Latest Marriott Breach Puts Focus on GDPR

4 MIN READ
MIN READ

A massive data breach at Marriott and Starwood Hotels and Resorts has put the General Data Protection Regulation (GDPR) back in the spotlight. As the hotel chain faces record fines under the GDPR, privacy experts are again extolling the importance of secure log management practices to avoid suffering a similar fate as Starwood.The Starwood data breach recently exposed personal data of 500 million hotel guests, including such crucial information as passport numbers, birth dates, and credit card specifics. This has led privacy experts to suggest that Starwood could be the first company to be hit with maximum fines under the GDPR.Under the GDPR, companies can be subject to fines of up to 20 million Euro or 4% or global revenue, whichever is larger. Starwood’s 2017 revenues were nearly $5.5 billion, with 4% of revenues totaling $220 million or nearly 194 million Euro. And while no fines that large have been levied in the six months since the introduction of the GDPR, industry experts say regulators will likely hit Starwood with record penalties due to the severity of the data breach.Since May 25 when GPDR went into full effect, every breach, whether it's Cathay Pacific, British Airways, Starwoods and the latest Facebook's latest bug is fair game for GPDR's purview. In each case, it boils down to a simple sounding problem: unauthorized database access.The details of the Marriott breach is only starting to unfold over the last few weeks. One thing we know is there has been potentially four years of unauthorized access. The database was hosted on the cloud and the breach was detected in September by an internal security tool after an upgrade to merge user accounts from Marriott Rewards, The Ritz Carlton and SPG. Would cloud monitoring and logging be able to identify suspicious log-in locations and large data transfers sooner? Details will continue o come out in the coming weeks and months and we will see how GPDR is invoked.What is the GDPR?The European Union (EU) implemented the GDPR in May 2018, marking a historic evolution in data protection and privacy. Not only does the law cover all 515 million residents of the EU and the European Economic Area (EEA), but it has the amplifying effect of regulating the export of personal data from the EU and the EEA to the rest of the world.At a basic level the GDPR represents a shift in the default business operating mode for personal data collection from the previous mantra of “collect and store as much personal data as possible for as long as possible” to “retain as little data on individuals for as short a period of time as is absolutely necessary.”Essentially, the GDPR’s requirements are defined in each case by the scope and type of the data in question versus the need to store that data. The other key element is that the GDPR requires companies to obtain consent from subjects in order to collect their data.More importantly, the sheer scope of the law’s population and business activity coverage has ensured significant impacts from the GDPR are already being felt well beyond the borders of Europe to shape data management practices around the globe. The California Consumer Privacy Act will also go into effect in 2020.The GDPR and server logsThough the GDPR doesn’t focus on server logs in particular, data protection authorities often view the proper handling of logs as an indicator that a firm is demonstrating regulatory compliance.The GDPR is nonetheless important for those firms working with server logs, especially considering the default configuration of many popular web servers like NGINX and Apache Web Server are set to automatically collect and retain logs. Web servers store security audit logs, error logs and access logs, and according to the GDPR all three types of these logs contain personal data by default.The law specifically defines IP addresses as personal data, while logs can also contain usernames if the web service in question uses those in its URL structure.There is one exception to these rules, and that is the limited gathering and storing of data for legitimate security purposes. In this case the regulation allows the retention of personal data without consent solely for the purposes of detecting and preventing unauthorized system access and fraud.LogDNA and GDPRLogDNA’s approach to data collection and storage is well-suited to the new landscape ushered in by the GDPR, as we only retain client log data for as long as is necessary for problems to be identified and addressed. As a matter of course, LogDNA ensures that server logs are trafficked through our system as efficiently as possible, with prompt removal once clients have completed their diagnostic and remediation work. As well, LogDNA maintains compliance with all industry standards, including the GDPR. Specifically, we constantly monitor changes to compliance from privacy-related regulatory bodies, while reviewing guidance from our world-class legal team. LogDNA provides clients with regular updates on changes to international standards and laws like the GDPR to ensure your own organization remains compliant amidst ever-changing data regulations.

