DLP (Data Loss Protection) is NOT dead, but needs to be revisited in the context of new methodologies and threats. Here are some practical steps to improve your cybersecurity awareness and response to data loss.
2. Who is April?
Security Certifications
CISSP (12 years)
Other
Masters in Information Technology
Adjunct professor EdTech @CityU Seattle
InfoSec Manager @SPS
Experience
Computer forensics (12 years)
Disaster Recovery (12 years)
Network Intrusion (5 years)
Audits (5 years)
Network Operations & Architecture (20 years)
3. What is DLP?
Definition
Data loss prevention (DLP) is the strategy used to
ensure that sensitive content is not lost, misused,
or accessed by unauthorized users
Common Examples of protected content
-Credit Card numbers leaving the system
-Social Security numbers leaving the system
But it’s really about classification & Policy
-What does your org need to protect?
-What is the risk tolerance for loss
*to organization
*to impacted customers/partners
4. DLP is dead.
Long live DLP.
Encryption & IPv6 is perceived as a “problem”
ü Inspection is hard to do on at rest & in flight encrypted
data- Become MITM
ü Protect and actively manage your encryption keys
ü Upgrade your tools (or block IPv6)
False Positives are dangerous and disruptive
ü New tools are context aware
ü Signatures & Tools tuned to YOUR risks
ü It’s not just about string matches
There is no perimeter
ü DLP agents can run on mobile clients
ü DLP agents can run against enterprise cloud services
(O365, etc)
5. The Four Pillars
Managing Data Loss
is an exercise in Risk Management
1 -DLP Awareness (users and admins)
2 -Classify and Evaluate the Risk
3 -Control (Choose, Install and Monitor)
4 -Respond to threats immediately
6. DLP Awareness- Part 1
q WA was 2nd worst ID Theft state in the US! (FTC sentinel 2014)
q Home Depot – 56 million records stolen
q Target – 40 million CC records; 70M records
q Premera – 11 million records stolen, including SSN,
birth dates and bank accounts
q Anthem – 80 million records stolen, including SSN,
phone and birthdates
q Wendy’s – 1000 stores; CC Customer Verification #’s,
Expiration Dates; Security Codes; maybe >7M
records*
Awareness – The numbers
Pillar 1
*18% of franchises, 50.2 M customers in Autumn of 2014… 9.03 million people if 2015 same… less 20% cash.
7. DLP Awareness- Part 2
q How do they get in?
• IM link
• P2P trojan
• Email link or attachment
• USB infection
• Unpatched Servers & Devices
• 3rd party vendor credentials
• Remote access/VPN
q Then they pivot… gain credentials and access
§ Running under the radar. Small batches. Low bandwidth. The “right” user
accessing the right kind of data. The bad guys are context aware too.
q Why? $$ False IRS refund filing; stolen identities; credit cards
Awareness – Attack Vectors
Pillar 1
• Shadow IT
• Cloud Services
• Rooted mobile phones & charge stations
• Phone Phishing (spoofing a tech)
• drive-by TRUSTED web ads
• General Web Malware
• Devices w/ backdoor passwords/IoT
• lost unencrypted devices
• DNS domain matching/spoof
8. DLP Awareness – Part 3
http://www.cio.com/article/2403160 (2011)
9. Classify and Evaluate the Risk
q Identify types of data you store
q Identify where you store it (cloud, mobile, etc)
q How is it used (listen to your users)
q Identify the level of risk of each (impact*likely)
Ø Risk to customer
Ø Risk to enterprise
q Review compliance requirements
q Document the matrix and decisions
Pillar 2
Classify – Narrow your Targets
12. Choosing DLP Tools
q Detection or Detection + Response; false
positives need to be actively managed
q Context Aware
q Actions & Integrations possible (wipe? Block?)
q Notifications and Escalation options
q Cloud and Local
q IPv6 and SSL inspection concerns
q You May already have DLP options! (email, web
filtering & AV vendors)
Pillar 3
Controls - Start small, but start!
13. Install Controls
q Control using end point agent (mobile, etc)
q Control using egress filters (O365, etc)
q Control using inline appliance
q Control using scripts and AI agents
q Encryption is a two edged sword
Ø harder to see SSN/Credit Card as it egresses
Ø harder to index and track
Ø harder for criminals to leverage
Pillar 3
Controls – Know what normal Looks like
14. Monitor
q Other monitoring – plant unique data, and then
track egress (honey tokens)
q Monitor your tools & logs; Retain/Correlate logs
q Practice and Tune!
q Search content via web (eg. scribd.com)
q Searching the Deep and Dark Web
Ø Paid and Free Services like http://holdsecurity.com/ &
https://haveibeenpwned.com/
Ø Search deep web (non indexed, not standard google) -
deeperweb.com
Ø Tread carefully with your tools - torproject.org
§ Could Install TOR browser; anon VPN; then proxy search.
§ Sandbox your host (Can you use a cloud/temp VM?)
§ https://zqktlwi4fecvo6ri.onion.to/wiki/Main_Page
§ Beware of Malware and Traps.
Ø Capture traffic to misnamed Typosquatting DNS hosts
Pillar 3
Monitor –
How will u know when you’ve been pwned?
15. Monitor
q More about Honey Tokens
Ø Do your classification/risk analysis first
Ø Choose your HIGH risk targets only.
-Database fictitious records
-Fake login names (can be dangerous)
-Fake contacts, (eg. I create free email account, and add
the free email to ONE contact list)
-minimize use; so you KNOW you have a data loss issue
Ø Tracking
-If 3 or 4 fictitious accounts get spam email – data breach
likely.
-Choose a lucrative field (name, address, etc)
-Avoid manual processes (redactions required)
-Avoid linking to real people
Pillar 3
Monitor - Tracking Devices
18. Respond Immediately
q Document the timeline
q Evaluate risk of data loss and respond
Ø User Retraining? (minor event)
Ø Global user communication? (repeated minor event)
Ø Communicate to internal or external authorities (major)
q Contact your IT Team and Vendor (SLA’s matter!)
q Prevent, Block, Document, Report
q If you identify a breach:
Ø Contact State of WA Cybersecurity
ü cybersecurity@ocs.wa.gov; 1-888-241-7597
ü Report breach here: SecurityBreach@atg.wa.gov
Ø Follow your Incident Response Protocol
Pillar 4
Respond - Time is a tool of the
attacker. Most compromises go
unnoticed for months.
19. Data Loss Costs
q Higher insurance rates
q (related) increased cost to raise bonds/investment
q Future lawsuits & fees – negligence
q Loss of reputation and public trust
q Future fraud risks
q Operational or Business disruption
q Liability for affected consumer protections
q Increased costs of mitigation & interventions
q Opportunity Cost – where $$ could have gone
Pillar 4
Respond – Failure to Response
is Expensive
20. Next Steps?
q You can’t lose what you don’t have. Delete!
ü Leverage document lifecycles automatically w/ ECM
q Classification matters! Lowers costs.
q Know what normal looks like
q Investigate the tools you already have (O365?)
q Keep watch for YOUR data. Plant honey tokens.
ü Don’t forget social media
q There is no silver bullet. Multiple Vendors and
multi-layered defenses are your friend.
q The human element – training users & admins*
Pillar 4
Respond – Be Proactive
21. What does the future of DLP look like?
q People patterns, not just machine patterns
q Cloud and mobile create more egress points.
q The tools are becoming context aware
q It’s not just a copy of data; think ransomware
q It’s not always malicious users; think Manning
q Artificial Intelligence is here to help
q Data Classification/ECM systems will auto-
integrate with your security systems to protect
high risk content
Pillar 4
Respond – Plan for the future
NOW
22. Together we make a difference
For later reading:
http://www.atg.wa.gov/identity-theft-and-privacy-guide-
businesses#Report
https://www2.deloitte.com/content/dam/Deloitte/us/Documents/risk/us-
risk-beneath-the-surface-of-a-cyber-attack.pdf
Under a new law enacted in 2015, any business,
individual, or public agency that is required to issue a
security breach notification to more than 500
Washington residents as a result of a single security
breach shall electronically submit a single sample copy
of that security breach notification, excluding any
personally identifiable information, to the Attorney
General.
START TODAY