DLP Concepts and Deployment
DLP identifies sensitive data by content analysis: pattern matching (SSN format: XXX-XX-XXXX), keyword matching (confidential, trade secret), fingerprinting (hash matching of specific documents), and machine learning classification. When sensitive data is detected in an unauthorized channel, DLP can alert, block, or encrypt the transmission.
Network DLP: inline appliance or cloud service that inspects outbound traffic (email, web uploads, cloud sync). Monitors and blocks sensitive data leaving the network. Requires SSL inspection to examine HTTPS traffic. Email DLP: inspects email content and attachments before sending — blocks or quarantines emails containing sensitive data. Endpoint DLP: agent on workstations that monitors data written to USB drives, copied to cloud sync folders, or sent via unauthorized channels.
Common DLP policies: block SSNs/credit card numbers in outbound email. Prevent confidential documents from being uploaded to personal cloud storage (Google Drive, Dropbox). Alert when large volumes of data are transferred to external destinations (unusual exfiltration indicator). Block USB drive usage for classified data.
DLP Integration
DLP is most effective when integrated with: SIEM (DLP events appear alongside other security data for correlation), CASB (Cloud Access Security Broker — extends DLP to SaaS applications like Salesforce and Office 365), email gateway (inspects email at the server level), endpoint management (enforces policies on all devices). Data classification is the foundation — data must be labeled (Public, Internal, Confidential, Secret) before DLP policies can enforce appropriate handling.