>\u00a0and\u00a0<a href=\"\/community\/part-2-4-practical-advice-to-network-and-security-operations\" target=\"_self\" rel=\"noopener noreferrer\">part 2<\/a>.<\/p>\n<h2 id=\"toc-hId--1333281171\">Part 3 &#8211; Security Operations<\/h2>\n<p>The Forrester report\u00a0suggests \u201cThe Data Breach Notification requirement will be a game-changer\u201d. Specifically, this means incident response is more critical and difficult: the required information as part of any data breach notification (outlined in Article 33 section 3) includes the scope of the breach and personal data compromised, consequences to individuals and mitigation. Clearly better information, management processes and automation will help in the assessment of any potential breach.<\/p>\n<p>Infoblox can help with the challenge of evaluating potential security events to determine what might be incidents that require a response by the security operations team and supporting them in the subsequent assessment process. Based on our experience there are three areas where Infoblox products and services are relevant to security operations:<\/p>\n<ol>\n<li>Providing visibility into what is where on the network.<\/li>\n<li>Delivering curated threat intelligence and tools for investigating Indicators of Compromise (IOCs).<\/li>\n<li>Automating the process for sharing intelligence and IOCs with security tools.<\/li>\n<\/ol>\n<h2 id=\"toc-hId-441726191\">Knowing What is Where<\/h2>\n<p>What does not work is the good old IP Address Management Spreadsheet. Every networking professional has probably used a variant of this at some point &#8211; something like one tab per VLAN and one row per IP. This does not realistically reflect what is on the network, nor does it keep up with changes. For instance, anyone who has managed something like this knows that the number of times they are informed of something being removed from the network is probably a round number.<\/p>\n<p>How does this spreadsheet help the security operations team during assessments? It doesn\u2019t. Nor does it help the network team who may be called to find out what is really associated with an IP address.<\/p>\n<p>An integrated DDI system that combines \u201cThe Spreadsheet\u201d, incorporates live DNS &amp; DHCP data, is updated by active discovery of both the physical and virtual infrastructure, all combined with network authentication events, is a much better approach. This gives the answer to \u201cwho\u201d, \u201cwhen\u201d and \u201cwhere\u201d based on the protocols themselves and the information from the network itself.<\/p>\n<p>Having this data in a multi-user system, with role-based administration capabilities, frees the networking team from calls to investigate the \u201cwho\u201d, \u201cwhen\u201d and \u201cwhere\u201d and enables the security team to look at this information directly. It also becomes a virtuous circle in that the greater the accuracy of the data the more it is used, and hence the more it can facilitate automatically provisioning IPs and domain names, so the more accurate it becomes. Visibility into the network will speed up assessment, saving cost in terms of operator time, and allow some more proactive action (why is there a PlayStation or XP system still on the network?).<\/p>\n<p>Don\u2019t forget IPv6! Yes you are running it. You can either leave it to grow up organically (like was done with IPv4 &#8211; remember?) or take control of the address plan now so that you know what is where when you see IPv6 addresses in log files. Something is bound to exploit IPv6 as currently partially implemented within corporate networks. For an example see Tom Coffen\u2019s\u00a0<a href=\"https:\/\/www.infoblox.com\/resources\/webinars\/delivering-promise-modern-data-centers-focus-dns-ipv6\/?utm_source=blox-community&amp;utm_campaign=community-q2&amp;utm_medium=blox-community\" target=\"_self\" rel=\"nofollow noopener noreferrer\">presentation<\/a>\u00a0\u201cDelivering on the Promise of Modern Data Centers: A focus on DNS and IPv6\u00a0\u201d\u00a0<sup>ref 3<\/sup>\u00a0where IPv6 DHCP is mentioned. When IPv6 addresses appear in security logs how will you know what is where if you don\u2019t have an address plan?<\/p>\n<p>Think of improving the data quality used for security and network operations as below:<\/p>\n<h3 id=\"toc-hId--478224591\" style=\"text-align: center;\">Turning Data into Actionable Information<\/h3>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-646 size-full\" src=\"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/turning-data-into-actionable-information.png\" alt=\"Turning Data into Actionable Information\" width=\"599\" height=\"316\" srcset=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/turning-data-into-actionable-information.png 599w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/turning-data-into-actionable-information-300x158.png 300w\" sizes=\"auto, (max-width: 599px) 100vw, 599px\" \/><\/p>\n<p>This can be summed up as combining the current data you have from the sources on the left and using this to provide the benefits on the right of the security and networking teams using the same data, enabling automation and providing a valuable database of information.