Global Security Forum

Security Global Forum

Our mission is to provide clients with an online user community of industry peers and IBM experts, to exchange tips and tricks, best practices, and product knowledge. We hope the information you find here helps you maximize the value of your IBM Security solutions.

 View Only

IBM Guardium for Sri Lanka's PDPA (Personal Data Protection Act) - A Point of View

  • 1.  IBM Guardium for Sri Lanka's PDPA (Personal Data Protection Act) - A Point of View

    Posted 26 days ago

     

    Introduction:     

    The Personal Data Protection Act (PDPA), No. 9 of 2022, is Sri Lanka's pioneering legislation dedicated to safeguarding personal data. Enacted on March 19, 2022, the PDPA establishes a comprehensive legal framework to regulate the processing of personal data, aligning with international standards such as the EU's General Data Protection Regulation (GDPR).  In this article, let's understand the how to achieve PDPA compliance by mapping the regulatory requirements with IBM Guardium Data Protection solution capabilities.

    PDPA Scope and Applicability:

    The PDPA applies to:

    • Processing of personal data wholly or partly within Sri Lanka.
    • Entities outside Sri Lanka that offer goods or services to individuals in Sri Lanka or monitor their behavior within the country.

    However, the Act does not apply to personal data processed purely for personal, domestic, or household purposes by an individual. 

    Key Provisions:

    1.     Rights of Data Subjects:

    The PDPA grants individuals several rights concerning their personal data, including:

    • Right to access personal data.
    • Right to rectification of inaccurate data.
    • Right to erasure ("right to be forgotten").
    • Right to object to processing.
    • Right to withdraw consent.
    • Right to review automated decision-making.

    2.     Obligations for Controllers and Processors:

    Organizations processing personal data are required to:

    ·        Ensure lawful and transparent processing.

    ·        Implement data protection management programs.

    ·        Conduct data protection impact assessments in certain scenarios.

    ·        Appoint Data Protection Officers (DPOs) under specific conditions.

    ·        Notify the Data Protection Authority and affected individuals of data breaches.

    3.     Special Categories of Personal Data:

    The Act provides additional protections for sensitive personal data, including information revealing racial or ethnic origin, political opinions, religious beliefs, health data, and biometric data. 

    4.     Regulatory Authority:

    The PDPA establishes the Data Protection Authority of Sri Lanka, tasked with enforcing the Act, issuing guidelines, and handling complaints related to data protection. 

    5.     Penalties for Non-Compliance:

    The Data Protection Authority is empowered to impose penalties for non-compliance:

    • For the first instance, a penalty not exceeding ten million rupees.
    • For subsequent non-compliances, an additional penalty of twice the amount imposed for the previous non-compliance.

    Factors considered when determining penalties include the nature and duration of the violation, the number of data subjects affected, and any actions taken to mitigate damages.

     Mapping PDPA Regulatory requirements with Database Activity Monitoring (DAM) capabilities:

    1.   Data Subject Rights (PDPA Part II)

    Relevant PDPA Articles:

    • Right to access, rectify, erase, restrict, object, and withdraw consent.

    DAM Capabilities:

    • Discovery & classification:  provide comprehensive, real-time data discovery and classification across various environments, including structured and unstructured data, on-premises systems, cloud platforms, and mainframes.
    • Data Access Monitoring: Track who accessed which data and when to support access requests.
    • Audit Trails: Maintain detailed logs for rectification and erasure requests.
    • User Activity Monitoring: Log data subject-related actions for compliance evidence.

    2.       Lawful Processing & Purpose Limitation (PDPA Part III)

    Relevant PDPA Articles:

    • Data must be processed lawfully, fairly, and for a specified purpose.

    DAM Capabilities:

    • Policy-Based Alerts: Alert on unauthorized queries or abnormal access patterns.
    • Rule Enforcement: Detect access or changes outside of authorized business processes.
    • Data Tagging: Tag sensitive fields to ensure appropriate access.

    3.    Security Safeguards (PDPA Section 24)

    Relevant PDPA Articles:

    • Data controllers/processors must implement appropriate technical and organizational measures.

    DAM Capabilities:

    • Real-Time Monitoring: Detect insider threats and anomalous behavior.
    • Database Vulnerability Assessment: Identify security misconfigurations.
    •  Masking and Redaction: Mask the sensitive data dynamically without hamper.

    4.  Breach Notification (PDPA Section 31)

    Relevant PDPA Articles:

    • Notify Data Protection Authority and affected subjects upon data breaches.

    DAM Capabilities:

    • Anomaly Detection: Identify suspicious database activities indicating breaches.
    • Incident Forensics: Provide historical data access logs to trace root causes.
    • Automated Reporting: Generate reports for breach impact assessments.

    5.   Data Protection by Design & Default (PDPA Section 21)

    Relevant PDPA Articles:

    • Ensure data protection principles are built into data processing systems.

    DAM Capabilities:

    • Role-Based Access Controls (RBAC): Enforce least privilege access.
    • Monitoring of Privileged Users: Track actions by DBAs and system admins.
    • Continuous Auditing: Validate database configurations against compliance policies.

    6.      Data Protection Impact Assessments (PDPA Section 25)

    Relevant PDPA Articles:

    • Required when processing poses high risks to rights and freedoms.

    DAM Capabilities:

    • Risk Profiling Reports: Identify high-risk tables and access patterns.
    • Access Pattern Analysis: Determine data exposure risks based on usage.
    • Support for Impact Analysis: Provide evidence for DPIA documentation.

