SlideShare a Scribd company logo
DATA LOSS PREVENTION
Stephen Kreusch
Overview
• What is DLP
• What does it look like
• DLP criticisms
• What value does DLP deliver?
• Lessons learned
• Q&A
DLP defined
Data Loss Prevention (DLP) is a computer security term referring to
systems that identify, monitor, and protect data in use (e.g.
endpoint actions), data in motion (e.g. network actions), and data
at rest (e.g. data storage) through deep content inspection,
contextual security analysis of transaction (attributes of originator,
data object, medium, timing, recipient/destination, etc.), and with
a centralized management framework.
The systems are designed to detect and prevent the unauthorized
use and transmission of confidential information.
- Wikipedia
DLP defined
• DLP as a pure play product vs. a feature
• Most organizations adopt a phased approach to implementation
Network DLP
• Fewer integration points so can be deployed
relatively quickly
• Mail
• Inline required for blocking
• Redirect to encryption gateway, etc.
• Web
• Sniffing
• ICAP
• SSL inspection
• Network monitoring / sniffing - chokepoints
• Provides wide coverage
• Useful when you don’t exercise administrative
control over all the endpoints
Endpoint and Storage DLP
• Endpoint
• Can’t deploy agents to systems you don’t already own and
manage / control
• Content matching is sometimes limited to rules based on
keywords and patterns, as opposed to fingerprints of
unstructured documents or structured data (due to size)
• Hybrid architecture with scanning duties shared between
endpoint agent and distributed network components
• Storage
• Agent-based vs. remote
• Agent intelligence vs. load
• Flexible scan control
• Gap in identifying file / content owners
Policies
Policies
• Metadata, e.g. policy group, severity, etc.
• Detection rules
• Exception rules
• Response or action to take
• Keywords / phrases
• Patterns / regular expressions
• Data identifiers
• Structured data fingerprint
• Unstructured data (document) fingerprint
Data Matching
- Securosis
Typical DLP criticisms
• DLP doesn’t prevent data leaks
• DLP doesn’t stop malicious insiders
• DLP is complex to implement and maintain
• Product and technology
• People and process
• DLP systems generate too many false positives
• Structured vs. unstructured
• Keyword and phrase
• DLP is expensive
• DLP can be bypassed
• rot13, encryption, low and slow, text vs. image
• DLP won’t deliver the expected value, won’t meet our
expectations
DLP benefits and value
• Forces security to focus on the data / information and business
processes rather than just the data containers / infrastructure
• Security develops a much better understanding of the business
• Security and business communicate in common terms
• Security visibility at senior levels is increased
• Gain more access to senior management
• Senior management ask ‘what are you doing about this’
• Fosters closer working relationship between HR, Legal, Public
Relations & Communications, Forensics, InfoSec and ITSec, etc.
• Many incidents are an opportunity for security education and
awareness
• Fraud detection and financial loss containment, brand protection
• Enables business unit information security officers
Education & awareness
Lessons learned
• People, process, technology – the order is important
• A DLP forum with broader representation is critical to provide
direction, guidance and clarity
• Centralized vs. de-centralized administration
• Policy development and refinement vs. incident handling
• IT generally needs to build the policies due to technical proficiency
• DLP policy management lifecycle
• Every organization probably has some information
that they don’t want monitored
• Written approval for new policies is key
• Information / policy owners must be clear on who will
be seeing incident data
• Technical policy development is part science, part art
Lessons learned
• Incident handling
• DLP policy ownership (e.g. new products) is key – security often doesn’t
know whether an incident is real, importance of knowing who to escalate to
• Incident handlers must be completely trustworthy
• Human resources data integration is critical to speedy incident review
(department, business unit, position, manager)
• Monitoring for one type of violation often reveals another
• Handling rules for incidents that may result in disciplinary or legal action
• Incidents often raises more questions – How did he get access to this
information? Who else has access?
Lessons learned
• Most DLP incidents highlight weak business processes rather than
malicious intent
• DLP systems can’t magically identify sensitive information
• Manage expectations – there is (still!) no silver bullet
• DLP exposes security gaps that need to be fixed through other
projects and solutions, e.g. IRM, secure file exchange, access
management
• The gaps often need to be fixed by business rather than IT
• “OK, I’ve found sensitive information on this file server. Who
owns it? Can I remove it? Now what?!”
• Information lifecycle management is the fundamental problem
that organization need to solve
Incident overview
Incident overview
2010 za con_stephen_kreusch

