25
Strategies and Best Practices to Implement a Successful Data Loss Prevention Program Sebastian Brenner, CISSP Principal Systems Engineer Symantec LAMC

and Best Practices to a Successful Data Loss ProgramStrategies and Best Practices to Implement a Successful Data Loss Prevention Program Sebastian Brenner, CISSP Principal Systems

  • Upload
    others

  • View
    6

  • Download
    0

Embed Size (px)

Citation preview

Page 1: and Best Practices to a Successful Data Loss ProgramStrategies and Best Practices to Implement a Successful Data Loss Prevention Program Sebastian Brenner, CISSP Principal Systems

Strategies and Best Practices to Implement a Successful Data Loss Prevention Program

Sebastian Brenner, CISSPPrincipal Systems Engineer Symantec LAMC

Page 2: and Best Practices to a Successful Data Loss ProgramStrategies and Best Practices to Implement a Successful Data Loss Prevention Program Sebastian Brenner, CISSP Principal Systems

Agenda

What DLP is and its purpose1

Challenges for a sustainable data protection program2

Common attributes in a successful implementation3

Achieve greater risk reduction4

Page 3: and Best Practices to a Successful Data Loss ProgramStrategies and Best Practices to Implement a Successful Data Loss Prevention Program Sebastian Brenner, CISSP Principal Systems

What is Data Loss Prevention (DLP)?

Definition: “Data loss prevention (DLP) is a strategy for making sure that end users do not send sensitive or critical information outside the corporate network. The term is also used to describe software products that help a network administrator control what data end users can transfer.” (1)

How best  toprevent its loss?

How is it being used?

Where is yourconfidential data?

(1) http://whatis.techtarget.com/definition/data‐loss‐prevention‐DLP  

Page 4: and Best Practices to a Successful Data Loss ProgramStrategies and Best Practices to Implement a Successful Data Loss Prevention Program Sebastian Brenner, CISSP Principal Systems

Protect what’s Important

Customer Information Company Information

Credit Card Info

Medical Records

SSNs andGovernment IDs

Financials HR Records

Intellectual Property

Internal Auditing

M&A and Strategy

Page 5: and Best Practices to a Successful Data Loss ProgramStrategies and Best Practices to Implement a Successful Data Loss Prevention Program Sebastian Brenner, CISSP Principal Systems

Some Data Loss Prevention Use Cases

Better Visibility

Discover Data Theft

Risk Reduction

Legal and Regulatory Compliance

Page 6: and Best Practices to a Successful Data Loss ProgramStrategies and Best Practices to Implement a Successful Data Loss Prevention Program Sebastian Brenner, CISSP Principal Systems

Features to Consider in a Data Loss Prevention SolutionOffice 365iOSAndroid

EmailWebFTPIM

USBHard Drives

Removable StorageNetwork Shares

Print/FaxCloud & Web Apps

File ServersExchange, Lotus

SharePointDatabases

Web Servers

Unified Management

Page 7: and Best Practices to a Successful Data Loss ProgramStrategies and Best Practices to Implement a Successful Data Loss Prevention Program Sebastian Brenner, CISSP Principal Systems

Features to Consider in a Data Loss Prevention SolutionRoute Incidents to Right ResponderHigh Severity of Incidents FirstQuick Detection & ResponseVisibility and MetricsAutomation Integration

FlexibilityMembershipGranular ManagementLimit Data and Incident Access 

High Accuracy & Low False PositivesMultiple Detection Technologies

Extensive FormatsLocalization

ExceptionsDetect/Alert/Block

Built‐in policies templatesAlerts based on Risk and Severity

Unified Management

Page 8: and Best Practices to a Successful Data Loss ProgramStrategies and Best Practices to Implement a Successful Data Loss Prevention Program Sebastian Brenner, CISSP Principal Systems

Who are the Main Players in the DLP Arena?

