Skip to content

Ops 401 Class 08

Bill Kachersky edited this page Oct 13, 2021 · 1 revision

A Definition of Data Loss Prevention

WHAT IS DATA LOSS PREVENTION (DLP)?

Data loss prevention (DLP) is a set of tools and processes used to ensure that sensitive data is not lost, misused, or accessed by unauthorized users. DLP software classifies regulated, confidential and business-critical data and identifies violations of policies defined by organizations or within a predefined policy pack, typically driven by regulatory compliance such as HIPAA, PCI-DSS, or GDPR. Once those violations are identified, DLP enforces remediation with alerts, encryption, and other protective actions to prevent end-users from accidentally or maliciously sharing data that could put the organization at risk. Data loss prevention software and tools monitor and control endpoint activities, filter data streams on corporate networks, and monitor data in the cloud to protect data at rest, in motion, and in use. DLP also provides reporting to meet compliance and auditing requirements and identify areas of weakness and anomalies for forensics and incident response.


3 MAIN USES CASES FOR DLP

  1. Personal Information Protection / Compliance: Does your organization collect and store Personally Identifiable Information (PII), Protected Health Information (PHI), or payment card information (PCI)? If so, you are more than likely subject to compliance regulations, such as HIPAA (for PHI) and GDPR (for personal data of EU residents), that require you to protect your customers’ sensitive data. DLP can identify, classify, and tag sensitive data and monitor activities and events surrounding that data. In addition, reporting capabilities provide the details needed for compliance audits.

  2. IP Protection: Does your organization have important intellectual property and trade or state secrets that could put your organization’s financial health and brand image at risk if lost or stolen? DLP solutions like Digital Guardian that use context-based classification can classify intellectual property in both structured and unstructured forms. With policies and controls in place, you can protect against unwanted exfiltration of this data.

  3. Data Visibility: Is your organization seeking to gain additional visibility into data movement? A comprehensive enterprise DLP solution can help you see and track your data on endpoints, networks, and the cloud. This will provide you with visibility into how individual users within your organization interact with data.


7 TRENDS DRIVING DLP ADOPTION

  1. The Growth of the CISO Role: More companies have hired and are hiring Chief Information Security Officers (CISOs), who often report to the CEO. CEOs want to know the game plan for preventing data leaks. DLP provides clear business value in this regard and gives CISOs the necessary reporting capabilities to provide regular updates to the CEO.

  2. Evolving Compliance Mandates: Global data protection regulations constantly change and your organization needs to be adaptable and prepared. Within the past couple years, lawmakers in the EU and New York State, respectively, have passed the GDPR and NYDFS Cybersecurity Regulation, both of which have tightened data protection requirements. DLP solutions allow organizations the flexibility to evolve with changing global regulations.

  3. There are More Places to Protect Your Data: Increased use of the cloud, complicated supply chain networks, and other services you no longer have full control over has made protecting your data more complex. Visibility into the events and context of events that surround your data before it leaves your organization is important in preventing your sensitive data from getting into the wrong hands.

  4. Data Breaches are Frequent and Large: Adversaries from nation states, cyber criminals and malicious insiders are targeting your sensitive data for a variety of motives, such as corporate espionage, personal financial gain, and political advantage. DLP can protect against all kinds of adversaries, malicious or not.

  5. Your Organization’s Stolen Data is Worth More: Stolen data is often sold on the Dark Web, where individuals and groups can purchase and use it for their own benefit. With certain data types selling for up to a few thousand dollars, there is a clear financial incentive for data theft.

  6. There’s More Data to Steal: The definition of what is sensitive data has expanded over the years. Sensitive data now includes intangible assets, such as pricing models and business methodologies.

  7. There’s a Security Talent Shortage: The security talent shortage is not going away anytime soon and you’ve probably already felt its impact on your own organization.

DATA LOSS PREVENTION BEST PRACTICES

Determine your primary data protection objective. Are you trying to protect your intellectual property, gain more visibility into your data, or meet regulatory compliance? With a main objective in place, it’s easier to determine the most appropriate DLP deployment architecture or combination of architectures. The four main DLP deployment architectures are: Endpoint DLP, Network DLP, Discovery, and Cloud.

DLP is not a security-only decision. If you don’t have an approved budget for a DLP program yet, you need buy-in from other executives like the CFO and the CEO. Leverage the pain points of different business units to show how DLP can address them.

When researching DLP vendors, establish your evaluation criteria:

  • What types of deployment architectures are offered?
  • Do they support Windows, Linux, and OS X with feature parity?
  • What deployment options do they offer? Do they provide managed services?
  • Do you need to defend against mainly internal or external threats? Or both?
  • Do you need to perform content- or context-based inspection and classification? Will your users be able to self-classify documents? Do you need a blend of multiple methods?
  • Are you most concerned with protecting structured or unstructured data?
  • Do you plan to see and enforce data movement based on policies, events, or users?
  • What compliance regulations are you bound by? What new regulations are on the horizon?
  • Who are their technology alliance partners and what technologies would you like to integrate with your DLP?
  • How quickly do you need to deploy your DLP program?
  • Will you need additional staff to manage your DLP program?

Clearly define the roles and responsibilities of the individuals involved in your organization’s DLP program. Building out role-based rights and duties will provide checks and balances.

Start with a clearly defined quick win. Organizations often try complicated initial rollout plans or try to solve too many use cases at once. Define your initial approach and set objectives that are fast and measurable. You should either take the project approach, where you narrow in and focus on a specific data type, or the data visibility approach, where your primary focus is discovery and automated classification of sensitive data to control egress.

Work together with business unit heads to define the DLP policies that will govern your organization’s data. This will help ensure that the different business units are aware of the policies in place and how they might be impacted.

Document your processes carefully. This will help you with consistent application of policies, give you a document of record for when reviews are needed, and will also be helpful when onboarding new team members or employees.

DLP is a program, not a product. Installing a DLP tool is just the first step in Data Loss Prevention. While you can get quick wins, understanding that DLP is a program to be continuously worked on will help you achieve lasting success. DLP is a constant process of understanding your data and how users, systems, and events interact with that data to better protect it.


THREE FINAL TAKEAWAYS

  1. Data protection is everyone’s job. “Everyone in a company is responsible for upholding data security standards. While the IT department does the majority of the everyday work with these systems and processes, stakeholders across your organization influence security policy and implementation.

  2. Encryption is important. “Security is more than encryption, of course. But encryption is a critical component of security. While it's mostly invisible, you use strong encryption every day, and our Internet-laced world would be a far riskier place if you did not.

  3. Be mindful of insider threats. “I’ve worked with organizations to prevent insider threats as well as in response to incidences. In my experience, the notion of it being ’easy’ to deter and detect insider threats is only the case if organizations are proactive about their approach in the first place.

all content above cited from digital guardian


This material is relevant to our class content because it outlines another tool we can leverage toward becoming effective as cybersecurity professionals.

Clone this wiki locally