More Related Content

What's hot

Data Leakage Prevention (DLP)
Data Leakage Prevention (DLP)Data Leakage Prevention (DLP)
Data Leakage Prevention (DLP)
Network Intelligence India
 
DLP Data leak prevention
DLP Data leak preventionDLP Data leak prevention
DLP Data leak prevention
Ariel Evans
 
Data Loss Prevention from Symantec
Data Loss Prevention from SymantecData Loss Prevention from Symantec
Data Loss Prevention from SymantecArrow ECS UK
 
Data Leakage Prevention
Data Leakage Prevention Data Leakage Prevention
Data Leakage Prevention
Dhananjay Aloorkar
 
5 Myths About Data Loss Prevention
5 Myths About Data Loss Prevention5 Myths About Data Loss Prevention
5 Myths About Data Loss Prevention
Gary Bahadur
 
The Definitive Guide to Data Loss Prevention
The Definitive Guide to Data Loss PreventionThe Definitive Guide to Data Loss Prevention
The Definitive Guide to Data Loss Prevention
Digital Guardian
 
Dlp notes
Dlp notesDlp notes
Dlp notes
anuepcet
 
Data Leakage Presentation
Data Leakage PresentationData Leakage Presentation
Data Leakage Presentation
Mike Spaulding
 
Data Leakage Prevention
Data Leakage PreventionData Leakage Prevention
Information Leakage & DLP
Information Leakage & DLPInformation Leakage & DLP
Information Leakage & DLPYun Lu
 
Best Practices for Implementing Data Loss Prevention (DLP)
Best Practices for Implementing Data Loss Prevention (DLP)Best Practices for Implementing Data Loss Prevention (DLP)
Best Practices for Implementing Data Loss Prevention (DLP)
Sarfaraz Chougule
 
Kyle Taylor – increasing your security posture using mc afee epo
Kyle Taylor – increasing your security posture using mc afee epoKyle Taylor – increasing your security posture using mc afee epo
Kyle Taylor – increasing your security posture using mc afee epo
Kyle Taylor
 
DLP Systems: Models, Architecture and Algorithms
DLP Systems: Models, Architecture and AlgorithmsDLP Systems: Models, Architecture and Algorithms
DLP Systems: Models, Architecture and Algorithms
Liwei Ren任力偉
 
Securing Your Data for Your Journey to the Cloud
Securing Your Data for Your Journey to the CloudSecuring Your Data for Your Journey to the Cloud
Securing Your Data for Your Journey to the Cloud
Liwei Ren任力偉
 
Technology Overview - Symantec Data Loss Prevention (DLP)
Technology Overview - Symantec Data Loss Prevention (DLP)Technology Overview - Symantec Data Loss Prevention (DLP)
Technology Overview - Symantec Data Loss Prevention (DLP)
Iftikhar Ali Iqbal
 
apsec 7 Golden Rules Data Leakage Prevention / DLP
apsec 7 Golden Rules Data Leakage Prevention / DLPapsec 7 Golden Rules Data Leakage Prevention / DLP
apsec 7 Golden Rules Data Leakage Prevention / DLP
andreasschuster
 
GTB DLP - Content Aware Security Suite
GTB DLP - Content Aware Security SuiteGTB DLP - Content Aware Security Suite
GTB DLP - Content Aware Security Suite
VCW Security Ltd
 

What's hot (20)

Data Leakage Prevention (DLP)
Data Leakage Prevention (DLP)Data Leakage Prevention (DLP)
Data Leakage Prevention (DLP)
 
DLP Data leak prevention
DLP Data leak preventionDLP Data leak prevention
DLP Data leak prevention
 
Data Loss Prevention from Symantec
Data Loss Prevention from SymantecData Loss Prevention from Symantec
Data Loss Prevention from Symantec
 
Data Leakage Prevention
Data Leakage Prevention Data Leakage Prevention
Data Leakage Prevention
 
5 Myths About Data Loss Prevention
5 Myths About Data Loss Prevention5 Myths About Data Loss Prevention
5 Myths About Data Loss Prevention
 