This Magic Quadrant graphic was published by Gartner, Inc. as part of a larger research note and should be evaluated in the context of the entire report. The Gartner report is available upon request from Symantec. Gartner does not endorse any vendor, product or service depicted in our research publications, and does not advise technology users to select only those vendors with the highest ratings. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purposed

Source: Gartner, Inc., Magic Quadrant for Content‐Aware Data Loss Prevention, Eric Ouellet, December 12, 2013

Page 9: and Best Practices to a Successful Data Loss ProgramStrategies and Best Practices to Implement a Successful Data Loss Prevention Program Sebastian Brenner, CISSP Principal Systems

Recognize challenges for a sustainable data protection program

Page 10: and Best Practices to a Successful Data Loss ProgramStrategies and Best Practices to Implement a Successful Data Loss Prevention Program Sebastian Brenner, CISSP Principal Systems

Typical Customer Challenges• Implementing the entire DLP suite without a plan (“I bought it all, I want to install it all; right now”)

• Not involving all affected areas of IT (“We are IT /Security and we don’t need to engage others for our projects”)

• Not anticipating changing IT environment– Database upgrades– Migrations– Email system upgrades

• Underestimating infrastructure needs and set‐ up timeframes (unrealistic goals)

Implementing the DLP Product Suite

Typical Customer Challenges

Page 11: and Best Practices to a Successful Data Loss ProgramStrategies and Best Practices to Implement a Successful Data Loss Prevention Program Sebastian Brenner, CISSP Principal Systems

Typical Customer Challenges

• Unclear or unfocused DLP program goals

• IT centered implementation with no Business Unit involvement

• “Let’s just see what happens” approach

• Lack of knowledge about the information to protect (customer needs to define what is sensitive in their environment)

• No effort toward developing procedures for the long term

Developing the DLP Program

Page 12: and Best Practices to a Successful Data Loss ProgramStrategies and Best Practices to Implement a Successful Data Loss Prevention Program Sebastian Brenner, CISSP Principal Systems

Typical Customer Challenges• Lack of resources

• Lack of data analysis

• No cooperation from business units

• Adhoc changes to policies and response rules

• Inability to show risk reduction progress (ROI)

Operating a DLP Program

Page 13: and Best Practices to a Successful Data Loss ProgramStrategies and Best Practices to Implement a Successful Data Loss Prevention Program Sebastian Brenner, CISSP Principal Systems

13

Common attributes in a successful DLP implementation

Page 14: and Best Practices to a Successful Data Loss ProgramStrategies and Best Practices to Implement a Successful Data Loss Prevention Program Sebastian Brenner, CISSP Principal Systems

Traditional Approach• Technology focused

• Incident and event centric

• Broad coverage approach

Typical Results

• Unpredictable

• Incomplete

• Inefficient 

• Costly

Successful Approach• People, Process, & Technology

• Comprehensive

• Prioritized and focused

Typical Results 

• Predictable

• Scalable

• Efficient 

• Cost Effective

Want success?  Think differently.

TechnologyTechnologyProcessPeople

Technology

Page 15: and Best Practices to a Successful Data Loss ProgramStrategies and Best Practices to Implement a Successful Data Loss Prevention Program Sebastian Brenner, CISSP Principal Systems

Characteristics of Successful DLP Programs

Employee Education

Business Owner Involvement

Trained Incident Response Team

Prioritized Approach

Executive Level Involvement

Dedicated Experienced Resources

ProcessPeople

Technology

Implement

Install

OperateOptimize

Architect / Design

Metrics Connection

Page 16: and Best Practices to a Successful Data Loss ProgramStrategies and Best Practices to Implement a Successful Data Loss Prevention Program Sebastian Brenner, CISSP Principal Systems

How a comprehensive, clearly‐defined, business‐focused DLP program achieve greater risk reduction 

Page 17: and Best Practices to a Successful Data Loss ProgramStrategies and Best Practices to Implement a Successful Data Loss Prevention Program Sebastian Brenner, CISSP Principal Systems

17

Three Step Implementation Approach

Begin Risk ReductionPlan for SuccessTarget Most Sensitive Data First

Begin Risk Reduction

Page 18: and Best Practices to a Successful Data Loss ProgramStrategies and Best Practices to Implement a Successful Data Loss Prevention Program Sebastian Brenner, CISSP Principal Systems