<\/p>\n<p>Lastly, a tip from CISOs: co-locating security and network operations with good data sources has worked wonders for addressing security issues and breaking down \u201csilos\u201d within an organisation. This will certainly help in assessment and responding to security events.<\/p>\n<p>The action item here is to review how accurate and integrated DDI is within your organisation as a basic component of being able to assess risk, alerts and incidents. If you are already there and it\u2019s working well for you move on to look at automation and reporting.<\/p>\n<h2 id=\"toc-hId--2078233743\">Threat Intelligence and Investigation<\/h2>\n<p>Knowing what is where is useful in terms of assessing security risks and the impact of malicious activity. This goes hand-in-hand with knowing if there is something to worry about in the first place.<\/p>\n<p>Most organisations are using threat intelligence unconsciously in that they may be consuming a feed to something such as a web proxy to block potentially harmful http(s) traffic, i.e. they block what the proxy vendor says they should block.<\/p>\n<p>Threat intelligence can be used independently of any specific tool, indeed in many cases it can augment any feed supplied by a specific vendor. One of the interesting facts about threat intelligence data is that the overlap between feeds is surprisingly little, so multiple data sources tend to be a benefit and not duplication.<\/p>\n<p>By using threat intelligence as a data source or feed in its own right, rather than as an embedded part of any specific security implementation, you can achieve the following:<\/p>\n<ul>\n<li>\u201cArm\u201d the DNS choke point in the form of Response Policy Zones.<\/li>\n<li>Add IOCs to firewalls or proxies.<\/li>\n<li>Use the information in the SIEM and\/or SOC for automated threat assessment.<\/li>\n<li>Have a source of information for the manual investigations that a security operations team undertakes.<\/li>\n<\/ul>\n<p>The action item here is to review if using threat intelligence would benefit your organisation. In the context of GDPR if you have no process to assess IOCs other than a web search, then reviewing what is available to support investigations should be a priority. Using a consolidated threat intelligence feed and associated tools is likely to save time to any security operations centre and does allow an organisation to demonstrate a process is in place. It also provides a vendor supported approach with a consistent interface, so any investigative tool knowledge does not leave with the person who created the in-house tool-set. It won\u2019t replace high level expertise, but the starting point will be much higher than a search tool.<\/p>\n<p>Infoblox gathers and maintains its own threat intelligence and partner data, and offers tools for security operations to access this information for automation\/investigations. Infoblox combines its own with other available threat intelligence data feeds on the\u00a0<a class=\" bf_ungated_init\" href=\"https:\/\/www.infoblox.com\/wp-content\/uploads\/infoblox-solution-note-infoblox-threat-intelligence-data-exchange-for-activetrust.pdf?utm_source=blox-community&amp;utm_campaign=community-q2&amp;utm_medium=blox-community\" target=\"_self\" rel=\"nofollow noopener noreferrer\">Threat Intelligence Data Exchange<\/a>\u00a0(TIDE) platform\u00a0and provides an API and\u00a0<a href=\"https:\/\/www.infoblox.com\/products\/activetrust-suite\/?utm_source=blox-community&amp;utm_campaign=community-q2&amp;utm_medium=blox-community\" target=\"_self\" rel=\"nofollow noopener noreferrer\">GUI<\/a>\u00a0to use the data. Contact\u00a0Infoblox for more information.<\/p>\n<h2 id=\"toc-hId--1190730062\">Automation<\/h2>\n<p>Assuming you have a combined authoritative DDI data and processes then you can use automation, reporting and integration to reduce risk and help with assessments. Examples include:<\/p>\n<ul>\n<li>Do I have any old XP devices lurking on the network? Can I prevent them getting an IP address in the first place?<\/li>\n<li>A new device has been added, automatically start a scan of the endpoint using a vulnerability scanner.<\/li>\n<li>A DNS query takes place to resolve a malicious domain name. The requestor\u2019s IP (source) address of the query is passed automatically, by the DNS service itself, to a security tool that quarantines or remediates an endpoint. Alternatively the DNS service returns a query response that is the IP address of a honeypot.<\/li>\n<li>Combining DDI data with critical SIEM alerts. For instance, add context such as a source IP being from a data centre VLAN, a VLAN used by Human Resources or a guest wireless network &#8211; each may indicate a different priority. Threat intelligence data may also be added based on the IOC.<\/li>\n<li>Collect DNS query data to help with the \u201cwe don\u2019t know what we don\u2019t know\u201d problem in securing any network.