Table of Contents

    Share Article

    RSS Feed

    Next blog post
    You're viewing our latest blog post.
    Previous blog post
    You're viewing our oldest blog post.
    Mezmo + Catchpoint deliver observability SREs can rely on
    Mezmo’s AI-powered Site Reliability Engineering (SRE) agent for Root Cause Analysis (RCA)
    What is Active Telemetry
    Launching an agentic SRE for root cause analysis
    Paving the way for a new era: Mezmo's Active Telemetry
    The Answer to SRE Agent Failures: Context Engineering
    Empowering an MCP server with a telemetry pipeline
    The Debugging Bottleneck: A Manual Log-Sifting Expedition
    The Smartest Member of Your Developer Ecosystem: Introducing the Mezmo MCP Server
    Your New AI Assistant for a Smarter Workflow
    The Observability Problem Isn't Data Volume Anymore—It's Context
    Beyond the Pipeline: Data Isn't Oil, It's Power.
    The Platform Engineer's Playbook: Mastering OpenTelemetry & Compliance with Mezmo and Dynatrace
    From Alert to Answer in Seconds: Accelerating Incident Response in Dynatrace
    Taming Your Dynatrace Bill: How to Cut Observability Costs, Not Visibility
    Architecting for Value: A Playbook for Sustainable Observability
    How to Cut Observability Costs with Synthetic Monitoring and Responsive Pipelines
    Unlock Deeper Insights: Introducing GitLab Event Integration with Mezmo
    Introducing the New Mezmo Product Homepage
    The Inconvenient Truth About AI Ethics in Observability
    Observability's Moneyball Moment: How AI Is Changing the Game (Not Ending It)
    Do you Grok It?
    Top Five Reasons Telemetry Pipelines Should Be on Every Engineer’s Radar
    Is It a Cup or a Pot? Helping You Pinpoint the Problem—and Sleep Through the Night
    Smarter Telemetry Pipelines: The Key to Cutting Datadog Costs and Observability Chaos
    Why Datadog Falls Short for Log Management and What to Do Instead
    Telemetry for Modern Apps: Reducing MTTR with Smarter Signals
    Transforming Observability: Simpler, Smarter, and More Affordable Data Control
    Datadog: The Good, The Bad, The Costly
    Mezmo Recognized with 25 G2 Awards for Spring 2025
    Reducing Telemetry Toil with Rapid Pipelining
    Cut Costs, Not Insights:   A Practical Guide to Telemetry Data Optimization
    Webinar Recap: Telemetry Pipeline 101
    Petabyte Scale, Gigabyte Costs: Mezmo’s Evolution from ElasticSearch to Quickwit
    2024 Recap - Highlights of Mezmo’s product enhancements
    My Favorite Observability and DevOps Articles of 2024
    AWS re:Invent ‘24: Generative AI Observability, Platform Engineering, and 99.9995% Availability
    From Gartner IOCS 2024 Conference: AI, Observability Data, and Telemetry Pipelines
    Our team’s learnings from Kubecon: Use Exemplars, Configuring OTel, and OTTL cookbook
    How Mezmo Uses a Telemetry Pipeline to Handle Metrics, Part II
    Webinar Recap: 2024 DORA Report: Accelerate State of DevOps
    Kubecon ‘24 recap: Patent Trolls, OTel Lessons at Scale, and Principle Platform Abstractions
    Announcing Mezmo Flow: Build a Telemetry Pipeline in 15 minutes
    Key Takeaways from the 2024 DORA Report
    Webinar Recap | Telemetry Data Management: Tales from the Trenches
    What are SLOs/SLIs/SLAs?
    Webinar Recap | Next Gen Log Management: Maximize Log Value with Telemetry Pipelines
    Creating In-Stream Alerts for Telemetry Data
    Creating Re-Usable Components for Telemetry Pipelines
    Optimizing Data for Service Management Objective Monitoring
    More Value From Your Logs: Next Generation Log Management from Mezmo
    A Day in the Life of a Mezmo SRE
    Webinar Recap: Applying a Data Engineering Approach to Telemetry Data
    Dogfooding at Mezmo: How we used telemetry pipeline to reduce data volume
    Unlocking Business Insights with Telemetry Pipelines
    Why Your Telemetry (Observability) Pipelines Need to be Responsive
    How Data Profiling Can Reduce Burnout
    Data Optimization Technique: Route Data to Specialized Processing Chains
    Data Privacy Takeaways from Gartner Security & Risk Summit
    Mastering Telemetry Pipelines: Driving Compliance and Data Optimization
    A Recap of Gartner Security and Risk Summit: GenAI, Augmented Cybersecurity, Burnout
    Why Telemetry Pipelines Should Be A Part Of Your Compliance Strategy
    Pipeline Module: Event to Metric
    Telemetry Data Compliance Module
    OpenTelemetry: The Key To Unified Telemetry Data
    Data optimization technique: convert events to metrics
    What’s New With Mezmo: In-stream Alerting
    How Mezmo Used Telemetry Pipeline to Handle Metrics
    Webinar Recap: Mastering Telemetry Pipelines - A DevOps Lifecycle Approach to Data Management
    Open-source Telemetry Pipelines: An Overview
    SRECon Recap: Product Reliability, Burn Out, and more
    Webinar Recap: How to Manage Telemetry Data with Confidence
    Webinar Recap: Myths and Realities in Telemetry Data Handling
    Using Vector to Build a Telemetry Pipeline Solution
    Managing Telemetry Data Overflow in Kubernetes with Resource Quotas and Limits
    How To Optimize Telemetry Pipelines For Better Observability and Security
    Gartner IOCS Conference Recap: Monitoring and Observing Environments with Telemetry Pipelines
    AWS re:Invent 2023 highlights: Observability at Stripe, Capital One, and McDonald’s
    Webinar Recap: Best Practices for Observability Pipelines
    Introducing Responsive Pipelines from Mezmo
    My First KubeCon - Tales of the K8’s community, DE&I, sustainability, and OTel
    Modernize Telemetry Pipeline Management with Mezmo Pipeline as Code
    How To Profile and Optimize Telemetry Data: A Deep Dive
    Kubernetes Telemetry Data Optimization in Five Steps with Mezmo
    Introducing Mezmo Edge: A Secure Approach To Telemetry Data
    Understand Kubernetes Telemetry Data Immediately With Mezmo’s Welcome Pipeline
    Unearthing Gold: Deriving Metrics from Logs with Mezmo Telemetry Pipeline
    Webinar Recap: The Single Pane of Glass Myth
    Empower Observability Engineers: Enhance Engineering With Mezmo
    Webinar Recap: How to Get More Out of Your Log Data
    Unraveling the Log Data Explosion: New Market Research Shows Trends and Challenges
    Webinar Recap: Unlocking the Full Value of Telemetry Data
    Data-Driven Decision Making: Leveraging Metrics and Logs-to-Metrics Processors
    How To Configure The Mezmo Telemetry Pipeline
    Supercharge Elasticsearch Observability With Telemetry Pipelines
    Enhancing Grafana Observability With Telemetry Pipelines
    Optimizing Your Splunk Experience with Telemetry Pipelines
    Webinar Recap: Unlocking Business Performance with Telemetry Data
    Enhancing Datadog Observability with Telemetry Pipelines
    Transforming Your Data With Telemetry Pipelines