METHODS OF GDPR FOR ENSURING DATA STORAGE SECURITY AGAINST LEAKS AND THREATS
DOI 10.31673/2412-4338.2025.027860
Abstract
This article explores the issue of protecting data storage systems from leaks and threats in the context of implementing the security requirements of the General Data Protection Regulation (GDPR). This topic is critically relevant given the increasing volumes of processed information. The authors emphasize the lack of specialized studies that examine the compliance of data storage security with GDPR standards. It has been determined that nearly all digital platforms, organizations, and institutions rely on data storage solutions, making them highly vulnerable to various threats—both external (hacker attacks, phishing, malware) and internal (human factor, intentional or unintentional leaks by employees of institutions or organizations).
This study systematizes five main categories of threats to data storage security: unauthorized access, internal data leaks, phishing attacks, malware, and issues related to improper data storage and backup management. For each category, real-world examples of security breaches from the past five years are provided, illustrating the impact of these threats on the protection of personal data. The article also examines the application of security measures such as data encryption (AES-256, TLS), access control, monitoring, pseudonymization, anonymization, backup strategies, and the automation of data processing, in accordance with various articles of the GDPR.
This research holds not only analytical but also practical value, as it provides a comprehensive perspective on how to implement both technical and organizational security measures for data storage in compliance with GDPR requirements. The study describes models for enforcing security policies, logging mechanisms, and data integrity verification. Additionally, it underscores the importance of fostering a culture of information security and raising awareness among employees.
Keywords: GDPR, data security, information leakage, data storage, encryption, threats, cybersecurity, attacks.