The Definitive Guide to Data Loss Prevention
The Definitive Guide to Data Loss PreventionThe Definitive Guide to Data Loss Prevention
The Definitive Guide to Data Loss Prevention
 
Dlp notes
Dlp notesDlp notes
Dlp notes
 
DLP customer presentation
DLP customer presentationDLP customer presentation
DLP customer presentation
 
Enterprise API Security & Data Loss Prevention - Intel
Enterprise API Security & Data Loss Prevention - IntelEnterprise API Security & Data Loss Prevention - Intel
Enterprise API Security & Data Loss Prevention - Intel
 
Data Leakage Presentation
Data Leakage PresentationData Leakage Presentation
Data Leakage Presentation
 
Data Leakage Prevention
Data Leakage PreventionData Leakage Prevention
Data Leakage Prevention
 
Information Leakage & DLP
Information Leakage & DLPInformation Leakage & DLP
Information Leakage & DLP
 
Best Practices for Implementing Data Loss Prevention (DLP)
Best Practices for Implementing Data Loss Prevention (DLP)Best Practices for Implementing Data Loss Prevention (DLP)
Best Practices for Implementing Data Loss Prevention (DLP)
 
Kyle Taylor – increasing your security posture using mc afee epo
Kyle Taylor – increasing your security posture using mc afee epoKyle Taylor – increasing your security posture using mc afee epo
Kyle Taylor – increasing your security posture using mc afee epo
 
Data Leakage Prevention - K. K. Mookhey
Data Leakage Prevention - K. K. MookheyData Leakage Prevention - K. K. Mookhey
Data Leakage Prevention - K. K. Mookhey
 
DLP Systems: Models, Architecture and Algorithms
DLP Systems: Models, Architecture and AlgorithmsDLP Systems: Models, Architecture and Algorithms
DLP Systems: Models, Architecture and Algorithms
 
Securing Your Data for Your Journey to the Cloud
Securing Your Data for Your Journey to the CloudSecuring Your Data for Your Journey to the Cloud
Securing Your Data for Your Journey to the Cloud
 
Technology Overview - Symantec Data Loss Prevention (DLP)
Technology Overview - Symantec Data Loss Prevention (DLP)Technology Overview - Symantec Data Loss Prevention (DLP)
Technology Overview - Symantec Data Loss Prevention (DLP)
 
apsec 7 Golden Rules Data Leakage Prevention / DLP
apsec 7 Golden Rules Data Leakage Prevention / DLPapsec 7 Golden Rules Data Leakage Prevention / DLP
apsec 7 Golden Rules Data Leakage Prevention / DLP
 
GTB DLP - Content Aware Security Suite
GTB DLP - Content Aware Security SuiteGTB DLP - Content Aware Security Suite
GTB DLP - Content Aware Security Suite
 

Viewers also liked

The CISO’s Guide to Being Human
The CISO’s Guide to Being HumanThe CISO’s Guide to Being Human
The CISO’s Guide to Being Human
Clearswift
 
Security Services Diagram for PowerPoint by PoweredTemplate.com
Security Services Diagram for PowerPoint by PoweredTemplate.comSecurity Services Diagram for PowerPoint by PoweredTemplate.com
Security Services Diagram for PowerPoint by PoweredTemplate.com
PoweredTemplate.com
 
Cv paola aliaga 21
Cv paola aliaga 21Cv paola aliaga 21
Cv paola aliaga 21
Paola Aliaga
 
2010 za con_haroon_meer
2010 za con_haroon_meer2010 za con_haroon_meer
2010 za con_haroon_meerJohan Klerk
 
Arts railway station tv exp
Arts railway station tv expArts railway station tv exp
Arts railway station tv exp
Mezbah Uddin
 
2010 za con_ian_de_villiers
2010 za con_ian_de_villiers2010 za con_ian_de_villiers
2010 za con_ian_de_villiersJohan Klerk
 
2010 za con_daniel_cuthbert
2010 za con_daniel_cuthbert2010 za con_daniel_cuthbert
2010 za con_daniel_cuthbertJohan Klerk
 
2010 za con_ivan_burke
2010 za con_ivan_burke2010 za con_ivan_burke
2010 za con_ivan_burkeJohan Klerk
 
