{"id":461,"date":"2017-06-07T10:22:05","date_gmt":"2017-06-07T10:22:05","guid":{"rendered":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/industry\/2017\/06\/07\/protect-gdpr\/"},"modified":"2018-11-22T15:20:11","modified_gmt":"2018-11-22T15:20:11","slug":"protect-gdpr","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/cross-industry\/2017\/06\/07\/protect-gdpr\/","title":{"rendered":"Protect: Establish controls to detect and respond to breaches"},"content":{"rendered":"

Detecting and responding to data breaches<\/h2>\n

In certain cases, the GDPR requires that if a data breach occurs, organisations need to rapidly notify regulators. In some cases, organisations will also need to notify the affected data subjects. In order to meet this requirement, organisations will benefit from being able to monitor for and detect system intrusions.<\/p>\n

For incidents where we hold some or all of the responsibility to respond, we have established detailed Security Incident Response Management processes such as outlined for Azure<\/a> and Office 365<\/a>.<\/p>\n

In addition, we outline how we work collaboratively with our customers under a Shared Responsibility Model outlined in the Shared Responsibilities in Cloud Computing<\/a> white paper.<\/p>\n

Once you have detected a potential breach, we recommend, and use for our own incident response program, a four-step process:<\/p>\n