Data Loss Prevention (DLP)

Data Loss Prevention (DLP)

One-liner: Security controls that detect and prevent unauthorized transmission or exfiltration of sensitive data.

🎯 What Is It?

Data Loss Prevention (DLP) is a set of tools and policies designed to prevent sensitive data from leaving an organization's control. DLP is a critical countermeasure against the Actions on Objectives stage of the Cyber Kill Chain, specifically targeting Data Exfiltration.

πŸ”¬ How It Works

DLP Architecture

β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”
β”‚                    DLP Components                        β”‚
β”œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€
β”‚                                                          β”‚
β”‚  β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”  β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”  β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”              β”‚
β”‚  β”‚ Endpoint β”‚  β”‚ Network  β”‚  β”‚  Cloud   β”‚              β”‚
β”‚  β”‚   DLP    β”‚  β”‚   DLP    β”‚  β”‚   DLP    β”‚              β”‚
β”‚  β””β”€β”€β”€β”€β”¬β”€β”€β”€β”€β”€β”˜  β””β”€β”€β”€β”€β”¬β”€β”€β”€β”€β”€β”˜  β””β”€β”€β”€β”€β”¬β”€β”€β”€β”€β”€β”˜              β”‚
β”‚       β”‚             β”‚             β”‚                     β”‚
β”‚       β–Ό             β–Ό             β–Ό                     β”‚
β”‚  USB/Print     Email/Web     SaaS Apps                 β”‚
β”‚  Local Copy    File Transfer  Cloud Storage            β”‚
β”‚                                                          β”‚
β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜

Detection Methods

Method Description Example
Content Inspection Analyze file/message content Credit card numbers, SSNs
Context Analysis Evaluate who, where, when Unusual time, location
Pattern Matching Regex for structured data \d{3}-\d{2}-\d{4} (SSN)
Fingerprinting Hash-based document matching Specific confidential docs
Machine Learning Classify sensitive content Unstructured PII detection

DLP Actions

Action Description
Monitor Log and alert, don't block
Block Prevent transmission
Encrypt Force encryption before allowing
Quarantine Hold for review
Notify Alert user/admin
Justify Require user explanation

πŸ“Š DLP Deployment Types

Type Location Protects Against
Endpoint DLP Workstations USB, printing, clipboard
Network DLP Perimeter Email, web, FTP
Cloud DLP SaaS/IaaS Cloud storage, apps
Email DLP Mail gateway Email attachments, body

Common DLP Solutions

Vendor Solution
Microsoft Purview DLP
Symantec Data Loss Prevention
Forcepoint DLP
Digital Guardian DLP
Zscaler Cloud DLP

πŸ›‘οΈ Implementation Considerations

Data Classification

Classification Levels:
β”œβ”€β”€ Public - No restrictions
β”œβ”€β”€ Internal - Company only
β”œβ”€β”€ Confidential - Need-to-know
β”œβ”€β”€ Restricted - Highly sensitive (PII, PHI)
└── Secret - Maximum protection

Common Sensitive Data Patterns

# Credit Card (Visa)
4[0-9]{12}(?:[0-9]{3})?

# SSN
\d{3}-\d{2}-\d{4}

# Email
[\w.-]+@[\w.-]+\.\w+

# AWS Access Key
AKIA[0-9A-Z]{16}

🎀 Interview Angles

Common Questions

STAR Story

Situation: Organization had no visibility into data leaving via cloud storage services.
Task: Implement controls to prevent unauthorized data exfiltration.
Action: Deployed cloud DLP integrated with CASB. Defined policies for PII, financial data, and source code. Started in monitor mode, tuned for false positives, then enabled blocking.
Result: Identified and blocked 200+ unauthorized upload attempts in first month. Reduced data exposure risk while maintaining productivity through user education.

βœ… Best Practices

❌ Common Pitfalls

πŸ“š References