Abstract
On the 16 October 2020 ICO serve a penalty notice to the British Airways plc after an investigation for 20 million of pound.
The ICO investigation found the airline was processing a significant amount of personal data without adequate security measures in place.
This failure broke data protection law and, subsequently, British Airways was the subject of a cyber-attack during 2018, which it did not detect for more than two months.
ICO investigators found British Airways ought to have identified weaknesses in its security and resolved them with security measures that were available at the time.
Addressing these security issues would have prevented the 2018 cyber-attack being carried out in this way, investigators concluded, and decide to elevate the sanctions in breach of Section 155, of the Data protection Act 2018.
This paper summarise and better explain the logic of the decision, extracting the best practices applicable to the case.
1. introduction
In summary, between 22 June and 5 September 2018, a malicious actor ("the Attacker") gained access to an internal web application of the British Airways system and compromised the credential for a Citrix remote access gateway ("CAG").
Soon after obtained the access the attacker edited a JavaScript file on the British Airways website, and proceeded with an exfiltration of cardholder data from the website to an external domain "$www.BAways.com$".
British Airways, acted promptly in notifying the Commissioner of the Attack on 6 September 2018 and thereby complied with its obligations in this respect, and also if the Commissioner considered that BA has cooperated fully with the investigation has elevated the sanctions.
The penalty have been elevated because the Commissioner has found that in comparison with what the market offer British Airways wasn't prepare to process the personal data of its customers in a manner that ensured appropriate security of the data, including:
All mandatory requirements expressed by Article 5(1)(f) and by article 32 of the GDPR.
In conclusion, the infringement constitute serious failure to comply with GDPR, the ICO expected a strong and more coherent data protection framework from the companies.
In particular, is mandatory processed the customer data in a manner that ensures appropriate security of the personal data, including protection against:
Failing is "per se" a breach of the legislation framework, art.5 of GDPR make clear that the controller shall be responsible for compliance with, unless they demonstrate to have taken the appropriate steps to prevent those event. And wasn't the case with British Airways.
2. Personal Data involved in the Failure
The Attacker is believed to have potentially accessed the personal data of approximately 429.612 individuals in particular:
Those data are enough to have access to the owner of those cards and potentially causing even greater damage, in the foreseeability future.
3. How Corporate should have reacted
There were numerous measures BA could have used to mitigate or prevent the risk of an attacker being able to access the BA network, for example:
The ICO found that none of these measures would have entailed excessive cost or technical barriers, with some also available through the Microsoft Operating System used by BA.
In fact, before elevating the sanctions ICO has evaluate:
Concluding anyway for the 20 million sanctions.
However, Since the attack, BA has made considerable improvements to its IT security.
5. Best practices in preventions
Any Company should have a Security Risk Implementation plan in place which include:
All of those practice were also suggested by the Cyber Security Council since 2018.
October 2020
by Daniele Lupi