Six Steps for Deploying Data Security Controls

The best approach to implementing DLP is to start small and move methodically through all the steps to fully understand the project and results

iP is a good place to start before moving to larger  datasets with more owners and business processes.   

The six steps below  for deploying data security controls come from  Neil Thacker, information security and strategy  officer for the Websense office of the CSO and  former head of security operations for Camelot  (UK national Lottery) and Deutsche Bank. 

  1. Calculate the value of your data. Without a  plan, this can be the most difficult part of the  process. Data values can rise and fall as quickly as financial markets. The key to solving this  problem is working with your executives and  information owners. Determine a simple formula  to estimate the value of your data.
  2. Make your RoI case. To increase security spend and roll out new data security controls, you must demonstrate RoI. This means clearly quantifying the  immense value that comes when you know where  your data is, who is accessing it and how it’s being  used. It’s critical to analyze, communicate and share the financial and organizational impact of stolen and lost data.
  3. Monitor and log your data. Next, start monitoring who has access to data and observe how data moves around your network. Many organizations  turn to a DLP solution for this. The best DLP solutions have the ability to monitor the perimeter entry/exit points for data in motion and thoroughly monitor endpoints for data in use.  The initial monitoring phase should not last longer  than a few weeks after deployment, even after  tuning your policies to remove false positives. A good solution should quickly provide clarity into  common data movement trends.
  4. Apply data security controls. We often speak with organizations that are stuck in step three, in the monitoring and logging phase. They identify incidents as they happen, but lack confidence in applying controls to stop data leaving the organization. This is a mistake.  Gartner demonstrated some time ago that  passive security controls were dead. The same  goes for DLP used exclusively in a monitor-only  deployment. It doesn’t demonstrate RoI to most businesses, especially if a significant loss or breach occurs while you are monitoring. We must apply  controls.  First, revisit your most valuable data. Start amending the rules and policies to begin active protection of  those crown jewels. We don’t recommend enabling  all block rules immediately. Our experience indicates  that a phased approach is the most efficient way of  applying data security controls.
  5. Find your data. Once you have a score associated  with each data type and the funding to proceed,  the next stage is to locate the sensitive data on your  network. Based on the scoring exercise explained  above, it’s always advisable to begin this process.
  6. Focusing on your  crown jewels minimizes the negative impact to your  network. Unfortunately, stand-alone discovery and  data mining services are usually expensive and take  a considerable time to run.  Another option is relying on DLP solutions. most  leading DLP solutions offer a mechanism to discover,  identify and fingerprint data in periodic sweeps.  These sweeps can be scheduled daily, weekly or  monthly. This process provides a marked increase  in visibility and improved efficiency by identifying  duplicate data and flagging it. (Many organizations waste large amounts of money backing up and  storing duplicated data; to a security officer,  reducing the cost of this process is great additional  justification for the purchase of a DLP solution.
  7. Implement proactive protection and increase  employee education. As user awareness becomes  more prominent, the number of blocked incidents  will stabilize and the number of monitored incidents  will go down. Why? A typical user is much more  aware prior to clicking on a link or sending an email  if they understand that these actions will result in  a block and notification. As a result, information  owners and security teams gain tremendous value  through proactive protection, as well as a beneficial reduction in the it team’s workload.

Air Jordan Sneaker


Add new comment