Data Leakage Prevention (DLP)
Data Leakage Prevention (DLP)
Illyas Kooliyankal,
SVP & Chief Information Security Officer, Abu Dhabi Bank.
Email: illyaskool@gmail.com
Cyber Security Articles DATA LEAKAGE PREVENTION
Table of contents
Introduction 3
Consequences of data leakage 4
Focus areas 5
What could go wrong? 6
What is missing in DLP programs? 7
Overall summary 15
www.SecureReading.com 2
Cyber Security Articles DATA LEAKAGE PREVENTION
Introduction
CYBER SECURITY TRENDS & DATA-CENTRIC SECURITY
Cyber Security trends show that organisations are now realising the importance of data-centric
security than relying on perimeter controls only. Information is the most valuable asset that any
organisation possesses. Modern businesses entirely depend on data, irrespective of its size and
location.
Flexible and easy-to-use data is the business related technologies. Perimeters and
driver, which combine with cost-effectiveness business isolations are the subjects of the
lead to the aggressive adoption of cloud and past now.
One of the
biggest
concerns
organizations
have is Data
Leaks, but
overlooked in
the past and
till now
Multi-tenancy, Cloud, Big Data, Artificial auditing, and consultancy - everywhere easy
Intelligence, FinTechs, and IoTs - all require and quick access to information is
data and mobility. Business engagements, unavoidable.
analysis, reporting, advisory services,
The digital transformation and technological advancement across all walks of life demonstrate the
significance of protecting the organisations from data leakages.
www.SecureReading.com 3
Cyber Security Articles DATA LEAKAGE PREVENTION
The challenge in front of Cybersecurity professionals is how to protect the organisation from data
leakages without impacting genuine business activities.
Current and
future
technology
direction
and
adoption
leads to
more
avenue for
data leaks
Data Leakage Prevention (DLP) is at the heart The list of companies at the wrong end of
of any information security programs but this includes Facebook, Google and many
often overlooked due to the efforts involved bigger names. Unauthorized data leakage is
and lack of expertise available. Even today, the root cause of most of the current age
most organisations fail miserably in frauds happening in the industry.
implementing controls around data leakage.
www.SecureReading.com 4
Cyber Security Articles DATA LEAKAGE PREVENTION
Data Leaks
can lead to
significant
damages to
organization
and services
FOCUS AREAS
In this article, we look at Technological limitations or Lack of defining and
some of the critical ineffectiveness often being adhering to appropriate
mistakes around data blamed for failure in Data processes and failure in
leakage prevention Leakage Prevention (DLP) educating the people
programs and how to initiatives, but in fact, that is around it significantly
address those to meet the only one angle of the whole hinders a successful DLP
targeted Cyber Security problem. program.
objectives.
Technology alone
cannot solve the
problem, but a
holistic approach
can!
www.SecureReading.com 5
Cyber Security Articles DATA LEAKAGE PREVENTION
The absence of management approved policy and a defined framework, could lead to an
inconsistent approach and ineffective implementation of DLP controls.
Solution
The starting point for any DLP implementation is Following the DLP Policy, it is
an explicit policy with business relevance, in recommended to have a detailed Data
alignment with organisational Cyber Security Security Governance Framework to define
Policy. roles, responsibilities, activities,
procedures, data flow diagram, and data
schemes etc.
www.SecureReading.com 6
Cyber Security Articles DATA LEAKAGE PREVENTION
Most organisations lack an up-to-date means, the organisations may not have the
inventory of information assets. Firms try to control to protect it.
create the inventory by collecting the details
of only documents or on an ad-hoc basis. The essential prerequisite for any information
security assessment is an accurate asset
This method of inventory creation is a inventory at the organisation. However, most
challenge for implementing effective data of the time, it doesn't happen to be the case.
leakage prevention measures, since the lack
of effectively identifying the valuable data,
Solution
www.SecureReading.com 7
Cyber Security Articles DATA LEAKAGE PREVENTION
File Shares, Business Impact Analysis (BIA) data from the Business Continuity Team, past risk
assessment data are some of the sources.
Also, valuable
inputs can be
obtained from
Intranet/Internet,
Service Catalogues,
Configuration
Management
Database (CMDB),
SOPs (Standard
Operating
Procedures), and
Product & Services
list from business
departments.
Solution
Based on the defined policy and governance This source could include the BIAs, Fraud
framework, and identified innovative Investigation Reports, past incident reports,
approaches to execution, the source of data DLP (if existing solution) events/incidents, HR
collection needs to be listed. disciplinary records, File shares, and Intranet
portals.
InfoSec teams should have the right template for the information collection and right questions for
classifying the data. Before meeting and interviewing/collecting information from the business
departments, carry out maximum background work, and fill the templates.
www.SecureReading.com 8
Cyber Security Articles DATA LEAKAGE PREVENTION
Solution
www.SecureReading.com 9
Cyber Security Articles DATA LEAKAGE PREVENTION
5 No background work, to collect, analyse and gather services, process and information.
Most cases, data classification starts and of the data to be collected and analysed.
ends without the real benefit for the Lack of policy and procedure and an
organisation. The considerable challenge approach document is just added more
faced by the organisation is around where to troubles to this.
start, and how to proceed, and the sheer size
Solution
Define a clear roadmap for data classification, with different steps, phases, activities, ownership,
constraints, risks, challenges, and proactive solutions. Analyse the data in hand, sources of the
same, correlate those to identify as much information as possible.
