Top Banner
Information Leakage and Data Loss Prevention Tools By: Matthew Li June 24, 2011
21

626 Information leakage and Data Loss Prevention Tools

Dec 13, 2014

Download

Technology

Splitty

 
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: 626 Information leakage and Data Loss Prevention Tools

Information Leakage and Data Loss Prevention Tools

By: Matthew LiJune 24, 2011

Page 2: 626 Information leakage and Data Loss Prevention Tools

Agenda

• What is Information Leakage?

• Why should Executives Care?

• How do we Defend against it?

Page 3: 626 Information leakage and Data Loss Prevention Tools

Information Leakage

• Any event, either accidental or malicious, that allows an unauthorized party to access data that is not already public information

Page 4: 626 Information leakage and Data Loss Prevention Tools

Information Leakage

• How? – Negligence 40%, System glitch 36%, Malicious

attack 24%

• Why?– Advances in data storage technology– Proliferation of consumer technology in corporate

IT environment

Page 5: 626 Information leakage and Data Loss Prevention Tools

Examples of Information Leakage

• Sony Playstation network data breack– As of May 24, 2011: $171 million in costs

• 1,000 laptops go missing daily; only 3% recovered

• National Institute of Health lost a laptop with unencrypted patient data

Page 6: 626 Information leakage and Data Loss Prevention Tools

Costs of a Data Breach

• Regulatory fines• Increased government oversight• Loss of customer trust• Reputational damage• Loss of proprietary business intelligence• $6.75 million– The total data breach cost in the US in 2009

Page 7: 626 Information leakage and Data Loss Prevention Tools

DLP: What should it do?

• Manage the data• Discover sensitive data• Monitor the use of sensitive data• Protect the sensitive data

Page 8: 626 Information leakage and Data Loss Prevention Tools

Protecting Data: The 3 States

• Data in Motion– Data leaving the organization in a email or other

network

• Data at Rest– Data stored in an internal server within the organization

• Data in use– Data being used by users in the laptop, USB storage

devices, or CDs

Page 9: 626 Information leakage and Data Loss Prevention Tools

DLP in Action

• Crawls through the firm’s servers to search for sensitive data as defined by the user

• Monitors network traffic and blocks transmission of sensitive data

• Applications that limit a user’s ability to download and save sensitive data on their laptops

Page 10: 626 Information leakage and Data Loss Prevention Tools

DLP and Encryption

• Last line of defense if DLP fails to prevent sensitive information from leaving the organization

• However: DLP tools CANNOT locate, monitor, or scan encrypted data

• Organization need to allow the DLP tool to have access to the decryption keys

Page 11: 626 Information leakage and Data Loss Prevention Tools

DLP: Beyond the Technology

• Technology and applications are only as good as the people who operate it

• Educate users about data leakage consequences

• Empower employees to take responsibility of data

Page 12: 626 Information leakage and Data Loss Prevention Tools

Implementation: Analyzing Processes and Data Flows

• Analyzing business processes and data flows• Information life cycle• Understand the government regulations that

governs that data the company owns• Classify data into different categories: public,

private, sensitive, business intelligence, etc.• Recommended to use a DLP application to crawl

through the server to locate all sensitive data

Page 13: 626 Information leakage and Data Loss Prevention Tools

Implementation: Risk Assessment

• Need to prioritize data based on its risk (probability of loss * impact of loss)

• Allows for priorization– Without it, IT department and users will be

overloaded by data and data usage warnings• Exercise judgment in DLP strategy

Page 14: 626 Information leakage and Data Loss Prevention Tools

Implementation: Applying Controls

• Training employees about new processes and technologies

• Use of encryption, traffic monitoring, security over USB ports

• Testing the controls

Page 15: 626 Information leakage and Data Loss Prevention Tools
Page 16: 626 Information leakage and Data Loss Prevention Tools

Implementation: Monitoring and Improvements

• Take lessons learned to implement DLP program to other sets of data

Page 17: 626 Information leakage and Data Loss Prevention Tools

DLP Checklist

• What sensitive data do we own? • Where is this data stored?• What is the information life cycle of the data?• What are the regulatory requirements

regarding the data we own?• What is the risk prioritization of each classes

of data?

Page 18: 626 Information leakage and Data Loss Prevention Tools

DLP Checklist

• What controls are currently in place?• What additional controls do we need to

address each classes of data?• Does our staff have the capabilities to operate

the new business processes/controls/technologies?

• How do we apply the DLP program in compliance with the firm's change management policy?

Page 19: 626 Information leakage and Data Loss Prevention Tools

Limitations of DLP

• Cannot detect/monitor encrypted data without a decryption key

• Cannot interpret graphic files– Employees can “print-screen” and send it out

Page 20: 626 Information leakage and Data Loss Prevention Tools

DLP on a Tight Budget

• Communicate to employees and raise awareness

• Move critical files off laptops to an offline desktop

• Change local shared storage access settings• Talk to email host about filtering outbound

emails to authorized email addresses only

Page 21: 626 Information leakage and Data Loss Prevention Tools

Conclusion

• Real issue with real monetary costs• Requires co-operation from all business units

to identify sensitive data• Take action to secure the data with highest

risks and impacts• Requires the use of technology and people