Overview
The General Data Protection Regulation (GDPR) is a comprehensive data privacy law that applies to organizations processing personal data of EU residents. Wazuh helps organizations monitor technical and organizational measures required for GDPR compliance through security event detection and data protection controls.GDPR Requirements Coverage
Wazuh maps security events to GDPR articles and requirements through therule.gdpr field. The compliance requirements are defined in:
Source: plugins/main/common/compliance-requirements/gdpr-requirements.ts
Data Security Principles (Chapter II)
II_5.1.f - Confidentiality and Integrity
II_5.1.f - Confidentiality and Integrity
Ensure the ongoing confidentiality, integrity, availability and resilience of processing systems and services, verifying its modifications, accesses, locations and guarantee the safety of them. File sharing protection and file sharing technologies that meet the requirements of data protection.Technical Measures:
- System integrity monitoring
- Access control verification
- File sharing security
- Encryption verification
- Backup and disaster recovery
Rights of Data Subjects (Chapter III)
III_14.2.c - Right to Restriction
III_14.2.c - Right to Restriction
Restrict the processing of personal data temporarily.Technical Measures:
- Data processing controls
- Temporary access restrictions
- Processing activity logs
III_17 - Right to Erasure
III_17 - Right to Erasure
Permanently erase personal information of a subject (“right to be forgotten”).Technical Measures:
- Secure data deletion
- Erasure verification
- Backup purging
- Audit trail of deletions
Controller and Processor Obligations (Chapter IV)
IV_24.2 - Accountability
IV_24.2 - Accountability
Be able to demonstrate compliance with the GDPR by complying with data protection policies.Technical Measures:
- Policy enforcement monitoring
- Compliance evidence collection
- Audit trail generation
- Documentation of technical measures
IV_28 - Processor Security
IV_28 - Processor Security
Ensure data protection during processing, through technical and organizational measures.Technical Measures:
- Processing activity monitoring
- Security control implementation
- Third-party processor oversight
- Data processing agreements enforcement
IV_30.1.g - Records of Processing Activities
IV_30.1.g - Records of Processing Activities
It is necessary to keep all processing activities documented, to carry out an inventory of data from beginning to end and an audit, in order to know all the places where personal and sensitive data are located, processed, stored or transmitted.Technical Measures:
- Data flow mapping
- Processing activity logging
- Data location tracking
- System inventory management
IV_32.1.c - Data Loss Prevention
IV_32.1.c - Data Loss Prevention
Data Loss Prevention (DLP) capabilities to examine data flows and identify personal data that is not subject to adequate safeguards or authorizations. DLP tools can block or quarantine such data flows. Classify current data appropriately to determine specific categories of data that will be subject to the GDPR.Technical Measures:
- DLP system monitoring
- Data classification enforcement
- Unauthorized data transfer detection
- Data flow analysis
- Quarantine and blocking controls
IV_32.2 - Access Control and Monitoring
IV_32.2 - Access Control and Monitoring
Account management tools that closely monitor actions taken by standard administrators and users who use standard or privileged account credentials are required to control access to data.Technical Measures:
- Privileged access monitoring
- User activity tracking
- Account management logging
- Access control enforcement
- Anomalous behavior detection
IV_33 - Data Breach Notification
IV_33 - Data Breach Notification
Notify the supervisory authority of a violation of the data in 72 hours and in certain cases, the injured parties.Technical Measures:
- Breach detection systems
- Incident response automation
- Notification workflow systems
- Incident timeline tracking
IV_35.1 - Data Protection Impact Assessment (DPIA)
IV_35.1 - Data Protection Impact Assessment (DPIA)
Perform a data protection impact evaluation for high risk processes. Implement appropriate technical measures to safeguard the rights and freedoms of data subjects, informed by an assessment of the risks to these rights and freedoms.Technical Measures:
- Risk assessment automation
- High-risk processing identification
- Technical safeguard implementation
- Control effectiveness monitoring
IV_35.7.d - Security and Incident Response
IV_35.7.d - Security and Incident Response
