Download as pdf or txt
Download as pdf or txt
You are on page 1of 31

A S E A R C H CO M P L I A N C E . CO M / S E A R C H S E C U R I T Y.

CO M E - B O O K

Data loss
prevention
strategies,
practices

data prevention and tools


are more
important
than ever.
Here’s what

loss you need


to know.
p
inside
DLP: It’s
Not Just
for Big Firms
Anymore

p Protecting
Your Secret
Sauce

p Where
Data Lives

p Mandating
Encryption

ss
1 DLP ESSENTIALS
lo
CHAPTER 1 » DLP: IT’S NOT JUST FOR BIG FIRMS ANYMORE

DLP: It’s Not Just


for Big Firms Anymore
Rules of thumb to keep information safe
and move toward compliance.
a B Y R I C H A R D E . M AC K E Y
CHAPTER 1
DLP: IT’S NOT
JUST FOR BIG
FIRMS ANYMORE

NEW REGULATIONS FROM Massachu- Card Industry Data Security Standard


a setts and Nevada are forcing organi- (PCI DSS)—even those that do not
CHAPTER 2
PROTECTING zations of all kinds to take data pro- have contractual requirements to
YOUR SECRET tection seriously. comply with it. This is good news for
SAUCE
Massachusetts General Law Chap- consumers, but bad news for organi-
ter 93H and its associated regulation zations hoping to avoid the high cost
a 201 CMR 17.00 prescribe a risk- of documentation, assessments and
CHAPTER 3
WHERE DATA based approach that requires organi- technical controls required by PCI
LIVES
zations possessing identity informa- DSS because they didn’t fit neatly
tion to implement both administra- into the category of merchant or
a tive and technical controls to protect service provider.
CHAPTER 4
MANDATING
the information. Many organizations The good news for companies is
ENCRYPTION that have never considered them- that these regulations will typically
selves the target of attack or the apply only when information is com-
focus of privacy regulations are now promised. Why is this good news?
finding that they are every bit as Because if you take common sense
responsible for compliance with data steps to protect the data, you can
protection regulations as banks, hos- reduce the likelihood of data being
pitals and organizations that handle compromised, and thus reduce the
payment card data. likelihood that you will be audited for
The new regulations require organi- compliance.
zations to place stringent governance All companies can improve their
and technical controls in place. In security by following these rules:
fact, Nevada requires all organiza-
tions that store or process payment ■ Reduce or eliminate unnecessary
cards to comply with the Payment liability. The first step any organiza-

2 DLP ESSENTIALS
CHAPTER 1 » DLP: IT’S NOT JUST FOR BIG FIRMS ANYMORE

tion should consider in data protec- ■ Reduce your profile. One of the
tion is eliminating data that is not key PCI DSS requirements and one of
absolutely required for the business. the fundamental rules of data protec-
It may sound odd, but with some cre- tion is to confine the protected data
ative thinking, many companies can to a small and well-defined environ-
eliminate the need for regulated data. ment. This practice not only simplifies
For example, online merchants can compliance by reducing the environ-
a ment where controls need to be
CHAPTER 1 implemented, but it also facilitates
DLP: IT’S NOT
JUST FOR BIG The first step any access control, data movement moni-
FIRMS ANYMORE toring, access logging, testing and just
organization should about every other security practice.
a consider in data The idea is to centralize data in as
CHAPTER 2
PROTECTING protection is eliminat- few systems and as small a network
YOUR SECRET environment as possible. Once your
SAUCE ing data that is not data is centralized, you can restrict
absolutely required access to the data to a specific group
a for the business. of users and applications. If possible,
CHAPTER 3
WHERE DATA
you should provide mechanisms to
LIVES allow the data to be operated on
while residing on the centralized sys-
a sometimes store only the transaction tem. In other words, avoid copying it
CHAPTER 4 ID for a credit card purchase and or allowing it to move. Tools like data
MANDATING
ENCRYPTION
avoid storing the primary account loss prevention packages can monitor
number long term. Health care com- and restrict data movement to make
panies can sometimes avoid storing your containment even more effec-
Social Security numbers of patients tive. To further restrict the environ-
by replacing them with other identi- ment, deploy firewalls that restrict
fiers that are not covered by regula- connectivity to specific protocols
tions. from only particular addresses or
This kind of sensitive data elimina- zones. Finally, monitor all access and
tion can be practiced to varying data movement (even within the
degrees throughout an organization. environment). This will help ensure
It may not mean that you eliminate all that only the right people have access
instances where compliance is and help to meet regulatory require-
required, but it can reduce the num- ments as well.
ber of places where sensitive data is
used and make the next step—reduc- ■Share only what you must. These
ing your profile—easier to complete. days, very few organizations actually

