Does GDPR require vulnerability scanning?
While GDPR does not explicitly require vulnerability scanning, Article 32.1 does require “testing, assessing, and evaluating security measures”. Vulnerability scanning is an essential tool for security testing.
Here is the full text of article 32.1:
Taking into account the state of the art, the costs of implementation and the nature, scope, context and purposes of processing as well as the risk of varying likelihood and severity for the rights and freedoms of natural persons, the controller and the processor shall implement appropriate technical and organizational measures to ensure a level of security appropriate to the risk, including inter alia as appropriate:
- The pseudonymisation and encryption of personal data.
- The ability to ensure the ongoing confidentiality, integrity, availability and resilience of processing systems and services.
- The ability to restore the availability and access to personal data in a timely manner in the event of a physical or technical incident.
- A process for regularly testing, assessing and evaluating the effectiveness of technical and organisational measures for ensuring the security of the processing.
How can HostedScan help with your GDPR strategy?
HostedScan provides automated vulnerability scanners and vulnerability management tools, which can help you protect your customers and their data.
Comprehensive set of vulnerability scanners for networks, servers, websites, and APIs
Automated recurring scanning on a monthly, weekly, or daily schedule
Email alerts for any new findings
Reports and dashboard for vulnerability management and tracking remediation