2010 za con_georg-christian_pranschke
2010 za con_georg-christian_pranschke2010 za con_georg-christian_pranschke
2010 za con_georg-christian_pranschkeJohan Klerk
 
2010 za con_jameel_haffejee
2010 za con_jameel_haffejee2010 za con_jameel_haffejee
2010 za con_jameel_haffejeeJohan Klerk
 
2010 za con_todor_genov
2010 za con_todor_genov2010 za con_todor_genov
2010 za con_todor_genovJohan Klerk
 
Anexo a demanda impugnacion laudo sunat comprimido
Anexo a demanda impugnacion laudo sunat   comprimidoAnexo a demanda impugnacion laudo sunat   comprimido
Anexo a demanda impugnacion laudo sunat comprimido
Paola Aliaga
 
2010 za con_roelof_temmingh
2010 za con_roelof_temmingh2010 za con_roelof_temmingh
2010 za con_roelof_temminghJohan Klerk
 
2010 za con_jurgens_van_der_merwe
2010 za con_jurgens_van_der_merwe2010 za con_jurgens_van_der_merwe
2010 za con_jurgens_van_der_merweJohan Klerk
 
Arts railway station tv exp
Arts railway station tv expArts railway station tv exp
Arts railway station tv exp
Mezbah Uddin
 
4 pliego reclamo 2015
4 pliego reclamo 20154 pliego reclamo 2015
4 pliego reclamo 2015
Paola Aliaga
 
2010 za con_barry_irwin
2010 za con_barry_irwin2010 za con_barry_irwin
2010 za con_barry_irwinJohan Klerk
 
How classification augments data loss prevention
How classification augments data loss preventionHow classification augments data loss prevention
How classification augments data loss prevention
Watchful Software
 
Data leakage detection
Data leakage detectionData leakage detection
Data leakage detection
Vikrant Arya
 
Training management
Training managementTraining management
Training management
Mezbah Uddin
 

Viewers also liked (20)

The CISO’s Guide to Being Human
The CISO’s Guide to Being HumanThe CISO’s Guide to Being Human
The CISO’s Guide to Being Human
 
Security Services Diagram for PowerPoint by PoweredTemplate.com
Security Services Diagram for PowerPoint by PoweredTemplate.comSecurity Services Diagram for PowerPoint by PoweredTemplate.com
Security Services Diagram for PowerPoint by PoweredTemplate.com
 
Cv paola aliaga 21
Cv paola aliaga 21Cv paola aliaga 21
Cv paola aliaga 21
 
2010 za con_haroon_meer
2010 za con_haroon_meer2010 za con_haroon_meer
2010 za con_haroon_meer
 
Arts railway station tv exp
Arts railway station tv expArts railway station tv exp
Arts railway station tv exp
 
2010 za con_ian_de_villiers
2010 za con_ian_de_villiers2010 za con_ian_de_villiers
2010 za con_ian_de_villiers
 
2010 za con_daniel_cuthbert
2010 za con_daniel_cuthbert2010 za con_daniel_cuthbert
2010 za con_daniel_cuthbert
 
2010 za con_ivan_burke
2010 za con_ivan_burke2010 za con_ivan_burke
2010 za con_ivan_burke
 
2010 za con_georg-christian_pranschke
2010 za con_georg-christian_pranschke2010 za con_georg-christian_pranschke
2010 za con_georg-christian_pranschke
 
2010 za con_jameel_haffejee
2010 za con_jameel_haffejee2010 za con_jameel_haffejee
2010 za con_jameel_haffejee
 
2010 za con_todor_genov
2010 za con_todor_genov2010 za con_todor_genov
2010 za con_todor_genov
 
Anexo a demanda impugnacion laudo sunat comprimido
Anexo a demanda impugnacion laudo sunat   comprimidoAnexo a demanda impugnacion laudo sunat   comprimido
Anexo a demanda impugnacion laudo sunat comprimido
 
2010 za con_roelof_temmingh
2010 za con_roelof_temmingh2010 za con_roelof_temmingh
2010 za con_roelof_temmingh
 
2010 za con_jurgens_van_der_merwe
2010 za con_jurgens_van_der_merwe2010 za con_jurgens_van_der_merwe
2010 za con_jurgens_van_der_merwe
 
Arts railway station tv exp
Arts railway station tv expArts railway station tv exp
Arts railway station tv exp
 