Step 1:  Plan for Success

• Determine requirements, order and configure hardware

• Set expectations with proactive communication to employees

• Schedule training for System Administrator and Incident Response Team

• Obtain executive buy‐in on initial roll‐out strategy

• Select 1‐2 key metrics for risk reporting

• Assign a dedicated team to own project success

Page 19: and Best Practices to a Successful Data Loss ProgramStrategies and Best Practices to Implement a Successful Data Loss Prevention Program Sebastian Brenner, CISSP Principal Systems

19

Step 2:  Target Most Sensitive Data First

Recommended Starting Points:Strategically add policies

Strategically add protocols and exit points

Strategically add repositories

Strategically add users and endpoints

Greatest Potential for 

Loss

Endpoint:– Users with access to 

highly sensitive data– At‐risk employees

Network:– High‐volume, high‐risk 

protocols and exit points

Storage:– High‐access, high‐

volume repositories

Page 20: and Best Practices to a Successful Data Loss ProgramStrategies and Best Practices to Implement a Successful Data Loss Prevention Program Sebastian Brenner, CISSP Principal Systems

20

Step 3:  Begin Risk Reduction1000

800

600

400

200

0

Months 0 1 to 3 4 to 6 7 to 9 10 to 12

Employee and Business Unit Communication

Sender Auto Notification

Business Unit Risk Scorecard

Refine Policies

Enable Advanced Detection

Fix Broken Business Processes

Refine Policies

Refine Policies

Enable Lookups

Business Unit Risk Scorecard

Identify Broken Business Processes

Incide

nts Pe

r Week

Prevention/ProtectionNotificationRemediationBaseline

Risk Reduction Over Time

Page 21: and Best Practices to a Successful Data Loss ProgramStrategies and Best Practices to Implement a Successful Data Loss Prevention Program Sebastian Brenner, CISSP Principal Systems

Visibility and Metrics Example (2)

21

(2) Screenshots from  Symantec Data Loss Prevention Solution

Page 22: and Best Practices to a Successful Data Loss ProgramStrategies and Best Practices to Implement a Successful Data Loss Prevention Program Sebastian Brenner, CISSP Principal Systems

Keys to Success – People & Process

• Engage business units and data owners to define data protection priorities

• Define and gain consensus on project goals and success metrics

• Determine awareness and communication program for DLP

• Focus initial deployment on 3‐5 key policies

– Endpoint:  target users with access to highly‐sensitive data and at‐risk employees (high turnover)

– Network:  target high‐volume and high‐risk protocols (SMTP, HTTP, FTP)

– Storage:  target high‐access, high‐volume repositories

• Train team prior to implementation

• Configure policies and define incident response workflow based on team capacity

• Regularly report results to key stakeholders and executives

Page 23: and Best Practices to a Successful Data Loss ProgramStrategies and Best Practices to Implement a Successful Data Loss Prevention Program Sebastian Brenner, CISSP Principal Systems

Keys to Success – DLP Technology

• Optimize system performance– Filters, server management, scheduling scans and reports

• Precisely tune policies early– Detection Technologies, Exceptions

• Automate to minimize resources– Workflow, remediation, notification, prevention, protection, encryption

• Integrate with security infrastructure– LDAP, encryption, messaging systems, forensics, SEMs

Page 24: and Best Practices to a Successful Data Loss ProgramStrategies and Best Practices to Implement a Successful Data Loss Prevention Program Sebastian Brenner, CISSP Principal Systems

(3)  Based on Symantec DLP Maturity Model 

Data Loss Prevention Maturity Model(3)

Increased Automation Lower TCO Greater Risk Reduction

Time/Months

Resource/ TCO

DLP Maturity

1

2

3

4

5

3 6 9 12+1

Page 25: and Best Practices to a Successful Data Loss ProgramStrategies and Best Practices to Implement a Successful Data Loss Prevention Program Sebastian Brenner, CISSP Principal Systems

Thank you!

Copyright © 2011 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners.

This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice.

Sebastian [email protected]