3 DLP ESSENTIALS
CHAPTER 1 » DLP: IT’S NOT JUST FOR BIG FIRMS ANYMORE

go it alone. Most enlist the help of able to reduce your exposure by


service providers in a variety of ways. removing unnecessary data and map-
Unfortunately, sharing data compli- ping other fields. If after your analy-
cates data protection and brings with sis, obfuscation and mapping you still
it additional compliance activities. For need to share, you had better under-
example, Massachusetts’ regulations, stand how well your partner will care
PCI DSS and the Health Insurance for the data.
a
CHAPTER 1 ■ Know your partners. As we dis-
DLP: IT’S NOT
JUST FOR BIG Sharing data compli- cussed above, all the latest regula-
FIRMS ANYMORE tions require you to assess the prac-
cates data protection tices of organizations to which you
a and brings with it addi- have entrusted protected data. Fortu-
CHAPTER 2
PROTECTING tional compliance nately for organizations that handle
YOUR SECRET payment card data, PCI DSS
SAUCE activities. … If you can, describes the standard that must be
avoid sharing altogether. met and a set of procedures for
a assessment. The situation is not so
CHAPTER 3
WHERE DATA
clear cut for other regulations.
LIVES Portability and Accountability Act all Some organizations conduct their
require organizations to assess the own assessments, some hire consult-
a security practices of partners with ants, and some trust the assessments
CHAPTER 4 which they share protected informa- and audits done by third parties.
MANDATING
ENCRYPTION
tion. This can be an expensive When either conducting assessments
process and is best avoided. Borrow- yourself or using a third party’s
ing an idea we discussed earlier, if you assessment, you should ensure that
can, avoid sharing altogether. the assessment is:
A prudent step before handing any
sensitive information to a partner is 1. Performed with respect to
to analyze the information you need your compliance requirements.
to share and replace any identifying 2. Framed around the practices
information with other types of iden- and environment that will
tifiers. For example, replace Social affect your data.
Security numbers with hashes or IDs 3. Repeated annually.
that you can map to the actual num-
ber, and replace account IDs with Following these rules will help you
similarly obfuscated numbers. avoid accepting SAS 70 audits for
Even if you can’t eliminate all the availability and operations when your
sensitive information, you may be concern is protection of the confiden-

4 DLP ESSENTIALS
CHAPTER 1 » DLP: IT’S NOT JUST FOR BIG FIRMS ANYMORE

tiality of identity data. storage of sensitive data (label


thumb drives, portable drives,
■ Train your employees. While etc.).
sharing your data represents a threat,
one of the most frequent causes of 3. Employ file system encryption
data exposure is human error. Regula- on all laptops and dedicated
tions require you to ensure that your removable media.
a employees understand their responsi-
CHAPTER 1
DLP: IT’S NOT
bility in protecting information. That 4. Track media used for storage
JUST FOR BIG means understanding policies, using of sensitive data.
FIRMS ANYMORE
strong passwords, keeping passwords
private and avoiding exposure by 5. Develop a media disposal
a copying, transmitting or storing data procedure to ensure that devices
CHAPTER 2
PROTECTING in insecure ways. that have been taken out of use
YOUR SECRET do not fall into the wrong hands.
SAUCE ■ Protect your portable devices.
The Massachusetts regulation is the 6. Either encrypt or provide strong
a first to specifically target “portable physical controls for all backup
CHAPTER 3
WHERE DATA devices” in its requirements. Howev- media.
LIVES er, regardless of whether your compa-
ny needs to comply with 201 CMR Compliance with data protection
a 17.00, you should take steps to pro- regulations and contracts has broad-
CHAPTER 4
MANDATING
tect data on any device or medium ened from financial and health care
ENCRYPTION that can be lost or stolen. That means organizations to every company.
laptops, thumb drives, external hard However, these new requirements
drives and all removable media should not cause organizations to
(including backup tapes). panic. It is time for all organizations
This chapter is too short to provide to understand their responsibilities
detailed guidance on even one of and the risks of compromise, and take
these areas, but the following are prudent steps to reduce the risk. By
some rules of thumb that organiza- following some fairly straightforward
tions should follow: rules (as outlined here), an organiza-
tion can greatly reduce the risk of
1. Write policies that clearly speci- compromise and eventually achieve
fy what types of data can or can- compliance with both the current and
not be stored on removable future regulations. ■
media or portable systems.
Richard E. Mackey is vice president of System-
Experts Corp. and a leading authority on enterprise
2. Designate specific devices for security architecture and compliance.

5 DLP ESSENTIALS
Let them
roam
loselaptops
surf
audit
cut budgets
who cares You do! Liberating your people and freeing up time and
resources makes productive sense. Sophos security and data
protection solutions deliver: Install, set and forget. Easy on
your time, easy on your system and easy on your business,
everything from Endpoint to Compliance, Email, Web and
Encryption is covered and all accessed and controlled with
refreshing simplicity.

Now, with security taken care of, you’ve got the rest of the
day to do all the other things that can’t wait.

See for yourself – learn more about Sophos today.