6 Lack of total visibility of data - including data that is being received by the organisation.
www.SecureReading.com 10
Cyber Security Articles DATA LEAKAGE PREVENTION
Solution
Establish an effective and automated Centralised locations for incoming data,
process to ensure that all data location and detecting attachments and sensitive data
incoming and outgoing channels are being through email and other channels, and
identified and monitored. establishing a data room for information
exchange with third parties can assist
towards this.
Solution
It is always better to take step by step approach and target a certain maturity level at the initial
phase.
Define short-term goals, and work towards that. Instead of aiming the perfect and most accurate
output, set reasonable
expectations according
to business criticality
and priority.
www.SecureReading.com 11
Cyber Security Articles DATA LEAKAGE PREVENTION
Many organizations procure by market trends or vendor being sold as a magic band
data labelling and DLP sales pitch. for all security problems,
solutions without including data leakages.
understanding and defining Many case the procurement
the requirements and and implementation done
business environment without understanding the In the end, solutions may be
adequately. Selection of the functionalities required, and implemented but without
solution may be done in an without the right clarity any real business benefit or
ad-hoc manner, influenced about the solution effective control of data
objectives. Technologies leakages.
Solution
A comprehensive risk A detailed Request For Solutions need to be
assessment shall be Proposal (RFP), Business procured, that can mitigate
conducted in consideration Requirements Document the risks, in an effective and
with data leakage aspects, and Functional efficient manner, without
covering the vulnerabilities Specification Document impacting the business
and threats. Potential threat must be developed with a operations.
agents and channels of focus on target objectives
data leakages shall not be and outcomes of the
overlooked. program.
9 The absence of a defined process for DLP rule creation, and refinement
Organisations miss defining the risks and channels of data leakage and what levels of policies to
apply. Also, it could lead again to ineffective policies, and can cause business disruption, and may
not detect or respond to critical data leaks.
Business inputs and decision also may be missing, if the right visibility and discussion to define
the rules are not taken.
www.SecureReading.com 12
Cyber Security Articles DATA LEAKAGE PREVENTION
Solution
Business logic and data flow mapping could Policies can be defined to detect, prevent or
be analysed to determine the business needs asking for justification based on the
of data transfer. Authorised activities and significance of the data and the consequence
relevant stakeholder identification help to due to its leakage.
determine the genuine data transmissions
and potential leakages.
Solution
Incident Response procedure, with a
defined subcategory for data leakage
incidents, shall be defined with clear
roles and responsibilities and
escalation matrix.
Also needed is to define the violation levels, disciplinary process, reporting management, and
corrective actions - in alignment with relevant organisational policies and procedures.
11 Lack of process and commitment to continue the classification process on an ongoing basis
Even if the first time exercise is completed successfully, the real effectiveness of data classification
and leakage prevention depends on how good the company maintains and improve its data
classification process and leakage prevention mechanisms.
www.SecureReading.com 13
Cyber Security Articles DATA LEAKAGE PREVENTION
Solution
Policy and procedures must be defined with Relevant data labelling tools, its integration
assigned responsibilities to make sure that with data leakage prevention (DLP) solutions,
the data classification and leakage defined and automated processes, employee
prevention is an ongoing exercise. education and awareness are crucial for the
effectiveness of ongoing adherence to
relevant controls.
12 A scarcity of skilled resources, who understand and can effectively achieve DLP Objectives
Traditional methods and thinking cannot Lack of quality resources with holistic
produce the desired results in data experience in security and business acumen
classification and data leakage prevention and that too with an innovative mindset is a
(DLP) activities, especially considering the significant challenge for organisations.
complexity and magnitude of the work
involved.
Solution
Define the frameworks, templates, processes, and implement the right technology for data
classification and leakage prevention. Identify and hire good talent with technology and process
related skills and experience, with a mindset to learn and understand the business services and
processes.
The resource needs training and nurturing to support the organisational data leakage prevention
objectives.
Robust planning
and controls
around people is
key to the
success of Data
Leakage
Prevention
Program
www.SecureReading.com 14
Cyber Security Articles DATA LEAKAGE PREVENTION
Summary of the challenges around DLP & proposed solutions depicted in the infographics below.
www.SecureReading.com 15
Cyber Security Articles DATA LEAKAGE PREVENTION
Illyas Kooliyankal is a renowned Cyber Security Transformation Leader, serving as SVP & CISO in a
leading bank in Abu Dhabi. He is currently a member of prestigious UAE Bank Federation Information
Security Committee and former Vice President of ISC2 (UAE Chapter). Winner of many international
awards, including the EC Council (USA) Global CISO Award (Runner Up), ISACA CISO and Emirates
Airlines CISM Award and a celebrated keynote speaker at international conferences in the USA, UK,
Singapore, Dubai, etc. With more than 15 industry certifications and many whitepapers and articles,
he brings in his innovative thoughts to transform organizational security landscape.