4 pliego reclamo 2015
4 pliego reclamo 20154 pliego reclamo 2015
4 pliego reclamo 2015
 
2010 za con_barry_irwin
2010 za con_barry_irwin2010 za con_barry_irwin
2010 za con_barry_irwin
 
How classification augments data loss prevention
How classification augments data loss preventionHow classification augments data loss prevention
How classification augments data loss prevention
 
Data leakage detection
Data leakage detectionData leakage detection
Data leakage detection
 
Training management
Training managementTraining management
Training management
 

Similar to 2010 za con_stephen_kreusch

DSS.LV - Principles Of Data Protection - March2015 By Arturs Filatovs
DSS.LV - Principles Of Data Protection - March2015 By Arturs FilatovsDSS.LV - Principles Of Data Protection - March2015 By Arturs Filatovs
DSS.LV - Principles Of Data Protection - March2015 By Arturs Filatovs
Andris Soroka
 
Aligning Application Security to Compliance
Aligning Application Security to ComplianceAligning Application Security to Compliance
Aligning Application Security to Compliance
Security Innovation
 
Logs in Security and Compliance flare
Logs in Security and Compliance flareLogs in Security and Compliance flare
Logs in Security and Compliance flare
zilberberg
 
Lecture Data Classification And Data Loss Prevention
Lecture Data Classification And Data Loss PreventionLecture Data Classification And Data Loss Prevention
Lecture Data Classification And Data Loss PreventionNicholas Davis
 
Data Classification And Loss Prevention
Data Classification And Loss PreventionData Classification And Loss Prevention
Data Classification And Loss PreventionNicholas Davis
 
Lecture data classification_and_data_loss_prevention
Lecture data classification_and_data_loss_preventionLecture data classification_and_data_loss_prevention
Lecture data classification_and_data_loss_preventionNicholas Davis
 
CNIT 125: Ch 2. Security and Risk Management (Part 1)
CNIT 125: Ch 2. Security and Risk Management (Part 1)CNIT 125: Ch 2. Security and Risk Management (Part 1)
CNIT 125: Ch 2. Security and Risk Management (Part 1)
Sam Bowne
 
1. Security and Risk Management
1. Security and Risk Management1. Security and Risk Management
1. Security and Risk Management
Sam Bowne
 
Corporate Data Secruity Best Practices and Legal Compliance (00969538xBF97D)
Corporate Data Secruity Best Practices and Legal Compliance (00969538xBF97D)Corporate Data Secruity Best Practices and Legal Compliance (00969538xBF97D)
Corporate Data Secruity Best Practices and Legal Compliance (00969538xBF97D)Paul C. Van Slyke
 
Technology Issues and Cybersecurity Strategies
Technology Issues and Cybersecurity StrategiesTechnology Issues and Cybersecurity Strategies
Technology Issues and Cybersecurity Strategies
Jack Pringle
 
The Insider Threat
The Insider ThreatThe Insider Threat
The Insider Threat
PECB
 
1. Security and Risk Management
1. Security and Risk Management1. Security and Risk Management
1. Security and Risk Management
Sam Bowne
 
CISSP - Chapter 1 - Security Concepts
CISSP - Chapter 1 - Security ConceptsCISSP - Chapter 1 - Security Concepts
CISSP - Chapter 1 - Security Concepts
Karthikeyan Dhayalan
 
Data Security Explained
Data Security ExplainedData Security Explained
Data Security Explained
Happiest Minds Technologies
 
Data Loss Prevention (DLP) - Fundamental Concept - Eryk
Data Loss Prevention (DLP) - Fundamental Concept - ErykData Loss Prevention (DLP) - Fundamental Concept - Eryk
Data Loss Prevention (DLP) - Fundamental Concept - Eryk
Eryk Budi Pratama
 
SECURITY AND CONTROL
SECURITY AND CONTROLSECURITY AND CONTROL
SECURITY AND CONTROL
shinydey
 
Tsc2021 cyber-issues
Tsc2021 cyber-issuesTsc2021 cyber-issues
Tsc2021 cyber-issues
Ernest Staats
 