<\/li>\n<\/ul>\n<p>Automating compliance to industry security standards such as PCI can be used, in a GDPR context, to demonstrate \u201cstate of the art\u201d referred to in Article 25 section 1. While the GDPR does not specify any standards to be adhered to, ensuring compliance with an industry standard and having the audit records to show this, will help with any regulatory authority if the worst happens.<\/p>\n<p>Security operations could mandate a standard and ask a team such as the network group to adhere to it, or both groups could use the same tools to automatically ensure compliance. The second approach is likely to be more successful and has the benefit of an audit trail. The automated approach would do this as configuration changes happen, to ensure compliance is maintained, independently of the human factor.<\/p>\n<h2 id=\"toc-hId--303226381\">Checklist for Security Operations<\/h2>\n<p>Below is a checklist aimed at helping improve security operations, including closer cooperation with network operations:<\/p>\n<ul>\n<li>Foundational information\n<ul>\n<li>Do you know what device is where on the network?<\/li>\n<li>Can you leverage this to reduce risk?<\/li>\n<\/ul>\n<\/li>\n<li>Share intel across functions (network and security operations) and enforcement points\n<ul>\n<li>One view of the network, accessible by all?<\/li>\n<li>Threat Intelligence; is this being leveraged?<\/li>\n<li>Are you combining intelligence from various sources?<\/li>\n<li>Is your intelligence current and comprehensive?<\/li>\n<li>Is it easy to use and access?<\/li>\n<li>Are you paying for the same intel on different platforms instead of sharing?<\/li>\n<\/ul>\n<\/li>\n<li>Evaluate whether using free or self-build threat investigation tools is the right approach\n<ul>\n<li>Will it provide the building blocks for automation \u2013 free may not<\/li>\n<li>Is the knowledge of any in-house tools a risk?<\/li>\n<\/ul>\n<\/li>\n<li>Conforming to \u201cstate of the art\u201d standards\n<ul>\n<li>Can you automate checking compliance?<\/li>\n<li>Audit trail to prove this?<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<h2 id=\"toc-hId-584277300\">About the GDPR Blog Series<\/h2>\n<p>This blog is part of a four-part blog series.\u00a0Please find the links to other parts below.<\/p>\n<ul>\n<li>Part1 &#8211;\u00a0<a href=\"\/community\/part-1-4-practical-advice-to-network-and-security-operations\/\" target=\"_self\" rel=\"noopener noreferrer\">Introduction<\/a>\u00a0&#8211; Introduce the implications of GDPR to network and security professionals<\/li>\n<li>Part 2 &#8211;\u00a0<a href=\"\/community\/part-2-4-practical-advice-to-network-and-security-operations\/\" target=\"_self\" rel=\"noopener noreferrer\">Architecture review<\/a>\u00a0&#8211; Identify and reduce risk, focusing on DNS as a point of control and visibility.<\/li>\n<li>Part 3 &#8211;\u00a0<a href=\"\/community\/part-3-4-practical-advice-to-network-and-security-operations\/\" target=\"_self\" rel=\"noopener noreferrer\">Support of security operations<\/a>\u00a0&#8211; Assess the impact of potential malicious network activity along with information sharing, enriching context and signaling between security tools.<\/li>\n<li>Part 4 &#8211;\u00a0<a href=\"\/community\/part-4-4-practical-advice-to-network-and-security-operations\/\" target=\"_self\" rel=\"noopener noreferrer\">Governance around DDI data<\/a>\u00a0&#8211; DDI data really helps in terms of network security but some of it will fall under the GDPR as some DDI data relates to a person.<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>This is the third in a four-part blog series. Check out\u00a0part 1\u00a0and\u00a0part 2. Part 3 &#8211; Security Operations The Forrester report\u00a0suggests \u201cThe Data Breach Notification requirement will be a game-changer\u201d. Specifically, this means incident response is more critical and difficult: the required information as part of any data breach notification (outlined in Article 33 section [&hellip;]<\/p>\n","protected":false},"author":213,"featured_media":640,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[3],"tags":[43],"class_list":{"0":"post-644","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-community","8":"tag-gdpr","9":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>[Part 3\/4] Practical Advice to Network and Security Operations Pros Regarding GDPR Compliance - Infoblox Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/community\/part-3-4-practical-advice-to-network-and-security-operations\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"[Part 3\/4] Practical Advice to Network and Security Operations Pros Regarding GDPR Compliance\" \/>\n<meta property=\"og:description\" content=\"This is the third in a four-part blog series. Check out\u00a0part 1\u00a0and\u00a0part 2. Part 3 &#8211; Security Operations The Forrester report\u00a0suggests \u201cThe Data Breach Notification requirement will be a game-changer\u201d. Specifically, this means incident response is more critical and difficult: the required information as part of any data breach notification (outlined in Article 33 section [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/community\/part-3-4-practical-advice-to-network-and-security-operations\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2018-03-01T17:36:02+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-05-06T17:27:08+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/iotblogmonday.