Article 32 of the GDPR specifically requires organisations to, as appropriate:
- Take measures to pseudonymise and encrypt personal data;
- Ensure the ongoing confidentiality, integrity, availability and resilience of processing systems and services;
- Restore the availability and access to personal data promptly in the event of a physical or technical incident; and/or
- Implement a process for regularly testing, assessing, and evaluating the effectiveness of technical and organisational measures for ensuring the security of processing.
Article 32 further requires risks “from accidental or unlawful destruction, loss, alteration, unauthorised disclosure of, or access to personal data” to be identified and mitigated.
An ISMS that conforms to ISO 27001 will meet all the above requirements.
Article 32 of the GDPR is the primary provision requiring technical measures to protect data. Although it gives examples of security measures and controls, the article does not provide detailed guidance regarding what you should do to achieve this.
Instead, the GDPR compels companies to look at existing best practices and recommendations, such as ISO 27001, to minimise the risk of a data breach.