CISSP Prep: Ch 1: Security Governance Through Principles and Policies
CISSP Prep: Ch 1: Security Governance Through Principles and PoliciesCISSP Prep: Ch 1: Security Governance Through Principles and Policies
CISSP Prep: Ch 1: Security Governance Through Principles and Policies
Sam Bowne
 
Just Trust Everyone and We Will Be Fine, Right?
Just Trust Everyone and We Will Be Fine, Right?Just Trust Everyone and We Will Be Fine, Right?
Just Trust Everyone and We Will Be Fine, Right?
Scott Carlson
 
Security challenges in 2017
Security challenges in 2017Security challenges in 2017
Security challenges in 2017
Etienne Liebetrau
 

Similar to 2010 za con_stephen_kreusch (20)

DSS.LV - Principles Of Data Protection - March2015 By Arturs Filatovs
DSS.LV - Principles Of Data Protection - March2015 By Arturs FilatovsDSS.LV - Principles Of Data Protection - March2015 By Arturs Filatovs
DSS.LV - Principles Of Data Protection - March2015 By Arturs Filatovs
 
Aligning Application Security to Compliance
Aligning Application Security to ComplianceAligning Application Security to Compliance
Aligning Application Security to Compliance
 
Logs in Security and Compliance flare
Logs in Security and Compliance flareLogs in Security and Compliance flare
Logs in Security and Compliance flare
 
Lecture Data Classification And Data Loss Prevention
Lecture Data Classification And Data Loss PreventionLecture Data Classification And Data Loss Prevention
Lecture Data Classification And Data Loss Prevention
 
Data Classification And Loss Prevention
Data Classification And Loss PreventionData Classification And Loss Prevention
Data Classification And Loss Prevention
 
Lecture data classification_and_data_loss_prevention
Lecture data classification_and_data_loss_preventionLecture data classification_and_data_loss_prevention
Lecture data classification_and_data_loss_prevention
 
CNIT 125: Ch 2. Security and Risk Management (Part 1)
CNIT 125: Ch 2. Security and Risk Management (Part 1)CNIT 125: Ch 2. Security and Risk Management (Part 1)
CNIT 125: Ch 2. Security and Risk Management (Part 1)
 
1. Security and Risk Management
1. Security and Risk Management1. Security and Risk Management
1. Security and Risk Management
 
Corporate Data Secruity Best Practices and Legal Compliance (00969538xBF97D)
Corporate Data Secruity Best Practices and Legal Compliance (00969538xBF97D)Corporate Data Secruity Best Practices and Legal Compliance (00969538xBF97D)
Corporate Data Secruity Best Practices and Legal Compliance (00969538xBF97D)
 
Technology Issues and Cybersecurity Strategies
Technology Issues and Cybersecurity StrategiesTechnology Issues and Cybersecurity Strategies
Technology Issues and Cybersecurity Strategies
 
The Insider Threat
The Insider ThreatThe Insider Threat
The Insider Threat
 
1. Security and Risk Management
1. Security and Risk Management1. Security and Risk Management
1. Security and Risk Management
 
CISSP - Chapter 1 - Security Concepts
CISSP - Chapter 1 - Security ConceptsCISSP - Chapter 1 - Security Concepts
CISSP - Chapter 1 - Security Concepts
 
Data Security Explained
Data Security ExplainedData Security Explained
Data Security Explained
 
Data Loss Prevention (DLP) - Fundamental Concept - Eryk
Data Loss Prevention (DLP) - Fundamental Concept - ErykData Loss Prevention (DLP) - Fundamental Concept - Eryk
Data Loss Prevention (DLP) - Fundamental Concept - Eryk
 
SECURITY AND CONTROL
SECURITY AND CONTROLSECURITY AND CONTROL
SECURITY AND CONTROL
 
Tsc2021 cyber-issues
Tsc2021 cyber-issuesTsc2021 cyber-issues
Tsc2021 cyber-issues
 
CISSP Prep: Ch 1: Security Governance Through Principles and Policies
CISSP Prep: Ch 1: Security Governance Through Principles and PoliciesCISSP Prep: Ch 1: Security Governance Through Principles and Policies
CISSP Prep: Ch 1: Security Governance Through Principles and Policies
 
Just Trust Everyone and We Will Be Fine, Right?
Just Trust Everyone and We Will Be Fine, Right?Just Trust Everyone and We Will Be Fine, Right?
Just Trust Everyone and We Will Be Fine, Right?
 