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"660\" \/>\n\t<meta property=\"og:image:height\" content=\"454\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Jim Mozley\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jim Mozley\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/part-3-4-practical-advice-to-network-and-security-operations\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/part-3-4-practical-advice-to-network-and-security-operations\\\/\"},\"author\":{\"name\":\"Jim Mozley\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/0b615219b32a2c6209c9028af8b9ea10\"},\"headline\":\"[Part 3\\\/4] Practical Advice to Network and Security Operations Pros Regarding GDPR Compliance\",\"datePublished\":\"2018-03-01T17:36:02+00:00\",\"dateModified\":\"2020-05-06T17:27:08+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/part-3-4-practical-advice-to-network-and-security-operations\\\/\"},\"wordCount\":1712,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/part-3-4-practical-advice-to-network-and-security-operations\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/iotblogmonday.jpg\",\"keywords\":[\"GDPR\"],\"articleSection\":[\"Community\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/part-3-4-practical-advice-to-network-and-security-operations\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/part-3-4-practical-advice-to-network-and-security-operations\\\/\",\"name\":\"[Part 3\\\/4] Practical Advice to Network and Security Operations Pros Regarding GDPR Compliance - Infoblox Blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/part-3-4-practical-advice-to-network-and-security-operations\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/part-3-4-practical-advice-to-network-and-security-operations\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/iotblogmonday.jpg\",\"datePublished\":\"2018-03-01T17:36:02+00:00\",\"dateModified\":\"2020-05-06T17:27:08+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/part-3-4-practical-advice-to-network-and-security-operations\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/part-3-4-practical-advice-to-network-and-security-operations\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/part-3-4-practical-advice-to-network-and-security-operations\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/iotblogmonday.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/iotblogmonday.jpg\",\"width\":660,\"height\":454},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/part-3-4-practical-advice-to-network-and-security-operations\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Community\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/community\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"[Part 3\\\/4] Practical Advice to Network and Security Operations Pros Regarding GDPR Compliance\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/0b615219b32a2c6209c9028af8b9ea10\",\"name\":\"Jim Mozley\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_213_1744659534-96x96.jpg\",\"url\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_213_1744659534-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_213_1744659534-96x96.jpg\",\"caption\":\"Jim Mozley\"},\"description\":\"Jim Mozley has managed TLD and Protective DNS services that are part of the UK Critical National Infrastructure and TLDs for major global tech companies and brands. Jim has a long history with DNS (and DHCP &amp; IP Address Management), working with customers on implementation, migrations, education, bespoke development, integration, and DNS related threat intelligence. In his current role, Jim works on supporting customers in the intersection of security, regulatory compliance and technical standards. He truly believes that it always starts with DNS and Jim is passionate about using it as a foundational layer of network security. It might be the firewall, but it\u2019s probably DNS.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/jim-mozley\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"[Part 3\/4] Practical Advice to Network and Security Operations Pros Regarding GDPR Compliance - Infoblox Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/community\/part-3-4-practical-advice-to-network-and-security-operations\/","og_locale":"en_US","og_type":"article","og_title":"[Part 3\/4] Practical Advice to Network and Security Operations Pros Regarding GDPR Compliance","og_description":"This is the third in a four-part blog series. Check out\u00a0part 1\u00a0and\u00a0part 2. Part 3 &#8211; Security Operations The Forrester report\u00a0suggests \u201cThe Data Breach Notification requirement will be a game-changer\u201d. Specifically, this