WikiFrameworksEU GDPRSecurity of Processing

Security of Processing

Updated: 2026-02-23

Plain English Translation

GDPR Article 32 requires organizations to implement appropriate technical and organisational measures to protect personal data against accidental or unlawful destruction, loss, alteration, or unauthorized disclosure. This involves assessing risks and applying security controls like encryption, access management, and backups to ensure the confidentiality, integrity, availability, and resilience of processing systems. Organizations must also regularly test and evaluate the effectiveness of these security requirements to demonstrate GDPR Article 32 compliance.

Executive Takeaway

GDPR Article 32 mandates that organizations implement risk-based security measures, such as encryption and access controls, to protect personal data and ensure system resilience.

ImpactHigh
ComplexityHigh

Why This Matters

  • Prevents data breaches that lead to severe regulatory fines and reputational damage under GDPR security requirements.
  • Ensures business continuity and protects customer trust by maintaining data confidentiality, integrity, availability, and resilience.

What “Good” Looks Like

  • Establishing a comprehensive information security management system (ISMS) with regular vulnerability scanning and security testing and evaluation; tools like WatchDog Security's Compliance Center can help track control ownership, map evidence, and identify gaps.
  • Enforcing encryption of personal data at rest and in transit, alongside strictly managed access controls and disaster recovery capabilities.

It requires controllers and processors to implement appropriate technical and organisational measures to ensure a level of security appropriate to the risks. This includes protecting personal data from unauthorized access, accidental loss, and destruction to maintain overall security of processing.

These are context-specific security controls tailored to the organization's risk level. Examples include encryption, pseudonymization, multi-factor authentication, regular security testing, and robust access management policies.

While not strictly mandated in every single case, Article 32 explicitly highlights the pseudonymisation and encryption of personal data as appropriate measures to mitigate risks, making it highly recommended for compliance.

Organizations must conduct risk assessments considering the state of the art, implementation costs, and the nature, scope, context, and purposes of processing, as well as the severity of potential harm to data subjects if a breach occurs.

Organizations should enforce the principle of least privilege using role-based access control, require multi-factor authentication, and perform regular user access reviews to meet GDPR access control requirements under Article 32.

Organizations must have the ability to restore the availability and access to personal data in a timely manner in the event of a physical or technical incident. This necessitates reliable backups and a tested business continuity and disaster recovery plan.

Article 32 requires a process for regularly testing, assessing, and evaluating the effectiveness of security measures. This typically involves continuous vulnerability scanning, regular penetration testing, and periodic internal audits.

Organizations should maintain an information security policy, risk assessment reports, evidence of encryption, backup logs, access control reviews, and results from security testing and table-top exercises to demonstrate GDPR Article 32 compliance. Tools like WatchDog Security's Compliance Center can centralize this evidence, link it to the control, and support audit-ready reporting over time.

Both controllers and processors share the direct legal obligation under Article 32 to implement appropriate security measures. Processors must securely process data on behalf of the controller and assist them in ensuring overall compliance.

Common gaps include failing to encrypt sensitive personal data, poor access controls leading to unauthorized disclosure, lacking multi-factor authentication, and failing to patch known vulnerabilities promptly.

GDPR Article 32 is often difficult to evidence because security measures span multiple teams and systems. Tools like WatchDog Security's Compliance Center can map required safeguards to control owners, automate evidence collection where feasible, and highlight gaps so security and compliance teams can track progress over time.

Regular testing and evaluation under Article 32 often depends on consistent vulnerability intake, triage, and remediation reporting. Tools like WatchDog Security's Vulnerability Management can ingest findings from multiple scanners, support triage workflows, and provide MTTR analytics to help demonstrate that vulnerabilities are tracked and resolved in line with risk.

GDPR Art. 32

"Taking into account the state of the art, the costs of implementation and the nature, scope, context and purposes of processing as well as the risk of varying likelihood and severity for the rights and freedoms of natural persons, the controller and the processor shall implement appropriate technical and organisational measures to ensure a level of security appropriate to the risk, including inter alia as appropriate: (a) the pseudonymisation and encryption of personal data; (b) the ability to ensure the ongoing confidentiality, integrity, availability and resilience of processing systems and services; (c) the ability to restore the availability and access to personal data in a timely manner in the event of a physical or technical incident; (d) a process for regularly testing, assessing and evaluating the effectiveness of technical and organisational measures for ensuring the security of the processing."

VersionDateAuthorDescription
1.0.02026-02-23WatchDog Security GRC TeamInitial publication