Ensuring Compliance with GDPR Standards

Requires the Log Management and Compliance service in ArcSight SIEM as a Service or the ArcSight Recon capability.

In the Reports Portal, select Repository > Standard Content > GDPR.

The European Union (EU) adopted the General Data Protection Regulation (GDPR) to ensure that businesses and organizations protect individuals’ data privacy and security. If your enterprise processes the personal data of EU citizens or residents or offers goods and services to such individuals, then you must comply with the GDPR. The regulation sets out standards for any action, automatic or manual, that processes a person’s data. These standards include requiring that data controllers and data processors – the individuals in your enterprise or third-party organizations who control, manage, or make decisions about data processing – must be able to demonstrate that they are GDPR compliant.

To help you comply or prove compliance with GDPR, we provide the Compliance Pack for GDPR. For more information about adding the pack to the Reports repository, see the Solutions Guide for ArcSight Compliance Pack for GDPR. The guide includes information about identifying assets that must comply with GDPR.

This package includes the following dashboards and reports, organized by GDPR objectives:

Category Dashboards Reports
Access Activity - Access Activity

After Hours Access Activity on GDPR Systems Overview

Authorization Changes on GDPR Systems Overview

Failed Access Activity on GDPR Systems Overview

Failed Access Relationship on GDPR Systems Overview

Failed Access Activity by GDPR Asset

Failed Access Activity on GDPR Systems by User

After Hours Access Activity on GDPR Systems Summary

Authorization Changes Summary on GDPR Systems

Failed Access Activity by GDPR Assets

Failed Access Activity on GDPR Systems Summary

Failed Access Activity on GDPR Systems by Users

 

Access Activity - Regulatory Exposure

n/a

Potential Regulatory Exposure on GDPR Systems

Access Activity - Threat User Analysis

n/a

Admin Activity from Compromised GDPR System

Anti-Virus Disabled on GDPR Systems Summary

Audit Log Cleared on GDPR Systems Summary

Threats Executed against GDPR Systems Summary

Admin Activity n/a

User Creations on GDPR Environment

User Deletions on GDPR Environment

Users Added to a Group on GDPR Environment

Users Removed from a Group on GDPR Environment

Attack Surface Analysis - Attack Surface Identification

High Risk Vulnerabilities on GDPR Systems

Information Leakage Vulnerabilities on GDPR Systems

Password and Authentication Weaknesses on GDPR Systems

SQL Injection Vulnerabilities on GDPR Systems

SSL or TLS Vulnerabilities on GDPR Systems

Vulnerabilities on GDPR Systems Overview

Vulnerable GDPR Assets by Vulnerability Type

XSS Vulnerabilities on GDPR Systems

High Risk Vulnerabilities on GDPR Systems

Information Leakage Vulnerabilities on GDPR Systems

Password and Authentication Weaknesses on GDPR Systems

SQL Injection Vulnerabilities on GDPR Systems

SSL or TLS Vulnerabilities on GDPR Systems

Unpatched GDPR Systems

Vulnerability Summary by CVE ID

Vulnerability Summary by GDPR Asset

Vulnerability Summary on GDPR Systems

XSS Vulnerabilities on GDPR Systems

Attack Surface Analysis - Security Controls Risk Identification

DoS Attacks Against GDPR Systems

DoS Attacks Against GDPR Systems

Corporate Governance

Access Activity on GDPR Systems Overview

Geo Access Activity on GDPR Systems Overview

Physical Access Activity on GDPR Systems Overview

Access Activity on GDPR Systems Summary

After Work Hours Physical Access Activity on GDPR Systems Summary

Physical Access Activity on GDPR Systems Summary

Regulatory Exposure

Data Flow to GDPR Systems

Data Flow from GDPR Systems

Data Flow from GDPR Systems to non EU

Data Flow from non EU to GDPR Systems

GDPR Systems Communication with non EU Countries

GDPR Systems Communication Overview

High Risk Events on GDPR Systems Overview

Policy Violations on GDPR Systems Overview

Threat Relationship on GDPR Systems Overview

Threats on GDPR Systems Overview

Data Flow from GDPR Systems Summary

Data Flow from GDPR Systems to non EU Summary

Data Flow from non EU to GDPR Systems Summary

Data Flow to GDPR Systems Summary

High Risk Events on GDPR Systems Summary

Policy Violations on GDPR Systems Summary

Threats on GDPR Systems Summary

Threat Analysis - Data Store Risk

n/a

Attacks Against Databases on GDPR Systems

Cassandra Vulnerabilities on GDPR Systems

CRM and ERP Vulnerabilities on GDPR Systems

Database Configuration Changes on GDPR Systems

Database Weaknesses on GDPR Systems

Elasticsearch Vulnerabilities on GDPR Systems

IBM Db2 Vulnerabilities on GDPR Systems

MariaDB Vulnerabilities on GDPR Systems

Microsoft SQL Server Vulnerabilities on GDPR Systems

MongoDB Vulnerabilities on GDPR Systems

MySQL Vulnerabilities on GDPR Systems

Oracle Vulnerabilities on GDPR Systems

PostgreSQL Vulnerabilities on GDPR Systems

Redis Vulnerabilities on GDPR Systems

Threat Analysis - Internet

Malware Found on GDPR Systems

MITRE ATT&CK on GDPR Systems by GDPR Asset

MITRE ATT&CK on GDPR Systems by MITRE ID

MITRE ATT&CK on GDPR Systems Overview

MITRE ATT&CK Relationship on GDPR Systems Overview

Firewall Blocked Events in GDPR Environment

Information Leaks from GDPR Systems

Malware Found on GDPR Systems