Building Your DLP Strategy & Process: Whitepaper
Building Your DLP Strategy & Process: Whitepaper
Contents
Introduction
3 DLP Planning: Organize Your Project for Success
3 DLP Planning: Clarify User Profiles
4 DLP Implementation: Phases of a Successful Project
5 Phase 1: Define Success & Freeze Project Scope
5 Phase 2: Identify Critical DLP User Profiles
5 Phase 3: Identify Sensitive Information & Business Requirements
5 Phase 4: Design & Manage DLP Policies
5 Phase 5: Fine-Tune Policies and Incident Management
6 Phase 6: Implement Awareness & Training Programs
6 Phase 7: Manage the Project & Track Progress
www.forcepoint.com 2
Building Your DLP Strategy & Process
1
highlighted throughout this document, DLP revolves around the PROJECT LEADERSHIP
• Program Management
people, the processes and the technology products you use. It’s
• Steering Committee
critical to identify clear roles and responsibilities for individuals,
create effective processes to detect and respond to incidents and
configure your tools accurately to identify and prevent data loss.
2
PROJECT MANAGEMENT
Establish ample executive support and participation. Active • Quality Management
involvement from business and operating units across your • Project Management Office
organization will create more user acceptance of the transition
toward a more secure environment. It will also ensure that
business input is provided at key stages — which is paramount for
3
a successful DLP program. PROJECT TEAM
• Change Management
• Functional Workstream
Define sensitive data. Implementing DLP technology and controls • Solution Workstream
universally across an organization can have an adverse and • Infrastructure Workstream
costly impact on the business. By defining sensitive data up front
and aligning the program to protect their most sensitive data,
organizations can ensure that resources are deployed to manage Steering Committee — This committee should be headed by the
the most important risks. Chief Information Security Officer (CISO) or Chief Information
Officer (CIO) and include all important stakeholders in the project.
Responsibilities include:
Reinforce awareness for end users. In their day-to-day work, end
users are mostly confronted by the limitations imposed by DLP. • Own and oversee implementation of the project’s
Without an awareness of the reasons behind additional security underlying strategies
measures, employees will be more likely to seek work-arounds
• Define the project’s connection to the enterprise’s overall
to bypass controls. Increased awareness also helps users take
business plans and direction
responsibility for classifying and protecting critical information
and assets. • Provide and interpret policy
3
Building Your DLP Strategy & Process
Quality Management — Responsibilities include: Infrastructure Workstream — This function addresses technical
deliverables relating to DLP system readiness, management,
• Assess and review project requirements and activities for
maintenance and support. They configure policies and perform
quality planning and controls
operational tasks on the DLP solution itself.
• Ensure adherence to project timelines Other responsibilities include:
• Review project progress and coordinate with business • Interact with vendor support team
functions as required
• Create technical documentation
Change Management — Responsibilities include:
DLP PLANNING: CLARIFY USER PROFILES
• Control changes to the project plan
For a DLP roll-out to be effective, it needs clearly defined roles for
• Adapt and implement effective new operational changes key participants, from line-of-business personnel to technical DLP
required to make the project successful specialists to end users.
• Conduct training for business teams DLP Product Administrator — Infrastructure Workstream
This team member — usually from the IT Security organization —
must be capable of installing, administrating and supporting the
DLP solution itself, which will require them to have completed DLP
product training and to possess relevant IT knowledge. After the
project is complete, this person will continue to write new policies
and modify existing ones in the DLP product’s management console
as instructed by the DLP Consultant.
www.forcepoint.com 4
Building Your DLP Strategy & Process
Business Function Incident Manager Phase 3: Identify Sensitive Information & Business Requirements
This member’s role is to interpret, analyze, manage and remediate Even though it relies on advanced technology, DLP is ultimately a
DLP incidents as they arise. In practice, this means reading business strategy meant to reduce risks for your organization.
reports generated by the DLP solution and determining whether a That’s why it’s so important for DLP project stakeholders to hold
non-conforming incident merits further investigation or escalation discussions with Business Function Leads and Business Function
to the Critical Incident Manager or other management. In carrying Incident Managers about which information is critical for each
out this role, the Incident Manager must be familiar with the critical business function and what the operational requirements are for
business processes of their business function, as well as have implementing DLP.
detailed knowledge of the organization’s incident management
and remediation framework. During the project, they will also
review and comment on policies, workflows and metrics and
assist with end-user training.
End Users
During the project, the team should recruit personnel who are
interested in being pilot users to provide feedback on DLP issues
specific to each business function, and to participate in user
acceptance testing (UAT). These pilot users should use the software
applications and have the access privileges of typical end users.
www.forcepoint.com 5
Building Your DLP Strategy & Process
Phase 5: Fine-Tune Policies and Incident Management Phase 6: Implement Awareness & Training Programs Awareness
This phase is crucial for creating an effective policy framework Your DLP solution can be used as a great tool to spread awareness
and configuring DLP policies in enforcement mode. It starts with about your organization’s data security policies, and to understand
understanding why DLP incidents occur, because not every data high-risk users who violate DLP policies because of ignorance.
leak is either intentional or malicious. Leaks fall into four main Options for raising awareness include:
types, and each is best addressed by a different strategy:
• Display pop-ups to end users when they are about to
violate policy
Accidental Leak: At least 60% incidents arise from employee
ignorance, when someone is unaware of the risks of sharing critical • Send notification emails to end users (and optionally
information. The remedy is employee education.
managers) after they have violated policy
Malicious Outsider: These arise when systems are infected with • Allow users to enter a justification message before
malware and attempt to exfiltrate data. The remediation strategy is
performing an action which may violate policy
to detect and remediate, identifying machines that are affected and
then cleaning those machines. These awareness options can significantly reduce incidents
triggered by end user negligence.
www.forcepoint.com 6
Building Your DLP Strategy & Process
• Data Classification & Policy Training — Targeted for Monthly Reports to Senior Management
personnel that will be creating new policies and modifying
Top policy category violations
existing ones. This training is relevant for Business Function
Leads, DLP Consultants, DLP Product Administrators and, Top users and business processes that violate policies
optionally, Business Function Incident Managers.
Reports with sample incidents highlighting business risks for
• End User Training — It’s very important to keep end users each business function
aware of the processes that they must follow to make the DLP
Policy violations per channel or application (USB, email, etc.)
strategy successful for your organization. This training should
be offered through online modules at least once per quarter. Risk reduction reports, based on the number of incidents
per week
Phase 7: Manage the Project & Track Progress
To ensure that your project is successful — and that stakeholders
understand its importance for the organization — It’s critical
By grouping incidents specific to each
to use meaningful metrics that track how the DLP project is business, you can help stakeholders
being executed.
understand the relevant risks that
For instance, you want to know whether sensitive data is being the DLP solution and the overall DLP
copied to removable media such as DVDs or USB sticks. Your DLP
solution monitors that activity and protects you from it, but it also
strategy are identifying and preventing
keeps track of how often that type of activity happens — and who for them.
attempts it. Over time, you will be able to see metrics for whether
your DLP project, tied to an awareness program, is effective in It’s vital that you inform stakeholders about how the strategy
reducing that risk. reduces business risks so that they, in turn, will lead their teams to
adopt more risk-averse behavior to maintain data security.
We recommend that you use at least the following
reporting metrics: When you have achieved that, you’ll know your DLP program
is a success.
Weekly Reports to Business Function Leads and Business
Function Incident Managers
Incident reports
www.forcepoint.com 7