    7.     Record Keeping & Accountability (PDPA Section 26)

    Relevant PDPA Articles:

    • Maintain records of processing and demonstrate compliance.

    DAM Capabilities:

    • Comprehensive Logging: Centralized logs of all database access and actions.
    • Tamper-Evident Logs: Ensure integrity of compliance data.
    • Report Generation: Automatic periodic compliance reports.

    Summary table:

    PDPA Act Provision

    IBM Guardium Capabilities

    1. Data Principal Rights

    - Right to access, correction, erasure

    - Tracks who accessed what data and when- Provides audit trails to support subject rights

    - Enables data flow tracking and masking for correction/erasure requests

    2. Consent & Lawful Processing

    - Process personal data based on valid consent/legal use

    - Policy-based access controls- Data classification and labelling

    - Monitor for unauthorized access attempts

    3. Security Safeguards

    - Implement reasonable technical and organizational measures

    - Real-time activity monitoring- Vulnerability scanning- Encryption validation

    - Automated blocking of policy violations

    4. Data Breach Notification

    - Notify Data Protection Board and affected users

    - Real-time alerting on suspicious activity- Built-in incident response workflows

    - Supports forensic investigation and impact analysis

    5. Data Protection by Design & Default

    - Integrate safeguards at the design stage

    - Security policies enforced across data environments- Role-based access controls (RBAC)

    - Least-privilege user monitoring

    6. Data Protection Impact Assessments (DPIAs)

    - Required for high-risk processing

    - Risk profiling and exposure analytics- Sensitive data discovery and classification

    - Audit logs and access pattern analysis

    7. Record-Keeping & Accountability

    - Maintain processing records and demonstrate compliance

    - Centralized, tamper-proof audit logs- Customizable compliance reports (DPDP, GDPR, etc.)

    PDPA's Stance on Encryption

    While the PDPA does not mandate encryption by name, it states under Section 24 (Security Safeguards):

        "A controller or processor shall implement appropriate technical and organisational measures to ensure the security of personal data, including protection against unauthorised or unlawful processing and against accidental loss, destruction or damage."

    Encryption is one of the recognized "technical measures" under international standards (like GDPR), which the PDPA closely aligns with. It is not explicitly necessary to use third-party encryption tools to comply, however, encryption is strongly recommended as a technical safeguard under the law - and whether it's in-house or third-party depends on your organization's risk profile, resources, and capabilities.

    Native Encryption vs. Third-Party Encryption

    Here's a comparison of native encryption vs. third-party encryption from the perspective of data protection regulations like Sri Lanka's PDPA, India's DPDP, and general best practices in data security:

    Criteria

    Native Encryption

    Third-Party Encryption

    Definition

    Encryption tools built into databases, OS, or platforms

    Independent tools or platforms for encryption and key management

    Examples

    SQL Server TDE, Oracle Advanced Security, AWS KMS, Windows BitLocker

    Thales CipherTrust, IBM Guardium, Vormetric, Fortanix, HashiCorp Vault

    Ease of Implementation

    Easier to configure within native systems

    Often requires integration effort across multiple systems

    Cost

    Usually no additional license cost

    Can be expensive (licensing, deployment, training)

    Performance Impact

    Optimized for native environments

    ⚠️ May introduce latency depending on implementation

    Key Management practices

    PDPA Requirement

    How Key Management Helps Achieve Compliance

    Section 24 – Security Safeguards

    - Strong encryption with secure key management prevents unauthorized access. - Centralized control ensures resilience.

    Section 26 – Record-Keeping and Accountability

    - Audit trails of key usage and changes support traceability and governance. - Ensures evidence of due diligence.

    Section 31 – Data Breach Notification

    - If encrypted data is breached but keys are protected, it reduces liability and may negate mandatory notification.

    Section 21 – Data Protection by Design and by Default

    - Key management ensures encryption is embedded from system design stage. - Enables role-based access to encrypted data.

    Section 25 – Data Protection Impact Assessments (DPIAs)

    - Demonstrates risk mitigation and technical safeguards for high-risk data processing. - Centralized KMS helps show maturity.

    Purpose Limitation & Data Minimization (Part III)

    - Key-based access controls support access limitation.- Encryption policies can be scoped per use-case or data category.

    Key Management Lifecycle & PDPA Alignment

    Lifecycle Stage

    PDPA/DPDP Alignment

    Guardium Support

    Key Generation

    Security Safeguards

    Strong, policy-driven, compliant

    Key Storage

    Data Protection, Access Control

    Centralized, encrypted, access-restricted

    Key Distribution

    Secure Transmission

    Identity & role-based controls

    Key Rotation

    Risk Mitigation

    Automated and policy-based

    Key Revocation

    Breach Containment

    On-demand revocation & expiry policies

    Key Auditing

    Accountability, Reporting

    Tamper-proof logs and compliance-ready reports

    Conclusion:

    IBM Guardium is a powerful enabler for PDPA compliance in Sri Lanka, especially for regulated sectors (like banking, telecom, and healthcare). It enhances visibility, enforces policies, mitigates risks, and provides the audit evidence required to demonstrate accountability under the law. IBM Guardium helps organizations in (1) Upholding Data Subject Rights (2) Lawful and Purpose-Limited Processing (3) Implementing Security Safeguards (5) Breach Notification and Incident Handling and (6) Support for Regulatory Reporting and Governance



    ------------------------------
    Betala Shanbhag | Security Technical Specialist – IBM Data & AI
    ------------------------------