means incident response is more critical and difficult: the required information as part of any data breach notification (outlined in Article 33 section [&hellip;]","og_url":"https:\/\/www.infoblox.com\/blog\/community\/part-3-4-practical-advice-to-network-and-security-operations\/","og_site_name":"Infoblox Blog","article_published_time":"2018-03-01T17:36:02+00:00","article_modified_time":"2020-05-06T17:27:08+00:00","og_image":[{"width":660,"height":454,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/iotblogmonday.jpg","type":"image\/jpeg"}],"author":"Jim Mozley","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Jim Mozley","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/community\/part-3-4-practical-advice-to-network-and-security-operations\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/part-3-4-practical-advice-to-network-and-security-operations\/"},"author":{"name":"Jim Mozley","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/0b615219b32a2c6209c9028af8b9ea10"},"headline":"[Part 3\/4] Practical Advice to Network and Security Operations Pros Regarding GDPR Compliance","datePublished":"2018-03-01T17:36:02+00:00","dateModified":"2020-05-06T17:27:08+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/part-3-4-practical-advice-to-network-and-security-operations\/"},"wordCount":1712,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/part-3-4-practical-advice-to-network-and-security-operations\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/iotblogmonday.jpg","keywords":["GDPR"],"articleSection":["Community"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/community\/part-3-4-practical-advice-to-network-and-security-operations\/","url":"https:\/\/www.infoblox.com\/blog\/community\/part-3-4-practical-advice-to-network-and-security-operations\/","name":"[Part 3\/4] Practical Advice to Network and Security Operations Pros Regarding GDPR Compliance - Infoblox Blog","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/part-3-4-practical-advice-to-network-and-security-operations\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/part-3-4-practical-advice-to-network-and-security-operations\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/iotblogmonday.jpg","datePublished":"2018-03-01T17:36:02+00:00","dateModified":"2020-05-06T17:27:08+00:00","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/part-3-4-practical-advice-to-network-and-security-operations\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/community\/part-3-4-practical-advice-to-network-and-security-operations\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/community\/part-3-4-practical-advice-to-network-and-security-operations\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/iotblogmonday.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/iotblogmonday.jpg","width":660,"height":454},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/community\/part-3-4-practical-advice-to-network-and-security-operations\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Community","item":"https:\/\/www.infoblox.com\/blog\/category\/community\/"},{"@type":"ListItem","position":3,"name":"[Part 3\/4] Practical Advice to Network and Security Operations Pros Regarding GDPR Compliance"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/0b615219b32a2c6209c9028af8b9ea10","name":"Jim Mozley","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_213_1744659534-96x96.jpg","url":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_213_1744659534-96x96.jpg","contentUrl":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_213_1744659534-96x96.jpg","caption":"Jim Mozley"},"description":"Jim Mozley has managed TLD and Protective DNS services that are part of the UK Critical National Infrastructure and TLDs for major global tech companies and brands. Jim has a long history with DNS (and DHCP &amp; IP Address Management), working with customers on implementation, migrations, education, bespoke development, integration, and DNS related threat intelligence. In his current role, Jim works on supporting customers in the intersection of security, regulatory compliance and technical standards. He truly believes that it always starts with DNS and Jim is passionate about using it as a foundational layer of network security. It might be the firewall, but it\u2019s probably DNS.","url":"https:\/\/www.infoblox.com\/blog\/author\/jim-mozley\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/644","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/213"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=644"}],"version-history":[{"count":5,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/644\/revisions"}],"predecessor-version":[{"id":1197,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/644\/revisions\/1197"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/640"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=644"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=644"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=644"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}