Knowledge is Power: Guidance from ICO and NCSC on GDPR Security Outcomes

The GDPR is now in effect, but for many technical folks, especially in security, it is still a challenging ride to translate a high level legislation into clear, actionable items. The legislation is not as detailed as many in Info Security would like, especially when-compared to PCI Compliance which specifically details what your password policy should be, or how long log data should be stored. However, the reason why the GDPR isn’t as descriptive, is because it needs to stand for a long time, without major modifications, and stay relevant as new technology and threats emerge. For organizations, this means that the lessons to be learned around GDPR will be ongoing.

We at Splunk sat with legal experts, and following the outcome-focused approach to the GDPR, outlined how to protect personal information through the use of machine data. We continue to closely monitor new advice being shared by leading authorities, and fresh findings from audits being released. From pre-GDPR national decisions, to post-GDPR and EU wide impacts - knowledge is power.

For example, a lesson learned and documented by the ICO on Community Pharmacies is to never use shared user accounts to access personal information:

ICO pharmacies shared account warning The National Cyber Security Centre (NCSC) with the UK’s Information Commissioner’s Office (ICO), recently published a Guidance document on GDPR Security Outcomes. It summarises several articles and converts the information into the people, processes and technologies that are needed by security managers and practitioners in today’s organizations. Businesses with a higher security maturity should already have most of these things in place, but this is often not the case.

Quoting from the ICO and NCSC guidance, I want to point out the importance of security monitoring, and how data collection from your business applications falls under the GDPR:

We understand the challenge in collecting a full audit trail from systems that process personal data. Organizations may have multiple business applications where information is widely distributed. Each business application provides different APIs to collect the data, as well as the various formats in how the audit trail information is structured - those and the volume of data generated is too vast to handle with traditional tools. However, it still needs to be collected, and made accessible and usable in order to detect potential anomalies early, or scope the impacts of potential incidents; e.g. knowing if any EU personal data was put at risk by a compromised user account. In preparation of an audit by the authorities, you may want to also prove that your security controls are enforced, and employees follow your IT policies, such as not sharing user accounts to access personal data.

Today, we at Splunk enable thousands of organizations to mature their security capabilities. Just one example is how we help UCAS to protect over 800k student records every year. If you want to learn more, reach out to our team for a GDPR Workshop to review what’s required of your organisation under the GDPR, what situations you may face, and identify any gaps in your current efforts.

Happy Splunking,

Matthias

Related Articles

Predicting Cyber Fraud Through Real-World Events: Insights from Domain Registration Trends
Security
12 Minute Read

Predicting Cyber Fraud Through Real-World Events: Insights from Domain Registration Trends

By analyzing new domain registrations around major real-world events, researchers show how fraud campaigns take shape early, helping defenders spot threats before scams surface.
When Your Fraud Detection Tool Doubles as a Wellness Check: The Unexpected Intersection of Security and HR
Security
4 Minute Read

When Your Fraud Detection Tool Doubles as a Wellness Check: The Unexpected Intersection of Security and HR

Behavioral analytics can spot fraud and burnout. With UEBA built into Splunk ES Premier, one data set helps security and HR reduce risk, retain talent, faster.
Splunk Security Content for Threat Detection & Response: November Recap
Security
1 Minute Read

Splunk Security Content for Threat Detection & Response: November Recap

Discover Splunk's November security content updates, featuring enhanced Castle RAT threat detection, UAC bypass analytics, and deeper insights for validating detections on research.splunk.com.
Security Staff Picks To Read This Month, Handpicked by Splunk Experts
Security
2 Minute Read

Security Staff Picks To Read This Month, Handpicked by Splunk Experts

Our Splunk security experts share their favorite reads of the month so you can follow the most interesting, news-worthy, and innovative stories coming from the wide world of cybersecurity.
Behind the Walls: Techniques and Tactics in Castle RAT Client Malware
Security
10 Minute Read

Behind the Walls: Techniques and Tactics in Castle RAT Client Malware

Uncover CastleRAT malware's techniques (TTPs) and learn how to build Splunk detections using MITRE ATT&CK. Protect your network from this advanced RAT.
AI for Humans: A Beginner’s Field Guide
Security
12 Minute Read

AI for Humans: A Beginner’s Field Guide

Unlock AI with the our beginner's field guide. Demystify LLMs, Generative AI, and Agentic AI, exploring their evolution and critical cybersecurity applications.
Splunk Security Content for Threat Detection & Response: November 2025 Update
Security
5 Minute Read

Splunk Security Content for Threat Detection & Response: November 2025 Update

Learn about the latest security content from Splunk.
Operation Defend the North: What High-Pressure Cyber Exercises Teach Us About Resilience and How OneCisco Elevates It
Security
3 Minute Read

Operation Defend the North: What High-Pressure Cyber Exercises Teach Us About Resilience and How OneCisco Elevates It

The OneCisco approach is not about any single platform or toolset; it's about fusing visibility, analytics, and automation into a shared source of operational truth so that teams can act decisively, even in the fog of crisis.
Data Fit for a Sovereign: How to Consider Sovereignty in Your Digital Resilience Strategy
Security
5 Minute Read

Data Fit for a Sovereign: How to Consider Sovereignty in Your Digital Resilience Strategy

Explore how digital sovereignty shapes resilient strategies for European organisations. Learn how to balance control, compliance, and agility in your data infrastructure with Cisco and Splunk’s flexible, secure solutions for the AI era.