Capabilities for identification, blocking and forensic investigation of data breaches by malicious actors, through compromised credentials, unauthorized network access, persistent threats and verification of the correct operation of all components.Network perimeter and endpoint security tools to prevent unauthorized access to the network, prevent the entry of unwanted data types and malicious threats. Anti-malware and anti-ransomware to prevent malware and ransomware threats from entering your devices.A behavioral analysis that uses machine intelligence to identify people who do anomalous things on the network, in order to give early visibility and alert employees who start to become corrupt.Technical Measures:
- Intrusion detection/prevention systems
- Endpoint security monitoring
- Anti-malware protection
- Behavioral analytics
- Forensic logging
- Network segmentation
- Credential compromise detection
Using the GDPR Dashboard
Accessing GDPR Compliance View
Dashboard Components
The GDPR dashboard includes:- Top articles by alert count - Identifies areas needing attention
- Chapter distribution - Shows compliance across GDPR chapters
- Data breach indicators - Highlights potential Article 33 violations
- Access control violations - Tracks Article 32 compliance
plugins/main/public/components/overview/gdpr/dashboards/dashboard-panels.ts
Data Source Implementation
The GDPR data source filters events by therule.gdpr field:
plugins/main/public/components/common/data-source/pattern/events/gdpr/gdpr-data-source.ts:5
Event Columns
GDPR events table displays:- Timestamp
- Rule description
- GDPR article (
rule.gdprfield) - Alert level
- Data subject impact
- Agent information
plugins/main/public/components/overview/gdpr/events/gdpr-columns.tsx:8
Compliance Reporting for GDPR
GDPR Article Naming Convention
GDPR requirements follow the pattern[CHAPTER]_[ARTICLE].[PARAGRAPH].[POINT]:
- II_5.1.f - Chapter II (Principles), Article 5, Paragraph 1, Point (f)
- III_14.2.c - Chapter III (Rights), Article 14, Paragraph 2, Point (c)
- IV_32.1.c - Chapter IV (Controller/Processor), Article 32, Paragraph 1, Point (c)
Generating GDPR Reports
Filter by Article
Focus on specific GDPR articles relevant to your audit (e.g., Article 32 for security, Article 33 for breach notification).
GDPR-Specific Use Cases
Article 32: Security of Processing
Monitor technical measures for data security:Pseudonymisation & Encryption
Track encryption usage and pseudonymisation controls through security events.
Confidentiality Monitoring
Monitor unauthorized access attempts and data confidentiality violations.
Integrity Protection
Use file integrity monitoring to ensure data integrity (Article II_5.1.f).
Availability Assurance
Track system availability and resilience through monitoring events.
Article 33: Breach Notification
Wazuh helps meet the 72-hour notification requirement:- Real-time breach detection - Immediate alerts for security incidents
- Incident timeline - Automatic logging of breach discovery time
- Impact assessment - Data on affected systems and potential data subjects
- Evidence collection - Forensic data for breach notification documentation
Article 35: Data Protection Impact Assessment
Monitor high-risk processing activities:- Identify processing that requires DPIA through alert patterns
- Track implementation of risk mitigation measures
- Monitor effectiveness of technical safeguards
- Document security controls for DPIA evidence
Data Subject Rights Monitoring
Wazuh supports monitoring technical implementation of data subject rights:| Right | GDPR Article | Wazuh Monitoring |
|---|---|---|
| Right to erasure | III_17 | Data deletion events, backup purging logs |
| Right to restriction | III_14.2.c | Processing restriction implementation logs |
| Right to portability | Article 20 | Data export and transfer monitoring |
| Right to rectification | Article 16 | Data modification and correction logs |
Integration with Other Modules
GDPR requirements appear in:- MITRE ATT&CK view - Maps data protection to attack techniques
- File Integrity Monitoring - Supports Article II_5.1.f (integrity)
- Vulnerability Detection - Identifies security risks (Article 32)
plugins/main/public/components/overview/mitre/framework/components/techniques/components/rule-details.tsx:114
Requirement Data Structure
The complete GDPR requirements mapping:plugins/main/common/compliance-requirements/gdpr-requirements.ts:12
Best Practices
Focus on Article 32
Prioritize security of processing measures - the technical foundation of GDPR.
Monitor Article 33 Triggers
Set up alerts for potential data breaches to enable 72-hour notification.
Document Technical Measures
Use Wazuh logs as evidence of Article 32 technical measures implementation.
Regular DPIA Updates
Review high-risk processing alerts to update DPIAs (Article 35).
Related Documentation
- Compliance Overview
- [File Integrity Monitoring(/modules/file-integrity-monitoring) - Supports Article II_5.1.f
- [Log Analysis(/modules/threat-hunting) - Supports Article 30 (records of processing)
- [Incident Response(/guides/threat-analysis) - Supports Article 33 (breach notification)