DZone
Thanks for visiting DZone today,
Edit Profile
  • Manage Email Subscriptions
  • How to Post to DZone
  • Article Submission Guidelines
Sign Out View Profile
  • Post an Article
  • Manage My Drafts
Over 2 million developers have joined DZone.
Log In / Join
Refcards Trend Reports Events Over 2 million developers have joined DZone. Join Today! Thanks for visiting DZone today,
Edit Profile Manage Email Subscriptions Moderation Admin Console How to Post to DZone Article Submission Guidelines
View Profile
Sign Out
Refcards
Trend Reports
Events
Zones
Culture and Methodologies Agile Career Development Methodologies Team Management
Data Engineering AI/ML Big Data Data Databases IoT
Software Design and Architecture Cloud Architecture Containers Integration Microservices Performance Security
Coding Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Partner Zones AWS Cloud
by AWS Developer Relations
Culture and Methodologies
Agile Career Development Methodologies Team Management
Data Engineering
AI/ML Big Data Data Databases IoT
Software Design and Architecture
Cloud Architecture Containers Integration Microservices Performance Security
Coding
Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance
Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Partner Zones
AWS Cloud
by AWS Developer Relations
  1. DZone
  2. Data Engineering
  3. Data
  4. How to Use Varnish to Make Your Cache Infrastructure GDPR Compliant

How to Use Varnish to Make Your Cache Infrastructure GDPR Compliant

Keeping your data safe end-to-end is going to be a key part of being GDPR compliant. Read on to find out how you can leverage Varnish to help accomplish this.

Arianna Aondio user avatar by
Arianna Aondio
·
Jan. 16, 18 · Tutorial
Like (4)
Save
Tweet
Share
4.62K Views

Join the DZone community and get the full member experience.

Join For Free

All European businesses (and in fact all companies that do business with Europe) have at least one thing in common until May 25, 2018. They are all hustling to comply with the new General Data Protection Regulation (GDPR). The reason? The consequence of non-compliance can result in a hefty fine worth 4% of the company’s annual revenue. For most businesses, getting such a fine is not a risk worth taking.

What Is the GDPR?

The GDPR is considered to be the most significant piece of European data protection legislation to be introduced in Europe for decades. It replaces the European Data Protection Directive from 1995 and seeks to unify data protection laws across Europe. Its purpose is to give back control of their own personal data to private citizens. Not only do companies need to be able to show evidence that they handle personal data with respect and care, they are also strongly encouraged to encrypt that data to protect it from getting into the hands of the wrong people, for example via malicious cyber attacks.

Encryption Is the Key

It is a well-known fact that cybercrime is on the rise and the damages it causes are predicted to reach $6 trillion annually by 2021. Out of more than 9 billion data records that have been stolen since 2013 only 4% were encrypted. The lucky few who had encrypted their data records rendered the stolen data useless. This means that out of 9 billion data records, only 360 million were encrypted while the remaining 8.6 billion got used by cybercriminals.

How Can Varnish Help You Encrypt and Protect Your Data?

Varnish offers integrated SSL/TLS support with both a client-facing TLS and a backend TLS, which in combination form one modern, minimalistic, and fast TLS proxy.

Client-Side SSL/TLS

Hitch is a scalable, open-source network proxy that terminates SSL/TLS connections and forwards the unencrypted traffic to one of the available backends. It can handle up to 3,000 TLS protocol negotiations per second. Its process-per-core model architecture lets it manage tens of thousands of connections on multicore machines.

In addition to supporting TLS 1.0, 1.1, and 1.2, it also offers:

  • SNI, with and without wildcard certificates.
  • Support for HAproxy’s PROXY protocol.

Backend SSL/TLS

Varnish Plus offers SSL/TLS connections for the backend side of your architecture to safeguard it from possible attacks/leaks. This means that any request handled by Varnish will be encrypted before it’s sent to the backend server(s).

Many companies require their inter-machine connections to be TLS connections. Thus, when caches are distributed around the world to serve different regions it is of the utmost importance to encrypt data exchange between the caching nodes and the backend servers. For example, when using Varnish within a CDN the long-haul connections that are transferred through the public internet will benefit from encryption. With the upcoming GDPR adoption, this type of encryption is strongly recommended and may become crucial to protect the data your web server produces and analyzes from cyber attacks.

Total Encryption

Varnish engineers are currently working on a brand new feature, which is designed to encrypt all your caches across Varnish instances at all times. This Total Encryption feature will help prevent bugs like Cloudbleed from causing leaks of sensitive data from your caches. You can read more details about the Total Encryption feature in an upcoming blog post. And you can learn all there is to know about total encryption as well as Varnish and SSL/TLS during our upcoming webinar “How to make your cache infrastructure GDPR compliant.”

Minimizing Your GDPR-Related Vulnerabilities

Among the several new rules that make up the GDPR, there is one which states that businesses must notify their local data protection authority if they experience a security incident that affects the integrity, confidentiality, or security of the personal data that they hold. Said breach must be reported if and only if the leaked data can result in identity theft, fraud, or any other type of damages for the data subjects (the people whose personal information has been leaked).

Businesses who have implemented appropriate security measures, protecting both the leaked data and the data subjects, will not need to notify authorities about such breaches as the stolen data will be useless to the perpetrators. Thus, if the leaked data is encrypted and therefore can’t be used, then no reports of such leaks must be made.

That’s yet another good reason to lock down your data and connections to deliver a safe and performant experience for your users.

Data (computing) Cache (computing) Infrastructure

Published at DZone with permission of Arianna Aondio, DZone MVB. See the original article here.

Opinions expressed by DZone contributors are their own.

Popular on DZone

  • What To Know Before Implementing IIoT
  • Use AWS Controllers for Kubernetes To Deploy a Serverless Data Processing Solution With SQS, Lambda, and DynamoDB
  • Shift-Left: A Developer's Pipe(line) Dream?
  • Integrate AWS Secrets Manager in Spring Boot Application

Comments

Partner Resources

X

ABOUT US

  • About DZone
  • Send feedback
  • Careers
  • Sitemap

ADVERTISE

  • Advertise with DZone

CONTRIBUTE ON DZONE

  • Article Submission Guidelines
  • Become a Contributor
  • Visit the Writers' Zone

LEGAL

  • Terms of Service
  • Privacy Policy

CONTACT US

  • 600 Park Offices Drive
  • Suite 300
  • Durham, NC 27709
  • support@dzone.com
  • +1 (919) 678-0300

Let's be friends: