SlideShare una empresa de Scribd logo
1 de 62
Data Leakage Prevention in
your Microsoft Infrastructure
Paul Loonen
IAM Architect, Verizon Enterprise Solutions
About me
• Co-founder WinTalks.be
• MVP: Microsoft Forefront Identity Manager
• MCM Directory
• Job Role: IAM Architect @ Verizon Enterprise Solutions
• paul.loonen@be.verizon.com
• Blog @ http://be-id.blogspot.com
• @ploonen (@wintalksbe)
Disclaimer
• Focus is on using what you already (may) have …
• Everything I say won’t help against this:
Agenda
• The Data Leakage Problem
• How to approach DLP
• Data classification
• Protecting Your Data
What is Data Leakage
Information Leakage Is Costly On Multiple Fronts
• Cost of digital leakage per year is measured in $ billions
• Increasing number and complexity of regulations, e.g. GLBA, SOX, CA SB 1386
• Non-compliance with regulations or loss of data can lead to significant legal fees,
fines and/or jail time
Legal,
Regulatory
& Financial
impacts
• Damage to public image and credibility with customers
• Financial impact on company
• Leaked e-mails or memos can be embarrassing
Damage to
Image &
Credibility
• Disclosure of strategic plans, M&A info potentially lead to loss of revenue, market
capitalization
• Loss of research, analytical data, and other intellectual capital
Loss of
Competitive
Advantage
Risk Areas
PII
• Birth Date
• Employee Numbers
• Social Security /
National Numbers
• Credit card
Information (PCI)
• Personal Health
Information
IP
• Source Code
• Product Design
Documents
• Research
Information
• Patent Applications
• Customer Lists
NPI
• Financial
Information
• Mergers &
Acquisitions
activities and
information
• Executive
communication
• Legal and
Regulatory Matters
• Corporate Policies
Do you want to be this people?
How does this happen, by who?
• Ex-employees, partners, customers
• Over 1/3 due to negligence
• Nearly 30% of loss on portable devices
• Increasing loss from external collaboration
Percentage cause of data breach
Cost of Data Breach report
Ponemon Institute 2010
Estimated sources of data breach
Verizon Data Breach Investigation
Report 2013
Variety of Misuse Actions
Source: Verizon Data Breach Investigation Report 2013
So, what is DLP?
• DLP means different things to different people
• Data Loss Prevention
• Data Leakage Prevention
• Data Loss Protection
• DLP is always about protecting information that is sensitive to an
organization
• DLP technology is content aware
• referred to as deep packet inspection, analyzes the payload contained within a file or
session.
• DLP references data in one of three states
• Data in motion
• Data at rest
• Data in use
How to approach DLP
Approach
Strategy
Assessment
Data
Discovery &
Classification
Encryption /
Key
Management
Data-Leak
Prevention
Post-Leak
Management
Business case validation, plan for
solution deployment, define and
enhance process and policies
Locate and classify sensitive data
on file systems, emails,
applications, endpoints, etc.
Render sensitive information
unreadable to unauthorized
sources
Enforce controls and policies to
reduce leakage of sensitive
information from secured
networks and systems
Enforce controls to protect
sensitive data post leak
Data Classification
Managing data on file servers
Looking at the problem space for a data repository
• One of the largest repositories of data in the organization
• Regulatory compliance periodic audits are expensive and labor
intensive
• Data leakage of sensitive information
• Exposure of information due to complexity of granting access
on a need to know basis
File Classification Infrastructure
Tagging Information
Location based
Manual
Automatic classification
Application
In-box content
classifier
3rd party
classification
plugin
// instantiate new classification manager
FsrmClassificationManager cls =
new FsrmClassificationManager();
//get defined properties
ICollection c = cls.EnumPropertyDefinitions
(_FsrmEnumOptions.FsrmEnumOptions_None);
// inspect each property definition
foreach (IFsrmPropertyDefinition p in c)
{
/*...*/
}
File Classification Infrastructure
Applying policy based on classification
Match file to policy
Classify file
Access control
Audit control
RMS Encryption
Retention
Other actions
How do I get “FCI”?
File Server Resource Manager
Overview of FSRM: http://technet.microsoft.com/en-us/library/hh831701(v=ws.11)
Where do I get FSRM?
PS C:> Install-WindowsFeature –Name FS-Resource-Manager –IncludeManagementTools
Configuring Classification with FSRM
(the manual way)
Configuring Classification with FSRM
Data Classification Toolkit for Windows
Server 2012
• Free download: http://technet.microsoft.com/en-
us/library/hh204743.aspx
• Assists you in configuring FCI in your
environment
• Allows managing Central Access Policy across
file servers
• Integrates with Dynamic Access Control and AD
RMS
• Scenario-based
• Classification configuration package examples
provided
Process
Sample Package
Example: NIST
//sidenote
• Enable FCI tab in explorer on Windows 8 clients:
Typical Infrastructure
• Win8 or Win7SP1 Client with toolkit installed
• SQL Server when reporting is required
• Reporting DB
• DB of file servers running FCI
• Limited reporting without SQL Server
• Win2k12 DC
• Domain functional level must be Win2k12 – this
enables Central Access Policy
• Otherwise local file server properties …
• File servers running FCI
• Win2k8 R2 or Win2k12
Protecting Your Data
Dynamic Access Control
Dynamic Access Control
• Brings existing identity claims model into the Windows platform
• WIF, ADFS
• Introduce a model to target access and audit policies based on
tagging to drive efficient policy enforcement and implement this
model for files
• Bridge the gap between IT & Information Owners using
information tagging for files
Expression-based access control policy
User claims
User.Department = Finance
User.Clearance = High
ACCESS POLICY
Applies to: @Resource.Impact == “High”
Allow | Read, Write | if (@User.Clearance == “High”) AND (@Device.Managed == True)
Device claims
Device.Department = Finance
Device.Managed = True
Resource properties
Resource.Department = Finance
Resource.Impact = High
Authorization – Updated ACL Model
Support for Expression
with ‘AND’/’OR ’ primitives
User.memberOf (USA-Employees)
AND User.memberOf (Finance-Division)
AND User.memberOf (Authorization-Project)
Support for User Claims from AD
User.Division = ‘Finance’
AND User.CostCenter = 20000
Support for Static Device Claims from
AD
User.Division = ‘Finance’
AND Device.ITManaged = True
Target Policy based on
Resource Type
IF (Resource.Impact = ‘HBI’)
ALLOW AU Read User.EmployeeType = ‘FTE’
• No expressions in ACL
• Led to group bloat
• ACLs only based on groups
• Led to group bloat
• No ability to control access
based on device state
• No way to target policy based
on Resource Type
• Claims support in ACEs managed as SDDL strings
• Added / removed from SDDL strings via standard string manipulation functions
Legacy Windows New in Win2k12 Example
Claim
Definitions
Resource Property
Definitions
Access policy DC
File Server
Allow/
Deny
End User
Control access to information
Protecting Your Data
Active Directory Rights Management Services (AD RMS)
What is AD RMS?
• Information Protection technology
• Aimed at reducing information leakage
• Server and client components
• Integrated with Windows, Office, Exchange, SharePoint and
more
• Based on Symmetric and Public Key Cryptography
• Protects data at rest, in transit and in use
• Helps enforce corporate data policies
• Installed as a server role
How AD RMS Works
• Client and user are “activated”
• Client creates rights-protected content (offline)
• User distributes rights-protected content
• Recipient acquires licenses from server to decrypt protected
information
• Client enforces usage policies
Using IRM to avoid data leakage
• Encryption provides protection from unauthorized access
• Most effective if it is identity-based
• How you manage encryption is essential
• Needs to be independent from content management
• Must be integrated with ID management
• Must be simple to use
• Must be strong, reliable and recoverable
• Encryption is not enough
• Users will misuse information if they can
• Even trusted users make mistakes
• But if policy is clear and not easily circumvented, legitimate users will follow
the policies
AD RMS Highlights
• Robust protection
• AES 128 bits, RSA 1024 bits, HSM support
• Extensive client-side enforcement
• Very easy to use
• UI integrated with Office products
• Authors just select the appropriate option
• No action required on consumers of protected information
• No significant need for user technical training
• Transparent operation
• Automated certificate and license management
• Small traffic and volume overhead
• Low infrastructure cost
Protecting information with AD RMS
• Users can manually assign rights over a document
• Who can read, print, edit, copy…
• Can assign rights to users or groups
• Document expiration, programmatic access, other advanced options
• Some applications have pre-defined options
• E.g. Outlooks “Do Not Forward”
• Users can use a pre-built template
• Templates reflect the organization’s security policies
• Company Confidential
• Managers only
• Contains private information
• Etc.
• Templates enforce a pre-defined set of rights
• Templates are enforced at time of consumption
• Some applications can automatically apply protection
What documents can I protect using AD
RMS?
• Anything really
• AD RMS SDK 2.0 (http://www.microsoft.com/en-
us/download/details.aspx?id=29893)
• Microsoft Office file formats (Word, Excel, PowerPoint)
• Many other formats using 3rd party (foxit, Titus, …)
• Rights Protected Folder Explorer (“RPFe”)
• Controls access to files contained in RPF
• Caveat: when file is “extracted” it is no longer protected
Certification & Licensing
Client Machines
RMS Components Detail
RMS “Root” Certification Cluster
IIS, ASP.NET
Active Directory
• Identity list
• Service Connection
point
RMS Licensing Cluster
RMS Web Services:
• Publishing
• Licensing
IIS, ASP.NET
Logging Database
NLB
Administration:
• Service connection point
• Policy Templates
• Logging Settings
RMS Web Services:
• Certification
• Publishing
• Licensing
SQL Server
• Configuration
• Logging
• Directory
RMS Client + “Lockbox”
RMS-enabled applications
User Certificate + key pair
Machine Certificate + key pair
Licensing
NLB
SQL
Windows RMS Key Flow
Standard Publish-and-Consume Scenario
Information
Author
Recipie
nt
RMS
Server
Database
Server
Active
Directory
2 3
4
5
2. Author applies an RMS policy to their file. The
application works with the RMS client to create a
“publishing license”, encrypts the file, and appends
the publishing license to it.
3. Author distributes file.
4. Recipient clicks file to open. The application sends
the recipient’s credentials and the publish license to
the RMS server, which validates the user and
issues a “use license.”
5. Application renders file and enforces rights.
1. Author automatically receives RMS credentials
(“rights account certificate” and “client licensor
certificate”) the first time they rights-protect
information.
1
AD RMS and SharePoint
• When content is downloaded from a library…
• RMS protection automatically applied
• Information still searchable in SharePoint library
• SharePoint rights  IRM permissions
Recipient
AD RMS
SharePoint
AD RMS & Exchange
• When users are sending emails
unprotected…
• Exchange transport rules apply RMS
automatically
• Based on content (what it says) and context
(who its going to) analysis
• Consume protected email in IE, Firefox and
Safari
Recipient
Information Author
AD
RMS
Exchange
AD RMS and file shares
• When content is saved to a network file share...
• Bulk Protection Tool secures all content in certain folders
• File Classification Infrastructure (FCI) can automate classification, RMS
and move into SharePoint
AD RMS
File Server
Information
Author
SharePoint
Protecting Your Data
Bitlocker To Go
BitLocker vs BitLocker to Go
BitLocker
• TPM
• Operating System
• Data Partitions (Fixed)
• TPM, Dongle, Pin
• Requires System Partition
BitLocker to Go
• Data Partition (Removable)
• Password, Auto-Unlock, Smartcards
• Supports FAT
• XP / Vista (Read Only)
BitLocker Group Policy Settings
• BitLocker Group Policy settings can
• Turn on BitLocker backup to Active
Directory
• Enable, enforce or disable password
or smartcard protectors
• Enforce a minimum password length
• Enforce password complexity
• Deny write access to drives not encrypted with BitLocker
• Do not allow write access to devices from
other organizations
Data Drive Key
Password
Auto-Unlock
Smartcards
EaseofUse
BitLocker offers a spectrum of protection allowing
to balance ease-of-use against the threats you are
most concerned with
Security
Pros:
Ease of use backward
compatibility BitLocker
to go reader
Cons:
Less secure vulnerable
to brute force and
dictionary attacks
Pros:
Uses a stronger key
Cons:
Specific to a
single machine
Pros:
Uses much stronger keys
Cons:
Requires hardware not
backward compatible
XXXXX
Active Directory Based Recovery
Requirements
• Schema needs to be extended
• Windows Server 2008 R2 or later
• All DC’s must be Windows Server 2003 SP1 or later
Data Recovery Agent
New Recovery Mechanism
• Certificate-based key protector
• A certificate containing a public key is
distributed through Group Policy and is
applied to any drive that mounts
• The corresponding private key is held by a data
recovery agent in the IT department
• Allows IT department to have a way to
unlock all protected drives in an enterprise
• Saves space in AD – same Key Protector
on all drives
Enforcement
• Requiring BitLocker for data drives
• When this policy is enforced, all data drives will require BitLocker
protection in order to have write access
• As soon as a drive is plugged into a machine, a dialog is displayed to
the user to either enable BitLocker on the device or only have read-
only access
• The user gets full RW access only after encryption
is completed
• Users can alternatively enable BitLocker at a later time
Cross-Organization
• This policy will help enterprises manage compliance when
a requirement exists to not allow devices to roam outside
of the enterprise
• When the "Deny write access to devices configured in
another organization" policy is enabled
• Only drives with identification fields matching the computer's
identification fields will be given write access
• When a removable data drive is accessed it will be checked
for valid identification field and allowed identification fields
• These fields are defined by the "Provide the unique identifiers
for your organization" policy setting
• For existing drives:
manage-bde -SetIdentifier <drive letter>
Recommendations
• Identification fields
• Should be set before your deployment if you are planning to use DRAs or
the cross-organization policy
• Are automatically set during encryption
• Can be set after encryption using Manage-BDE or WMI but this requires
Administrator rights
• Certificates
• Deploy the required certificates before enabling BitLocker on data drives
• BitLocker To Go Reader
• Installed per default but can be managed through group policies
• Requires the use of a password
• Can be deployed separately using a software distribution tool
More policies that help prevent leakage
via removable drives
Protecting Your Data
Encrypting File System
Encrypting File System (EFS)
Features
• Transparent encryption done at the file-system level
• If a folder is marked, every file created or moved into it will be
encrypted
• File encryption keys can be archived (USB Flash Drive, File
server)
• There is no “back door”
• Keys are protected with the users password on the computer
• Data Recovery Agent to allow for recovery of files if user’s key
is lost
page 56
What It Doesn’t Protect or Prevent
• It does NOT provide encryption to files that are:
• Sent via email
• Kept on a separate flash drive/thumb drive/USB drive/floppy disk
• Moved over the network via shared folders (CIFS/AFS)
• System and page file
• It does not prevent
• Files moved into folder set to encrypt all files
• Files form being deleted
• When you are about to move an encrypted file, Windows will warn
you that you will lose your EFS encryption.
• Keep in mind that whenever you move a file off of your computer, it is
probably no longer protected by EFS.
Protecting Your Data
What encryption?
Scenario RMS EFS BitLocker
Protect my information outside my direct control
Set fine-grained usage policy on my information
Collaborate with others on protected information
Protect my information to my smartcard
Untrusted admin of a file share
Protect information from other users on shared machine
Lost or stolen laptop
Physically insecure branch office server
Local single-user file & folder protection
RMS vs EFS vs BitLocker
Secure Collaboration
Protect Yourself
Protect Against Theft
Summary
• Think strategy when starting a DLP project
• Data classification
• Let’s you know what data you have and where it sits
• Allows implementing controls on metadata
• Protection comes in many shapes
• Dynamic Access Control
• AD RMS
• Bitlocker To Go
• Encrypting File System (EFS)
• Protection doesn’t stop with one implemented control
• Combination of multiple controls will be your ticket
• Think about reporting
• 3rd party solutions complement Microsoft building blocks
Some References
• Verizon Data Breach Investigations Report 2013
• http://www.verizonenterprise.com/DBIR/2013/
• Classification
• FCI - http://technet.microsoft.com/en-us/library/hh831660.aspx
• WSRM - http://technet.microsoft.com/en-us/library/cc732553.aspx
• DCT - http://technet.microsoft.com/en-us/library/hh204743.aspx
• DAC
• http://technet.microsoft.com/en-us/library/hh831717.aspx
• AD RMS
• AD RMS Team Blog: http://blogs.technet.com/b/rms/
• http://technet.microsoft.com/en-us/library/cc771234(v=ws.10).aspx
• RPFe - http://technet.microsoft.com/library/Hh538204.aspx
• Bitlocker to Go
• http://technet.microsoft.com/en-us/library/dd875547(v=ws.10).aspx
Data Leakage Prevention

Más contenido relacionado

La actualidad más candente

DSS ITSEC 2013 Conference 07.11.2013 - For your eyes only - Symantec PGP Re-L...
DSS ITSEC 2013 Conference 07.11.2013 - For your eyes only - Symantec PGP Re-L...DSS ITSEC 2013 Conference 07.11.2013 - For your eyes only - Symantec PGP Re-L...
DSS ITSEC 2013 Conference 07.11.2013 - For your eyes only - Symantec PGP Re-L...Andris Soroka
 
DLP Data leak prevention
DLP Data leak preventionDLP Data leak prevention
DLP Data leak preventionAriel Evans
 
Introducing Data Loss Prevention 14
Introducing Data Loss Prevention 14Introducing Data Loss Prevention 14
Introducing Data Loss Prevention 14Symantec
 
Symantec Data Loss Prevention 11
Symantec Data Loss Prevention 11Symantec Data Loss Prevention 11
Symantec Data Loss Prevention 11Symantec
 
ISSA DLP Presentation - Oxford Consulting Group
ISSA DLP Presentation - Oxford Consulting GroupISSA DLP Presentation - Oxford Consulting Group
ISSA DLP Presentation - Oxford Consulting Groupaengelbert
 
Technology Overview - Symantec Data Loss Prevention (DLP)
Technology Overview - Symantec Data Loss Prevention (DLP)Technology Overview - Symantec Data Loss Prevention (DLP)
Technology Overview - Symantec Data Loss Prevention (DLP)Iftikhar Ali Iqbal
 
DLP Executive Overview
DLP Executive OverviewDLP Executive Overview
DLP Executive OverviewKim Jensen
 
Information and Identity Protection - Data Loss Prevention, Encryption, User ...
Information and Identity Protection - Data Loss Prevention, Encryption, User ...Information and Identity Protection - Data Loss Prevention, Encryption, User ...
Information and Identity Protection - Data Loss Prevention, Encryption, User ...Symantec APJ
 
Ciso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data securityCiso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data securityPriyanka Aash
 
Overview of Data Loss Prevention (DLP) Technology
Overview of Data Loss Prevention (DLP) TechnologyOverview of Data Loss Prevention (DLP) Technology
Overview of Data Loss Prevention (DLP) TechnologyLiwei Ren任力偉
 
Data Security: Why You Need Data Loss Prevention & How to Justify It
Data Security: Why You Need Data Loss Prevention & How to Justify ItData Security: Why You Need Data Loss Prevention & How to Justify It
Data Security: Why You Need Data Loss Prevention & How to Justify ItMarc Crudgington, MBA
 
Best Practices for Implementing Data Loss Prevention (DLP)
Best Practices for Implementing Data Loss Prevention (DLP)Best Practices for Implementing Data Loss Prevention (DLP)
Best Practices for Implementing Data Loss Prevention (DLP)Sarfaraz Chougule
 
The CISO’s Guide to Data Loss Prevention
The CISO’s Guide to Data Loss PreventionThe CISO’s Guide to Data Loss Prevention
The CISO’s Guide to Data Loss PreventionDigital Guardian
 
Security and Audit for Big Data
Security and Audit for Big DataSecurity and Audit for Big Data
Security and Audit for Big DataNicolas Morales
 
Kyle Taylor – increasing your security posture using mc afee epo
Kyle Taylor – increasing your security posture using mc afee epoKyle Taylor – increasing your security posture using mc afee epo
Kyle Taylor – increasing your security posture using mc afee epoKyle Taylor
 
Data Loss Prevention in SharePoint 2016 Webinar with Crow Canyon
Data Loss Prevention in SharePoint 2016 Webinar with Crow CanyonData Loss Prevention in SharePoint 2016 Webinar with Crow Canyon
Data Loss Prevention in SharePoint 2016 Webinar with Crow CanyonVlad Catrinescu
 
McAfee Total Protection for Data Loss Prevention (DLP)
McAfee Total Protection for Data Loss Prevention (DLP)McAfee Total Protection for Data Loss Prevention (DLP)
McAfee Total Protection for Data Loss Prevention (DLP)Trustmarque
 

La actualidad más candente (20)

DSS ITSEC 2013 Conference 07.11.2013 - For your eyes only - Symantec PGP Re-L...
DSS ITSEC 2013 Conference 07.11.2013 - For your eyes only - Symantec PGP Re-L...DSS ITSEC 2013 Conference 07.11.2013 - For your eyes only - Symantec PGP Re-L...
DSS ITSEC 2013 Conference 07.11.2013 - For your eyes only - Symantec PGP Re-L...
 
DLP Data leak prevention
DLP Data leak preventionDLP Data leak prevention
DLP Data leak prevention
 
Introducing Data Loss Prevention 14
Introducing Data Loss Prevention 14Introducing Data Loss Prevention 14
Introducing Data Loss Prevention 14
 
Symantec Data Loss Prevention 11
Symantec Data Loss Prevention 11Symantec Data Loss Prevention 11
Symantec Data Loss Prevention 11
 
ISSA DLP Presentation - Oxford Consulting Group
ISSA DLP Presentation - Oxford Consulting GroupISSA DLP Presentation - Oxford Consulting Group
ISSA DLP Presentation - Oxford Consulting Group
 
Technology Overview - Symantec Data Loss Prevention (DLP)
Technology Overview - Symantec Data Loss Prevention (DLP)Technology Overview - Symantec Data Loss Prevention (DLP)
Technology Overview - Symantec Data Loss Prevention (DLP)
 
DLP Executive Overview
DLP Executive OverviewDLP Executive Overview
DLP Executive Overview
 
Information and Identity Protection - Data Loss Prevention, Encryption, User ...
Information and Identity Protection - Data Loss Prevention, Encryption, User ...Information and Identity Protection - Data Loss Prevention, Encryption, User ...
Information and Identity Protection - Data Loss Prevention, Encryption, User ...
 
Ciso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data securityCiso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data security
 
Overview of Data Loss Prevention (DLP) Technology
Overview of Data Loss Prevention (DLP) TechnologyOverview of Data Loss Prevention (DLP) Technology
Overview of Data Loss Prevention (DLP) Technology
 
DLP
DLPDLP
DLP
 
Data Security: Why You Need Data Loss Prevention & How to Justify It
Data Security: Why You Need Data Loss Prevention & How to Justify ItData Security: Why You Need Data Loss Prevention & How to Justify It
Data Security: Why You Need Data Loss Prevention & How to Justify It
 
Best Practices for Implementing Data Loss Prevention (DLP)
Best Practices for Implementing Data Loss Prevention (DLP)Best Practices for Implementing Data Loss Prevention (DLP)
Best Practices for Implementing Data Loss Prevention (DLP)
 
Symantec Data Loss Prevention 9
Symantec Data Loss Prevention 9Symantec Data Loss Prevention 9
Symantec Data Loss Prevention 9
 
The CISO’s Guide to Data Loss Prevention
The CISO’s Guide to Data Loss PreventionThe CISO’s Guide to Data Loss Prevention
The CISO’s Guide to Data Loss Prevention
 
Security and Audit for Big Data
Security and Audit for Big DataSecurity and Audit for Big Data
Security and Audit for Big Data
 
Kyle Taylor – increasing your security posture using mc afee epo
Kyle Taylor – increasing your security posture using mc afee epoKyle Taylor – increasing your security posture using mc afee epo
Kyle Taylor – increasing your security posture using mc afee epo
 
Data Loss Prevention in SharePoint 2016 Webinar with Crow Canyon
Data Loss Prevention in SharePoint 2016 Webinar with Crow CanyonData Loss Prevention in SharePoint 2016 Webinar with Crow Canyon
Data Loss Prevention in SharePoint 2016 Webinar with Crow Canyon
 
Data Loss Prevention: Brainstorming
Data Loss Prevention: BrainstormingData Loss Prevention: Brainstorming
Data Loss Prevention: Brainstorming
 
McAfee Total Protection for Data Loss Prevention (DLP)
McAfee Total Protection for Data Loss Prevention (DLP)McAfee Total Protection for Data Loss Prevention (DLP)
McAfee Total Protection for Data Loss Prevention (DLP)
 

Destacado

Information Leakage & DLP
Information Leakage & DLPInformation Leakage & DLP
Information Leakage & DLPYun Lu
 
The Definitive Guide to Data Loss Prevention
The Definitive Guide to Data Loss PreventionThe Definitive Guide to Data Loss Prevention
The Definitive Guide to Data Loss PreventionDigital Guardian
 
Data Loss Prevention
Data Loss PreventionData Loss Prevention
Data Loss PreventionReza Kopaee
 
Understanding the-demand-supply-equations-of-corruption-fraud-final
Understanding the-demand-supply-equations-of-corruption-fraud-finalUnderstanding the-demand-supply-equations-of-corruption-fraud-final
Understanding the-demand-supply-equations-of-corruption-fraud-finalGlobalCompact
 
Unethical Behavior in Business - The Case Against HSBC
Unethical Behavior in Business - The Case Against HSBCUnethical Behavior in Business - The Case Against HSBC
Unethical Behavior in Business - The Case Against HSBCStacey Troup
 
Classifying Data to Help Secure Business Information - Template fromMicrosoft
Classifying Data to Help Secure Business Information - Template fromMicrosoftClassifying Data to Help Secure Business Information - Template fromMicrosoft
Classifying Data to Help Secure Business Information - Template fromMicrosoftDavid J Rosenthal
 
SCS Presentation - Corporate Governance
SCS Presentation - Corporate GovernanceSCS Presentation - Corporate Governance
SCS Presentation - Corporate GovernanceDwayne Jorgensen
 
Control of ground water in excavation
Control of ground water in excavation Control of ground water in excavation
Control of ground water in excavation Aamir Patni
 
Avoiding Off-Label Promotion
Avoiding Off-Label PromotionAvoiding Off-Label Promotion
Avoiding Off-Label PromotionDale Cooke
 
Formwork by chakamba john
Formwork by chakamba johnFormwork by chakamba john
Formwork by chakamba johnJohn Chakamba
 
Corruption and Fraud Risk Management using ISO 31000
Corruption and Fraud Risk Management using ISO 31000Corruption and Fraud Risk Management using ISO 31000
Corruption and Fraud Risk Management using ISO 31000PECB
 
Dealing with unethical behaviors in organizations
Dealing with unethical behaviors in organizationsDealing with unethical behaviors in organizations
Dealing with unethical behaviors in organizationsKenny Nguyen
 
Fraud Risk and Control
Fraud Risk and ControlFraud Risk and Control
Fraud Risk and ControlWeaverCPAs
 

Destacado (20)

Information Leakage & DLP
Information Leakage & DLPInformation Leakage & DLP
Information Leakage & DLP
 
The Definitive Guide to Data Loss Prevention
The Definitive Guide to Data Loss PreventionThe Definitive Guide to Data Loss Prevention
The Definitive Guide to Data Loss Prevention
 
Data Loss Prevention
Data Loss PreventionData Loss Prevention
Data Loss Prevention
 
Information Leakage - A knowledge Based Approach
Information Leakage - A knowledge Based ApproachInformation Leakage - A knowledge Based Approach
Information Leakage - A knowledge Based Approach
 
Understanding the-demand-supply-equations-of-corruption-fraud-final
Understanding the-demand-supply-equations-of-corruption-fraud-finalUnderstanding the-demand-supply-equations-of-corruption-fraud-final
Understanding the-demand-supply-equations-of-corruption-fraud-final
 
Unethical Behavior in Business - The Case Against HSBC
Unethical Behavior in Business - The Case Against HSBCUnethical Behavior in Business - The Case Against HSBC
Unethical Behavior in Business - The Case Against HSBC
 
Classifying Data to Help Secure Business Information - Template fromMicrosoft
Classifying Data to Help Secure Business Information - Template fromMicrosoftClassifying Data to Help Secure Business Information - Template fromMicrosoft
Classifying Data to Help Secure Business Information - Template fromMicrosoft
 
SCS Presentation - Corporate Governance
SCS Presentation - Corporate GovernanceSCS Presentation - Corporate Governance
SCS Presentation - Corporate Governance
 
Control of ground water in excavation
Control of ground water in excavation Control of ground water in excavation
Control of ground water in excavation
 
Avoiding Off-Label Promotion
Avoiding Off-Label PromotionAvoiding Off-Label Promotion
Avoiding Off-Label Promotion
 
Data Leakage Prevention (DLP)
Data Leakage Prevention (DLP)Data Leakage Prevention (DLP)
Data Leakage Prevention (DLP)
 
Finance Professionals Meeting Today’s Business Challenges
Finance Professionals Meeting Today’s Business ChallengesFinance Professionals Meeting Today’s Business Challenges
Finance Professionals Meeting Today’s Business Challenges
 
A Relevant Accountancy Profession
A Relevant Accountancy ProfessionA Relevant Accountancy Profession
A Relevant Accountancy Profession
 
Arnold schilder-iaasb-pcaob-sag-presentation
Arnold schilder-iaasb-pcaob-sag-presentationArnold schilder-iaasb-pcaob-sag-presentation
Arnold schilder-iaasb-pcaob-sag-presentation
 
Formwork by chakamba john
Formwork by chakamba johnFormwork by chakamba john
Formwork by chakamba john
 
Financial Instruments Education Session Part A
Financial Instruments Education Session Part AFinancial Instruments Education Session Part A
Financial Instruments Education Session Part A
 
IAASB New Auditor's Report
IAASB New Auditor's ReportIAASB New Auditor's Report
IAASB New Auditor's Report
 
Corruption and Fraud Risk Management using ISO 31000
Corruption and Fraud Risk Management using ISO 31000Corruption and Fraud Risk Management using ISO 31000
Corruption and Fraud Risk Management using ISO 31000
 
Dealing with unethical behaviors in organizations
Dealing with unethical behaviors in organizationsDealing with unethical behaviors in organizations
Dealing with unethical behaviors in organizations
 
Fraud Risk and Control
Fraud Risk and ControlFraud Risk and Control
Fraud Risk and Control
 

Similar a Data Leakage Prevention

DSS.LV - Principles Of Data Protection - March2015 By Arturs Filatovs
DSS.LV - Principles Of Data Protection - March2015 By Arturs FilatovsDSS.LV - Principles Of Data Protection - March2015 By Arturs Filatovs
DSS.LV - Principles Of Data Protection - March2015 By Arturs FilatovsAndris Soroka
 
Deep dive into Microsoft Purview Data Loss Prevention
Deep dive into Microsoft Purview Data Loss PreventionDeep dive into Microsoft Purview Data Loss Prevention
Deep dive into Microsoft Purview Data Loss PreventionDrew Madelung
 
Prevent Data Leakage Using Windows Information Protection (WIP)
Prevent Data Leakage Using Windows Information Protection (WIP)Prevent Data Leakage Using Windows Information Protection (WIP)
Prevent Data Leakage Using Windows Information Protection (WIP)BeyondTrust
 
Info Security: Microsoft Dynamic Access Control
Info Security: Microsoft Dynamic Access Control Info Security: Microsoft Dynamic Access Control
Info Security: Microsoft Dynamic Access Control McOWLMarketing
 
Explore Top Data Loss Prevention Tools | Fortify with DLP Software
Explore Top Data Loss Prevention Tools | Fortify with DLP SoftwareExplore Top Data Loss Prevention Tools | Fortify with DLP Software
Explore Top Data Loss Prevention Tools | Fortify with DLP SoftwareKonverge Technologies Pvt. Ltd.
 
Microsoft Azure Rights Management
Microsoft Azure Rights ManagementMicrosoft Azure Rights Management
Microsoft Azure Rights ManagementDavid J Rosenthal
 
Identity and User Access Management.pptx
Identity and User Access Management.pptxIdentity and User Access Management.pptx
Identity and User Access Management.pptxirfanullahkhan64
 
SharePoint Online vs. On-Premise
SharePoint Online vs. On-PremiseSharePoint Online vs. On-Premise
SharePoint Online vs. On-PremiseEvan Hodges
 
Breakdown of Microsoft Purview Solutions
Breakdown of Microsoft Purview SolutionsBreakdown of Microsoft Purview Solutions
Breakdown of Microsoft Purview SolutionsDrew Madelung
 
Denodo’s Data Catalog: Bridging the Gap between Data and Business
Denodo’s Data Catalog: Bridging the Gap between Data and BusinessDenodo’s Data Catalog: Bridging the Gap between Data and Business
Denodo’s Data Catalog: Bridging the Gap between Data and BusinessDenodo
 
Data Services Marketplace
Data Services MarketplaceData Services Marketplace
Data Services MarketplaceDenodo
 
Why you should use common data service final
Why you should use common data service finalWhy you should use common data service final
Why you should use common data service finalJoel Lindstrom
 
ppt-security-dbsat-222-overview-nodemo.pdf
ppt-security-dbsat-222-overview-nodemo.pdfppt-security-dbsat-222-overview-nodemo.pdf
ppt-security-dbsat-222-overview-nodemo.pdfcamyla81
 
Microsoft Cloud GDPR Compliance Options (SUGUK)
Microsoft Cloud GDPR Compliance Options (SUGUK)Microsoft Cloud GDPR Compliance Options (SUGUK)
Microsoft Cloud GDPR Compliance Options (SUGUK)Andy Talbot
 
Make your Azure PaaS Deployment More Safe
Make your Azure PaaS Deployment More SafeMake your Azure PaaS Deployment More Safe
Make your Azure PaaS Deployment More SafeThuan Ng
 
Office 365 Security, Privacy and Compliance - SMB Nation 2015
Office 365 Security, Privacy and Compliance - SMB Nation 2015Office 365 Security, Privacy and Compliance - SMB Nation 2015
Office 365 Security, Privacy and Compliance - SMB Nation 2015Robert Crane
 
Oracle Database 11g Security and Compliance Solutions - By Tom Kyte
Oracle Database 11g Security and Compliance Solutions - By Tom KyteOracle Database 11g Security and Compliance Solutions - By Tom Kyte
Oracle Database 11g Security and Compliance Solutions - By Tom KyteEdgar Alejandro Villegas
 
gkkCloudtechnologyassociate(cta)day 2
gkkCloudtechnologyassociate(cta)day 2gkkCloudtechnologyassociate(cta)day 2
gkkCloudtechnologyassociate(cta)day 2Anne Starr
 

Similar a Data Leakage Prevention (20)

DSS.LV - Principles Of Data Protection - March2015 By Arturs Filatovs
DSS.LV - Principles Of Data Protection - March2015 By Arturs FilatovsDSS.LV - Principles Of Data Protection - March2015 By Arturs Filatovs
DSS.LV - Principles Of Data Protection - March2015 By Arturs Filatovs
 
Biznet Gio Presentation - Database Security
Biznet Gio Presentation - Database SecurityBiznet Gio Presentation - Database Security
Biznet Gio Presentation - Database Security
 
Deep dive into Microsoft Purview Data Loss Prevention
Deep dive into Microsoft Purview Data Loss PreventionDeep dive into Microsoft Purview Data Loss Prevention
Deep dive into Microsoft Purview Data Loss Prevention
 
Prevent Data Leakage Using Windows Information Protection (WIP)
Prevent Data Leakage Using Windows Information Protection (WIP)Prevent Data Leakage Using Windows Information Protection (WIP)
Prevent Data Leakage Using Windows Information Protection (WIP)
 
Info Security: Microsoft Dynamic Access Control
Info Security: Microsoft Dynamic Access Control Info Security: Microsoft Dynamic Access Control
Info Security: Microsoft Dynamic Access Control
 
Explore Top Data Loss Prevention Tools | Fortify with DLP Software
Explore Top Data Loss Prevention Tools | Fortify with DLP SoftwareExplore Top Data Loss Prevention Tools | Fortify with DLP Software
Explore Top Data Loss Prevention Tools | Fortify with DLP Software
 
Microsoft Azure Rights Management
Microsoft Azure Rights ManagementMicrosoft Azure Rights Management
Microsoft Azure Rights Management
 
Identity and User Access Management.pptx
Identity and User Access Management.pptxIdentity and User Access Management.pptx
Identity and User Access Management.pptx
 
SharePoint Online vs. On-Premise
SharePoint Online vs. On-PremiseSharePoint Online vs. On-Premise
SharePoint Online vs. On-Premise
 
Breakdown of Microsoft Purview Solutions
Breakdown of Microsoft Purview SolutionsBreakdown of Microsoft Purview Solutions
Breakdown of Microsoft Purview Solutions
 
Harsha CV
Harsha CVHarsha CV
Harsha CV
 
Denodo’s Data Catalog: Bridging the Gap between Data and Business
Denodo’s Data Catalog: Bridging the Gap between Data and BusinessDenodo’s Data Catalog: Bridging the Gap between Data and Business
Denodo’s Data Catalog: Bridging the Gap between Data and Business
 
Data Services Marketplace
Data Services MarketplaceData Services Marketplace
Data Services Marketplace
 
Why you should use common data service final
Why you should use common data service finalWhy you should use common data service final
Why you should use common data service final
 
ppt-security-dbsat-222-overview-nodemo.pdf
ppt-security-dbsat-222-overview-nodemo.pdfppt-security-dbsat-222-overview-nodemo.pdf
ppt-security-dbsat-222-overview-nodemo.pdf
 
Microsoft Cloud GDPR Compliance Options (SUGUK)
Microsoft Cloud GDPR Compliance Options (SUGUK)Microsoft Cloud GDPR Compliance Options (SUGUK)
Microsoft Cloud GDPR Compliance Options (SUGUK)
 
Make your Azure PaaS Deployment More Safe
Make your Azure PaaS Deployment More SafeMake your Azure PaaS Deployment More Safe
Make your Azure PaaS Deployment More Safe
 
Office 365 Security, Privacy and Compliance - SMB Nation 2015
Office 365 Security, Privacy and Compliance - SMB Nation 2015Office 365 Security, Privacy and Compliance - SMB Nation 2015
Office 365 Security, Privacy and Compliance - SMB Nation 2015
 
Oracle Database 11g Security and Compliance Solutions - By Tom Kyte
Oracle Database 11g Security and Compliance Solutions - By Tom KyteOracle Database 11g Security and Compliance Solutions - By Tom Kyte
Oracle Database 11g Security and Compliance Solutions - By Tom Kyte
 
gkkCloudtechnologyassociate(cta)day 2
gkkCloudtechnologyassociate(cta)day 2gkkCloudtechnologyassociate(cta)day 2
gkkCloudtechnologyassociate(cta)day 2
 

Más de Microsoft TechNet - Belgium and Luxembourg

Más de Microsoft TechNet - Belgium and Luxembourg (20)

Windows 10: all you need to know!
Windows 10: all you need to know!Windows 10: all you need to know!
Windows 10: all you need to know!
 
Configuration Manager 2012 – Compliance Settings 101 - Tim de Keukelaere
Configuration Manager 2012 – Compliance Settings 101 - Tim de KeukelaereConfiguration Manager 2012 – Compliance Settings 101 - Tim de Keukelaere
Configuration Manager 2012 – Compliance Settings 101 - Tim de Keukelaere
 
Windows 8.1 a closer look
Windows 8.1 a closer lookWindows 8.1 a closer look
Windows 8.1 a closer look
 
So you’ve successfully installed SCOM… Now what.
So you’ve successfully installed SCOM… Now what.So you’ve successfully installed SCOM… Now what.
So you’ve successfully installed SCOM… Now what.
 
Deploying and managing ConfigMgr Clients
Deploying and managing ConfigMgr ClientsDeploying and managing ConfigMgr Clients
Deploying and managing ConfigMgr Clients
 
Self Service BI anno 2013 – Where Do We Come From and Where Are We Going?
Self Service BI anno 2013 – Where Do We Come From and Where Are We Going?Self Service BI anno 2013 – Where Do We Come From and Where Are We Going?
Self Service BI anno 2013 – Where Do We Come From and Where Are We Going?
 
Hands on with Hyper-V Clustering Maintenance Mode & Cluster Aware Updating
Hands on with Hyper-V Clustering Maintenance Mode & Cluster Aware UpdatingHands on with Hyper-V Clustering Maintenance Mode & Cluster Aware Updating
Hands on with Hyper-V Clustering Maintenance Mode & Cluster Aware Updating
 
SCEP 2012 inside SCCM 2012
SCEP 2012 inside SCCM 2012SCEP 2012 inside SCCM 2012
SCEP 2012 inside SCCM 2012
 
Jump start your application monitoring with APM
Jump start your application monitoring with APMJump start your application monitoring with APM
Jump start your application monitoring with APM
 
What’s new in Lync Server 2013: Persistent Chat
What’s new in Lync Server 2013: Persistent ChatWhat’s new in Lync Server 2013: Persistent Chat
What’s new in Lync Server 2013: Persistent Chat
 
What's new for Lync 2013 Clients & Devices
What's new for Lync 2013 Clients & DevicesWhat's new for Lync 2013 Clients & Devices
What's new for Lync 2013 Clients & Devices
 
Office 365 ProPlus: Click-to-run deployment and management
Office 365 ProPlus: Click-to-run deployment and managementOffice 365 ProPlus: Click-to-run deployment and management
Office 365 ProPlus: Click-to-run deployment and management
 
Office 365 Identity Management options
Office 365 Identity Management options Office 365 Identity Management options
Office 365 Identity Management options
 
SharePoint Installation and Upgrade: Untangling Your Options
SharePoint Installation and Upgrade: Untangling Your Options SharePoint Installation and Upgrade: Untangling Your Options
SharePoint Installation and Upgrade: Untangling Your Options
 
The application model in real life
The application model in real lifeThe application model in real life
The application model in real life
 
Microsoft private cloud with Cisco and Netapp - Flexpod solution
Microsoft private cloud with Cisco and Netapp -  Flexpod solutionMicrosoft private cloud with Cisco and Netapp -  Flexpod solution
Microsoft private cloud with Cisco and Netapp - Flexpod solution
 
Managing Windows RT devices in the Enterprise
Managing Windows RT devices in the Enterprise Managing Windows RT devices in the Enterprise
Managing Windows RT devices in the Enterprise
 
Moving from Device Centric to a User Centric Management
Moving from Device Centric to a User Centric Management Moving from Device Centric to a User Centric Management
Moving from Device Centric to a User Centric Management
 
Network Management in System Center 2012 SP1 - VMM
Network Management in System Center 2012  SP1 - VMM Network Management in System Center 2012  SP1 - VMM
Network Management in System Center 2012 SP1 - VMM
 
Hackers (Not) Halted
Hackers (Not) Halted Hackers (Not) Halted
Hackers (Not) Halted
 

Último

Landscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfLandscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfAarwolf Industries LLC
 
Kuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorialKuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorialJoão Esperancinha
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...Nikki Chapple
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integrationmarketing932765
 
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...amber724300
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Digital Tools & AI in Career Development
Digital Tools & AI in Career DevelopmentDigital Tools & AI in Career Development
Digital Tools & AI in Career DevelopmentMahmoud Rabie
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Mark Simos
 
Accelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessAccelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessWSO2
 
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...Karmanjay Verma
 
Infrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsInfrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsYoss Cohen
 
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Jeffrey Haguewood
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFMichael Gough
 

Último (20)

Landscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfLandscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdf
 
Kuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorialKuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorial
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
 
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Digital Tools & AI in Career Development
Digital Tools & AI in Career DevelopmentDigital Tools & AI in Career Development
Digital Tools & AI in Career Development
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
 
Accelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessAccelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with Platformless
 
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
 
Infrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsInfrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platforms
 
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDF
 

Data Leakage Prevention

  • 1. Data Leakage Prevention in your Microsoft Infrastructure Paul Loonen IAM Architect, Verizon Enterprise Solutions
  • 2. About me • Co-founder WinTalks.be • MVP: Microsoft Forefront Identity Manager • MCM Directory • Job Role: IAM Architect @ Verizon Enterprise Solutions • paul.loonen@be.verizon.com • Blog @ http://be-id.blogspot.com • @ploonen (@wintalksbe)
  • 3. Disclaimer • Focus is on using what you already (may) have … • Everything I say won’t help against this:
  • 4. Agenda • The Data Leakage Problem • How to approach DLP • Data classification • Protecting Your Data
  • 5. What is Data Leakage
  • 6. Information Leakage Is Costly On Multiple Fronts • Cost of digital leakage per year is measured in $ billions • Increasing number and complexity of regulations, e.g. GLBA, SOX, CA SB 1386 • Non-compliance with regulations or loss of data can lead to significant legal fees, fines and/or jail time Legal, Regulatory & Financial impacts • Damage to public image and credibility with customers • Financial impact on company • Leaked e-mails or memos can be embarrassing Damage to Image & Credibility • Disclosure of strategic plans, M&A info potentially lead to loss of revenue, market capitalization • Loss of research, analytical data, and other intellectual capital Loss of Competitive Advantage
  • 7. Risk Areas PII • Birth Date • Employee Numbers • Social Security / National Numbers • Credit card Information (PCI) • Personal Health Information IP • Source Code • Product Design Documents • Research Information • Patent Applications • Customer Lists NPI • Financial Information • Mergers & Acquisitions activities and information • Executive communication • Legal and Regulatory Matters • Corporate Policies
  • 8. Do you want to be this people?
  • 9. How does this happen, by who? • Ex-employees, partners, customers • Over 1/3 due to negligence • Nearly 30% of loss on portable devices • Increasing loss from external collaboration Percentage cause of data breach Cost of Data Breach report Ponemon Institute 2010 Estimated sources of data breach Verizon Data Breach Investigation Report 2013
  • 10. Variety of Misuse Actions Source: Verizon Data Breach Investigation Report 2013
  • 11. So, what is DLP? • DLP means different things to different people • Data Loss Prevention • Data Leakage Prevention • Data Loss Protection • DLP is always about protecting information that is sensitive to an organization • DLP technology is content aware • referred to as deep packet inspection, analyzes the payload contained within a file or session. • DLP references data in one of three states • Data in motion • Data at rest • Data in use
  • 13. Approach Strategy Assessment Data Discovery & Classification Encryption / Key Management Data-Leak Prevention Post-Leak Management Business case validation, plan for solution deployment, define and enhance process and policies Locate and classify sensitive data on file systems, emails, applications, endpoints, etc. Render sensitive information unreadable to unauthorized sources Enforce controls and policies to reduce leakage of sensitive information from secured networks and systems Enforce controls to protect sensitive data post leak
  • 15. Managing data on file servers Looking at the problem space for a data repository • One of the largest repositories of data in the organization • Regulatory compliance periodic audits are expensive and labor intensive • Data leakage of sensitive information • Exposure of information due to complexity of granting access on a need to know basis
  • 16. File Classification Infrastructure Tagging Information Location based Manual Automatic classification Application In-box content classifier 3rd party classification plugin // instantiate new classification manager FsrmClassificationManager cls = new FsrmClassificationManager(); //get defined properties ICollection c = cls.EnumPropertyDefinitions (_FsrmEnumOptions.FsrmEnumOptions_None); // inspect each property definition foreach (IFsrmPropertyDefinition p in c) { /*...*/ }
  • 17. File Classification Infrastructure Applying policy based on classification Match file to policy Classify file Access control Audit control RMS Encryption Retention Other actions
  • 18. How do I get “FCI”? File Server Resource Manager Overview of FSRM: http://technet.microsoft.com/en-us/library/hh831701(v=ws.11)
  • 19. Where do I get FSRM? PS C:> Install-WindowsFeature –Name FS-Resource-Manager –IncludeManagementTools
  • 20. Configuring Classification with FSRM (the manual way)
  • 22. Data Classification Toolkit for Windows Server 2012 • Free download: http://technet.microsoft.com/en- us/library/hh204743.aspx • Assists you in configuring FCI in your environment • Allows managing Central Access Policy across file servers • Integrates with Dynamic Access Control and AD RMS • Scenario-based • Classification configuration package examples provided
  • 26. //sidenote • Enable FCI tab in explorer on Windows 8 clients:
  • 27. Typical Infrastructure • Win8 or Win7SP1 Client with toolkit installed • SQL Server when reporting is required • Reporting DB • DB of file servers running FCI • Limited reporting without SQL Server • Win2k12 DC • Domain functional level must be Win2k12 – this enables Central Access Policy • Otherwise local file server properties … • File servers running FCI • Win2k8 R2 or Win2k12
  • 29. Dynamic Access Control • Brings existing identity claims model into the Windows platform • WIF, ADFS • Introduce a model to target access and audit policies based on tagging to drive efficient policy enforcement and implement this model for files • Bridge the gap between IT & Information Owners using information tagging for files
  • 30. Expression-based access control policy User claims User.Department = Finance User.Clearance = High ACCESS POLICY Applies to: @Resource.Impact == “High” Allow | Read, Write | if (@User.Clearance == “High”) AND (@Device.Managed == True) Device claims Device.Department = Finance Device.Managed = True Resource properties Resource.Department = Finance Resource.Impact = High
  • 31. Authorization – Updated ACL Model Support for Expression with ‘AND’/’OR ’ primitives User.memberOf (USA-Employees) AND User.memberOf (Finance-Division) AND User.memberOf (Authorization-Project) Support for User Claims from AD User.Division = ‘Finance’ AND User.CostCenter = 20000 Support for Static Device Claims from AD User.Division = ‘Finance’ AND Device.ITManaged = True Target Policy based on Resource Type IF (Resource.Impact = ‘HBI’) ALLOW AU Read User.EmployeeType = ‘FTE’ • No expressions in ACL • Led to group bloat • ACLs only based on groups • Led to group bloat • No ability to control access based on device state • No way to target policy based on Resource Type • Claims support in ACEs managed as SDDL strings • Added / removed from SDDL strings via standard string manipulation functions Legacy Windows New in Win2k12 Example
  • 32. Claim Definitions Resource Property Definitions Access policy DC File Server Allow/ Deny End User Control access to information
  • 33. Protecting Your Data Active Directory Rights Management Services (AD RMS)
  • 34. What is AD RMS? • Information Protection technology • Aimed at reducing information leakage • Server and client components • Integrated with Windows, Office, Exchange, SharePoint and more • Based on Symmetric and Public Key Cryptography • Protects data at rest, in transit and in use • Helps enforce corporate data policies • Installed as a server role
  • 35. How AD RMS Works • Client and user are “activated” • Client creates rights-protected content (offline) • User distributes rights-protected content • Recipient acquires licenses from server to decrypt protected information • Client enforces usage policies
  • 36. Using IRM to avoid data leakage • Encryption provides protection from unauthorized access • Most effective if it is identity-based • How you manage encryption is essential • Needs to be independent from content management • Must be integrated with ID management • Must be simple to use • Must be strong, reliable and recoverable • Encryption is not enough • Users will misuse information if they can • Even trusted users make mistakes • But if policy is clear and not easily circumvented, legitimate users will follow the policies
  • 37. AD RMS Highlights • Robust protection • AES 128 bits, RSA 1024 bits, HSM support • Extensive client-side enforcement • Very easy to use • UI integrated with Office products • Authors just select the appropriate option • No action required on consumers of protected information • No significant need for user technical training • Transparent operation • Automated certificate and license management • Small traffic and volume overhead • Low infrastructure cost
  • 38. Protecting information with AD RMS • Users can manually assign rights over a document • Who can read, print, edit, copy… • Can assign rights to users or groups • Document expiration, programmatic access, other advanced options • Some applications have pre-defined options • E.g. Outlooks “Do Not Forward” • Users can use a pre-built template • Templates reflect the organization’s security policies • Company Confidential • Managers only • Contains private information • Etc. • Templates enforce a pre-defined set of rights • Templates are enforced at time of consumption • Some applications can automatically apply protection
  • 39. What documents can I protect using AD RMS? • Anything really • AD RMS SDK 2.0 (http://www.microsoft.com/en- us/download/details.aspx?id=29893) • Microsoft Office file formats (Word, Excel, PowerPoint) • Many other formats using 3rd party (foxit, Titus, …) • Rights Protected Folder Explorer (“RPFe”) • Controls access to files contained in RPF • Caveat: when file is “extracted” it is no longer protected
  • 40. Certification & Licensing Client Machines RMS Components Detail RMS “Root” Certification Cluster IIS, ASP.NET Active Directory • Identity list • Service Connection point RMS Licensing Cluster RMS Web Services: • Publishing • Licensing IIS, ASP.NET Logging Database NLB Administration: • Service connection point • Policy Templates • Logging Settings RMS Web Services: • Certification • Publishing • Licensing SQL Server • Configuration • Logging • Directory RMS Client + “Lockbox” RMS-enabled applications User Certificate + key pair Machine Certificate + key pair Licensing NLB SQL
  • 41. Windows RMS Key Flow Standard Publish-and-Consume Scenario Information Author Recipie nt RMS Server Database Server Active Directory 2 3 4 5 2. Author applies an RMS policy to their file. The application works with the RMS client to create a “publishing license”, encrypts the file, and appends the publishing license to it. 3. Author distributes file. 4. Recipient clicks file to open. The application sends the recipient’s credentials and the publish license to the RMS server, which validates the user and issues a “use license.” 5. Application renders file and enforces rights. 1. Author automatically receives RMS credentials (“rights account certificate” and “client licensor certificate”) the first time they rights-protect information. 1
  • 42. AD RMS and SharePoint • When content is downloaded from a library… • RMS protection automatically applied • Information still searchable in SharePoint library • SharePoint rights  IRM permissions Recipient AD RMS SharePoint
  • 43. AD RMS & Exchange • When users are sending emails unprotected… • Exchange transport rules apply RMS automatically • Based on content (what it says) and context (who its going to) analysis • Consume protected email in IE, Firefox and Safari Recipient Information Author AD RMS Exchange
  • 44. AD RMS and file shares • When content is saved to a network file share... • Bulk Protection Tool secures all content in certain folders • File Classification Infrastructure (FCI) can automate classification, RMS and move into SharePoint AD RMS File Server Information Author SharePoint
  • 46. BitLocker vs BitLocker to Go BitLocker • TPM • Operating System • Data Partitions (Fixed) • TPM, Dongle, Pin • Requires System Partition BitLocker to Go • Data Partition (Removable) • Password, Auto-Unlock, Smartcards • Supports FAT • XP / Vista (Read Only)
  • 47. BitLocker Group Policy Settings • BitLocker Group Policy settings can • Turn on BitLocker backup to Active Directory • Enable, enforce or disable password or smartcard protectors • Enforce a minimum password length • Enforce password complexity • Deny write access to drives not encrypted with BitLocker • Do not allow write access to devices from other organizations
  • 48. Data Drive Key Password Auto-Unlock Smartcards EaseofUse BitLocker offers a spectrum of protection allowing to balance ease-of-use against the threats you are most concerned with Security Pros: Ease of use backward compatibility BitLocker to go reader Cons: Less secure vulnerable to brute force and dictionary attacks Pros: Uses a stronger key Cons: Specific to a single machine Pros: Uses much stronger keys Cons: Requires hardware not backward compatible XXXXX
  • 49. Active Directory Based Recovery Requirements • Schema needs to be extended • Windows Server 2008 R2 or later • All DC’s must be Windows Server 2003 SP1 or later
  • 50. Data Recovery Agent New Recovery Mechanism • Certificate-based key protector • A certificate containing a public key is distributed through Group Policy and is applied to any drive that mounts • The corresponding private key is held by a data recovery agent in the IT department • Allows IT department to have a way to unlock all protected drives in an enterprise • Saves space in AD – same Key Protector on all drives
  • 51. Enforcement • Requiring BitLocker for data drives • When this policy is enforced, all data drives will require BitLocker protection in order to have write access • As soon as a drive is plugged into a machine, a dialog is displayed to the user to either enable BitLocker on the device or only have read- only access • The user gets full RW access only after encryption is completed • Users can alternatively enable BitLocker at a later time
  • 52. Cross-Organization • This policy will help enterprises manage compliance when a requirement exists to not allow devices to roam outside of the enterprise • When the "Deny write access to devices configured in another organization" policy is enabled • Only drives with identification fields matching the computer's identification fields will be given write access • When a removable data drive is accessed it will be checked for valid identification field and allowed identification fields • These fields are defined by the "Provide the unique identifiers for your organization" policy setting • For existing drives: manage-bde -SetIdentifier <drive letter>
  • 53. Recommendations • Identification fields • Should be set before your deployment if you are planning to use DRAs or the cross-organization policy • Are automatically set during encryption • Can be set after encryption using Manage-BDE or WMI but this requires Administrator rights • Certificates • Deploy the required certificates before enabling BitLocker on data drives • BitLocker To Go Reader • Installed per default but can be managed through group policies • Requires the use of a password • Can be deployed separately using a software distribution tool
  • 54. More policies that help prevent leakage via removable drives
  • 56. Encrypting File System (EFS) Features • Transparent encryption done at the file-system level • If a folder is marked, every file created or moved into it will be encrypted • File encryption keys can be archived (USB Flash Drive, File server) • There is no “back door” • Keys are protected with the users password on the computer • Data Recovery Agent to allow for recovery of files if user’s key is lost page 56
  • 57. What It Doesn’t Protect or Prevent • It does NOT provide encryption to files that are: • Sent via email • Kept on a separate flash drive/thumb drive/USB drive/floppy disk • Moved over the network via shared folders (CIFS/AFS) • System and page file • It does not prevent • Files moved into folder set to encrypt all files • Files form being deleted • When you are about to move an encrypted file, Windows will warn you that you will lose your EFS encryption. • Keep in mind that whenever you move a file off of your computer, it is probably no longer protected by EFS.
  • 59. Scenario RMS EFS BitLocker Protect my information outside my direct control Set fine-grained usage policy on my information Collaborate with others on protected information Protect my information to my smartcard Untrusted admin of a file share Protect information from other users on shared machine Lost or stolen laptop Physically insecure branch office server Local single-user file & folder protection RMS vs EFS vs BitLocker Secure Collaboration Protect Yourself Protect Against Theft
  • 60. Summary • Think strategy when starting a DLP project • Data classification • Let’s you know what data you have and where it sits • Allows implementing controls on metadata • Protection comes in many shapes • Dynamic Access Control • AD RMS • Bitlocker To Go • Encrypting File System (EFS) • Protection doesn’t stop with one implemented control • Combination of multiple controls will be your ticket • Think about reporting • 3rd party solutions complement Microsoft building blocks
  • 61. Some References • Verizon Data Breach Investigations Report 2013 • http://www.verizonenterprise.com/DBIR/2013/ • Classification • FCI - http://technet.microsoft.com/en-us/library/hh831660.aspx • WSRM - http://technet.microsoft.com/en-us/library/cc732553.aspx • DCT - http://technet.microsoft.com/en-us/library/hh204743.aspx • DAC • http://technet.microsoft.com/en-us/library/hh831717.aspx • AD RMS • AD RMS Team Blog: http://blogs.technet.com/b/rms/ • http://technet.microsoft.com/en-us/library/cc771234(v=ws.10).aspx • RPFe - http://technet.microsoft.com/library/Hh538204.aspx • Bitlocker to Go • http://technet.microsoft.com/en-us/library/dd875547(v=ws.10).aspx

Notas del editor

  1. PII – Personal Identifiable InformationIP – Intellectual PropertyNPI – Non-public Personal Information
  2. All of this started with the introduction of claims with WIF and ADFS. This is great because you don’t need to think about authN and authZ.This model was pushed into the core of Windows so that we can give developers the right level of flexibility and granularity to drive applicationsAdditionally, there is the challenge of applying policy. In Win8 we use classification and tagging as a key pivot to apply access control to data
  3. Today, ACLs have ACEs that list the SIDs that have access to the resourceExpressions allow need for less groups because you combine anythingBefore Win8, ACLs can only be based on groups, now we can base them on claims, which come from AD
  4. Rights Protected Folder Explorer allows you to work with Rights Protected Folders. A Rights Protected Folder is similar to a file folder in that it contains files and folders. However, a Rights Protected Folder controls access to the files that it contains, no matter where the Rights Protected Folder is located. By using Rights Protected Folder Explorer, you can securely store or send files to authorized users and control which users will be able to access those files while they are in the Rights Protected Folder.
  5. The drive must be formatted by using either the exFAT, FAT16, FAT32, or NTFS file system.The drive must have at least 64 MB of available disk space.The operating system drive must be protected by BitLocker if you want the drive to be unlocked automatically.BitLocker To Go Reader (bitlockertogo.exe) may be used to unlock FAT-formatted removable drives accessed using a computer running Windows Vista or Windows XP. Once unlocked by the BitLocker To Go Reader you will have read-only access to the files stored on the removable drive. This means you will not be able to modify the drive by adding new files to it or changing the contents of the existing files on the drive. If you plan on using the BitLocker To Go Reader you must use a password as one of your BitLocker key protectors. The BitLocker To Go Reader cannot use credentials from a smart card or from a TPM.
  6. Identification fields are required for management of certificate-based data recovery agents on BitLocker-protected drives. BitLocker will manage and update certificate-based data recovery agents only when the identification field is present on a drive and is identical to the value configured on the computer. The identification field can be any value of 260 characters or fewer.
  7. Encryption is done at the file-system level – Not at the application level and normal usage is transparent to the user