Security Defined Cybersecurity EncyclopediaQu'est-ce que la prévention des pertes de données (DLP) ?

Prévention des pertes de données (DLP)

Qu'est-ce que la prévention des pertes de données (DLP) ?

Prévention des pertes de données encompasses a set of practices and tools meant to prevent data leakage (also known as data exfiltration) by intentional and unintentional misuse. These practices and tools include encryption, detection, preventative measures, educational pop ups (for unintentional movements), and even machine learning to assess user risk scores. Over time, DLP has evolved into the realm of data protection and has become a premier feature of data protection deployment.

For the sake of simplicity, we’re going to use the acronym “DLP” throughout this guide to refer to all of these measures, unless stated otherwise.

dlp meaning

 

The Need for Data Loss Prevention

Losing data is bad for business. It erodes confidence in your brand and can result in financial losses from lawsuits, regulatory non-compliance fines, and exposure of intellectual property. Let’s dig a little deeper into the requirements that drive the need for DLP.

 

1. Compliance with industry and government regulations

Many industries, including healthcare, government contractors, and financial institutions are required by law to safeguard sensitive personal data. These regulations include:

  • HIPAA (Health Insurance Portability and Accountability Act)
  • GDPR (General Data Protection Regulation)
  • PCI DSS (Payment Card Information Data Security Standard)
  • CCPA (California Consumer Privacy Act)
  • PIPEDA (Personal Information Protection and Electronic Documents Act)

Common to all the regulations is the stipulation that sensitive data must be kept in a secure location and isolated from unauthorized users. Companies must have DLP strategies and tools in place, which prevent unintentional or malicious access to, and exfiltration from, the isolated data store.

 

2. Protecting proprietary information

Proprietary information refers to any confidential data or knowledge about the organization and its business structure and operations, or about its clients, customers, partners, or affiliates. Examples of proprietary information include:

  • Internal project plans
  • Proprietary code
  • Patent information
  • Email communications
  • Business documents
  • Internal processes

While some hackers steal information from organizations and government agencies just to see if they can, most do it for the financial benefit of selling or exposing that information. Today, many ransomware attackers not only encrypt the victim’s data and demand money for unlocking it, but also exfiltrate some of the data and demand payment for not releasing it to the public.

Data loss prevention software and strategies help keep your intellectual property safe, not only from outside attacks and exfiltration, but also from unintentional data leaks caused by your own employees. The careless sharing of confidential data and information over unsecured media and public cloud accounts can cause just as much damage as malicious acts of information espionage.


White Paper: Evaluating Data Loss Impact


 

How Does Data Loss Prevention Work?

There are several methods of data loss prevention, which are implemented through best practices and software tools. The best data loss prevention strategies include a variety of approaches to cover all of the potential breach vectors.

 

The 5 types of data loss prevention

 

1. Data Identification: This is the process by which organizations identify sensitive information within their digital environment, whether it resides within emails, cloud storage applications, collaboration applications, or elsewhere.

2. Data Leak Identification: This is an automated process for detecting and identifying misappropriated data, whether it was exfiltrated or misplaced within an organization’s infrastructure.

3. Data-in-Motion DLP: When data is in transit between locations, DLP software employs a variety of security measures, from network protection to data encryption, to ensure that the data arrives untouched at its destination.

4. Data-at-Rest DLP: This type of protection covers data that is not currently in transit and is typically stored in some kind of database or file sharing system. It utilizes several methods to ensure safe storage of data locally and in the cloud, from endpoint protection to encryption to prevent any unauthorized use of data.

5. Data-in-Use DLP: Data that is currently in use by those within an organization must be protected from any type of potentially harmful interaction with the data, such as altering, screen-capturing, cut/copy/paste, printing, or moving information. In this context, DLP is meant to prevent any unauthorized interactions or movements of data, as well as take note of any suspicious patterns.


White Paper: Protéger les données à l'aide du machine learning
Datasheet: Principales questions à poser à votre fournisseur de solutions DLP cloud


 

Best Practices: How to Prevent Data Loss

1. Educate your employees

One of the most effective best practices for preventing data loss starts with training your employees everything they should and shouldn’t do when handling your organization’s precious data. Employee DLP education should include safe practices for transferring, viewing, and storing data. For maximum effect, training should be sponsored at the executive level and should be repeated at regular intervals to reinforce and update best-practice behavior.

