About this program
You cannot protect what you cannot find. Quick check of PII discovery, mapping and minimisation.
Risks addressed
- Critical Unknown PII stores exposed in a breach
- High PII kept past the retention period (GDPR breach)
- High Production data copied to test / dev environments
Controls (6)
-
Discovery tool scans structured + unstructured data
HighDiscovery tool scans structured + unstructured data
How to test + evidence
Testing procedure: Tool (Varonis / Microsoft Purview / equivalent) scans file shares, databases, SaaS.
Evidence to collect: Tool inventory + last scan.
-
Data inventory / RoPA maintained
HighData inventory / RoPA maintained
How to test + evidence
Testing procedure: Article-30 record of processing activities up to date.
Evidence to collect: RoPA document.
-
Retention policy + scheduled deletion
HighRetention policy + scheduled deletion
How to test + evidence
Testing procedure: Per data-type retention; automated deletion / archive at end of life.
Evidence to collect: Retention policy + delete jobs.
-
No production PII in non-prod
CriticalNo production PII in non-prod
How to test + evidence
Testing procedure: Test / dev environments use anonymised / synthetic data.
Evidence to collect: Pipeline + masking config.
-
DSAR process tested
MediumDSAR process tested
How to test + evidence
Testing procedure: Subject access request workflow tested at least once per year.
Evidence to collect: DSAR test report.
-
PII access reviewed quarterly
MediumPII access reviewed quarterly
How to test + evidence
Testing procedure: Access to PII stores recertified by owners every quarter.
Evidence to collect: Recert report.