Security challenges in 2017
Security challenges in 2017Security challenges in 2017
Security challenges in 2017
 

2010 za con_stephen_kreusch

  • 2. Overview • What is DLP • What does it look like • DLP criticisms • What value does DLP deliver? • Lessons learned • Q&A
  • 3. DLP defined Data Loss Prevention (DLP) is a computer security term referring to systems that identify, monitor, and protect data in use (e.g. endpoint actions), data in motion (e.g. network actions), and data at rest (e.g. data storage) through deep content inspection, contextual security analysis of transaction (attributes of originator, data object, medium, timing, recipient/destination, etc.), and with a centralized management framework. The systems are designed to detect and prevent the unauthorized use and transmission of confidential information. - Wikipedia
  • 4. DLP defined • DLP as a pure play product vs. a feature • Most organizations adopt a phased approach to implementation
  • 5. Network DLP • Fewer integration points so can be deployed relatively quickly • Mail • Inline required for blocking • Redirect to encryption gateway, etc. • Web • Sniffing • ICAP • SSL inspection • Network monitoring / sniffing - chokepoints • Provides wide coverage • Useful when you don’t exercise administrative control over all the endpoints
  • 6. Endpoint and Storage DLP • Endpoint • Can’t deploy agents to systems you don’t already own and manage / control • Content matching is sometimes limited to rules based on keywords and patterns, as opposed to fingerprints of unstructured documents or structured data (due to size) • Hybrid architecture with scanning duties shared between endpoint agent and distributed network components • Storage • Agent-based vs. remote • Agent intelligence vs. load • Flexible scan control • Gap in identifying file / content owners
  • 8. Policies • Metadata, e.g. policy group, severity, etc. • Detection rules • Exception rules • Response or action to take • Keywords / phrases • Patterns / regular expressions • Data identifiers • Structured data fingerprint • Unstructured data (document) fingerprint
  • 10. Typical DLP criticisms • DLP doesn’t prevent data leaks • DLP doesn’t stop malicious insiders • DLP is complex to implement and maintain • Product and technology • People and process • DLP systems generate too many false positives • Structured vs. unstructured • Keyword and phrase • DLP is expensive • DLP can be bypassed • rot13, encryption, low and slow, text vs. image • DLP won’t deliver the expected value, won’t meet our expectations
  • 11. DLP benefits and value • Forces security to focus on the data / information and business processes rather than just the data containers / infrastructure • Security develops a much better understanding of the business • Security and business communicate in common terms • Security visibility at senior levels is increased • Gain more access to senior management • Senior management ask ‘what are you doing about this’ • Fosters closer working relationship between HR, Legal, Public Relations & Communications, Forensics, InfoSec and ITSec, etc. • Many incidents are an opportunity for security education and awareness • Fraud detection and financial loss containment, brand protection • Enables business unit information security officers
  • 13. Lessons learned • People, process, technology – the order is important • A DLP forum with broader representation is critical to provide direction, guidance and clarity • Centralized vs. de-centralized administration • Policy development and refinement vs. incident handling • IT generally needs to build the policies due to technical proficiency • DLP policy management lifecycle • Every organization probably has some information that they don’t want monitored • Written approval for new policies is key • Information / policy owners must be clear on who will be seeing incident data • Technical policy development is part science, part art
  • 14. Lessons learned • Incident handling • DLP policy ownership (e.g. new products) is key – security often doesn’t know whether an incident is real, importance of knowing who to escalate to • Incident handlers must be completely trustworthy • Human resources data integration is critical to speedy incident review (department, business unit, position, manager) • Monitoring for one type of violation often reveals another • Handling rules for incidents that may result in disciplinary or legal action • Incidents often raises more questions – How did he get access to this information? Who else has access?
  • 15. Lessons learned • Most DLP incidents highlight weak business processes rather than malicious intent • DLP systems can’t magically identify sensitive information • Manage expectations – there is (still!) no silver bullet • DLP exposes security gaps that need to be fixed through other projects and solutions, e.g. IRM, secure file exchange, access management • The gaps often need to be fixed by business rather than IT • “OK, I’ve found sensitive information on this file server. Who owns it? Can I remove it? Now what?!” • Information lifecycle management is the fundamental problem that organization need to solve