 

2. Establish data handling policies

A key component of DLP best practices, data handling policies include:

  • Where data can be stored
  • How data is to be transferred
  • Who can view certain types of data
  • What types of data you are allowed to store
  • Et bien d'autres

Since these policies drive all other data handling behaviors and assessments, they should be established at your earliest opportunity. They should also be updated regularly to reflect changes in the organization, the industry, and in regulations. Once data handling policies are in place, you can move onto more technical remedies and best practices to ensure your data remains where it ought to be.

 

3. Create a data classification system

The key to creating data loss prevention policies is to start with a data classification system. This taxonomy will provide a reference for talking about the stringency and methods of protection needed for different types of data. Common classifications include personally identifiable information (PII), financial information, public data, and intellectual property. There are many others. A unique set of protection protocols can be established for each classification.

 

4. Monitor sensitive data

Successful data protection requires the ability to monitor your sensitive data. Data loss prevention software typically includes capabilities for monitoring all aspects of data use and storage, including:

  • User access
  • Device access
  • Application access
  • Threat types
  • Geographical locations
  • Access times
  • Data context

As part of the monitoring process, DLP software sends alerts to relevant personnel when data is used, moved, deleted, or altered in an unauthorized manner.

 

5. Implement a DLP software that accommodates shadow IT

It can be complicated enough to protect the data used by your known inventory of applications. But you also need to account for data accessed by shadow IT. This is the growing trove of software-as-a-service (SaaS) applications that employees subscribe to independently, without approval from the IT department—and often without its knowledge.

Even if employees are thoroughly trained in DLP best practices, it is hard for them to accurately assess the safety of these cloud-based applications. Under most SaaS models, the SaaS provider is responsible for the applications themselves, but users are responsible for the data that the application uses. Users, who are focused on achieving business objectives, are not in a position to protect data from attacks that may come through a compromised SaaS application. It is up to you to hold the line on data leakage and misuse. That’s why you need a DLP software solution that is able to recognize shadow IT and prevent users from accessing data or moving data to these applications, until you can bring them out of the shadows and into the fold of secure IT operations.

 

6. Set up different levels of authorization and access

Cette bonne pratique va de pair avec la classification des données, car la combinaison de ces deux éléments vous permettra de n'accorder l'accès aux données qu'aux personnes autorisées à y accéder. Votre logiciel DLP doit également intégrer certaines politiques de protection des données Zero Trust qui ne font pas intrinsèquement confiance aux utilisateurs et qui vérifient systématiquement les identités et les autorisations.

 

7. Adopt companion tools of DLP

La DLP ne se fait pas en vase clos. L'ensemble du concept de DLP repose sur un écosystème d'outils qui collaborent pour fournir des informations, des plans d'action et des mesures de protection actives de vos données. Ces outils comprennent des passerelles Web sécurisées, des CASB, la sécurité des emails et des infrastructures Zero Trust.


Demo Video: Advanced Cloud DLP in Action
Datasheet: Netskope Data Loss Prevention


 

Ressources

Prévention des pertes de données (DLP) de Netskope

Prévention des pertes de données (DLP) de Netskope

Demo-Email DLP

Demo - Email DLP

Evaluating Data Loss Impact

Evaluating Data Loss Impact

Principales questions à poser à votre fournisseur de solutions DLP cloud

Principales questions à poser à votre fournisseur de solutions DLP cloud

Guide d'adoption SASE

Guide d'adoption SASE

Demo - Stop sensitive data exposure in the cloud

Demo - Stop sensitive data exposure in the cloud

Protéger les données à l'aide du machine learning

Protéger les données à l'aide du machine learning

Top 6 des questions à poser à votre fournisseur de solutions DLP cloud – Microsoft 365

Top 6 Questions to Ask Your Cloud DLP Vendor

S'abonner aux rapports Threat Labs

Recevez le rapport mensuel Threat Labs dès sa publication.