CHAPTER 2 » PROTECTING YOUR SECRET SAUCE

Protecting Your Secret Sauce


Theft of intellectual property is on the rise.
Here are some do’s and don’ts for keeping your
trade secrets safe.
a
CHAPTER 1 BY RU S S E L L J O N E S A N D R E N A M E A R S
DLP: IT’S NOT
JUST FOR BIG
FIRMS ANYMORE

a IT’S A COLD day in late November. Two says Matt Parrella, assistant U.S.
CHAPTER 2
PROTECTING men are getting ready to board a attorney and chief of the San Jose
YOUR SECRET plane bound for Southeast Asia at branch of the U.S. Department of Jus-
SAUCE
San Francisco International Airport. In tice’s CHIP unit.
their luggage is millions of dollars’ “It’s growing in terms of the num-
a worth of stolen trade secrets. These ber and types of trade secret cases
CHAPTER 3
WHERE DATA pilfered project designs, manuals, we’re prosecuting,” he says. “Three to
LIVES CDs, floppy disks and third-party five years ago we saw physical manu-
licensed materials will allow nefarious
a foreign buyers to unlock the secrets
CHAPTER 4
MANDATING
of the most innovative U.S. compa- “It’s growing in terms
ENCRYPTION nies and aggressively compete with
them on the open market. But just as
of the number and types
the men are about to step onto the of trade secret cases
plane, they are arrested by a joint we’re prosecuting.”
FBI/Computer Hacking and Intellec-
—MATT PARELLA
tual Property (CHIP) investigative ASSISTANT U.S. ATTORNEY
team.
It sounds like an episode of a televi-
sion crime drama. Yet this actually als being stolen, whereas today digital
happened in 2001, when two men versions of schematics, data sheets,
tried to flee the country with trade manufacturing processes and source
secrets stolen from a few of the code are at risk. And the number of
biggest names in Silicon Valley. In this complaints being filed and investiga-
case, the criminals were stopped in tions pursued are dramatically on the
their tracks, but theft of trade secrets rise.”
is a growing and evolving problem, According to a 2006 report from

7 DLP ESSENTIALS
CHAPTER 2 » PROTECTING YOUR SECRET SAUCE

the Office of the United States Trade annually from trade secret theft. Fed-
Representative, U.S. businesses are eral law enforcement officials say the
losing approximately $250 billion most targeted industries include

NINE TRADE SECRET TIPS


a
CHAPTER 1
DLP: IT’S NOT 1. Identify a champion within the C-suite who can provide the credibility and
JUST FOR BIG support you will need in implementing an enterprise-wide program.
FIRMS ANYMORE

2. Create an inventory of your company’s trade secrets and the form they
a take (paper-based, electronic, undocumented employee knowledge).
CHAPTER 2
PROTECTING
YOUR SECRET 3. Prioritize the trade secrets according to their value to your organization
SAUCE based on the risk of loss, compromise or theft. To keep things simple, con-
sider using a scale of high, medium or low to rank likelihood and impact.
a
CHAPTER 3 4. Analyze how your company’s trade secrets map to organizational business
WHERE DATA
LIVES
processes throughout their entire lifecycle.

5. Perform a risk assessment against the mapped trade secrets to determine


a which ones are exposed to vulnerabilities that have a high likelihood of
CHAPTER 4
MANDATING happening, and the impact their exposure would have on your organiza-
ENCRYPTION tion.

6. Based on the risk assessment, establish a clearly documented enterprise-


wide data protection framework supported by specific actions laid out in
processes and procedures, roles and responsibilities, and monitoring and
enforcement activities employees can easily follow.

7. Perform a “gap analysis” to determine how well your existing practices


protect your trade secrets vs. the data protection framework.

8. Address gaps using a combination of security and data protection policies


and procedures, process-level controls, technology controls, physical con-
trols and education and awareness.

9. Establish metrics to continually assess the effectiveness of your protection


program. —R.L.J. AND R.M.

8 DLP ESSENTIALS
CHAPTER 2 » PROTECTING YOUR SECRET SAUCE

biotechnologies and pharmaceutical development (R&D) and product


research, advanced materials, not- development activities to overseas
yet-classified weapons systems, com- partners, there is far greater risk that
munications and encryption tech- important information can slip
nologies, nanotechnology and through the cracks. And establishing
quantum computing.
What companies hear about in the
a media is “probably just the tip of the “Balancing the need
CHAPTER 1
iceberg,” says Randy Sabett, a partner
DLP: IT’S NOT
JUST FOR BIG at Sonnenschein Nath & Rosenthal
for improving profit
FIRMS ANYMORE
LLP in Washington, D.C., and a mem- margins with the kind
ber of the firm’s information security of security required to
a and intellectual property practice
CHAPTER 2
group. “There are probably a fair
adequately protect IP
PROTECTING
YOUR SECRET number of situations where people can be very difficult.”
SAUCE
don’t even realize their trade secrets —ABE MICHAEL SMITH
have been stolen.” CSO, XILINX INC.
a
CHAPTER 3
WHERE DATA
LIVES THE CROWN JEWELS overseas divisions that play a signifi-
Intellectual property (IP) is extremely cant role in developing IP can be risky
a important to the U.S. economy. As of when strong IP laws do not exist
CHAPTER 4
MANDATING
2003, IP accounted for approximately within those countries. “Balancing the
ENCRYPTION 33% of the value of U.S. corporations, need for improving profit margins
or more than $5 trillion, according to with the kind of security required to
Stephen Siwek, principal at Econo- adequately protect IP can be very dif-
mists Inc., a consulting firm based in ficult,” Smith says.
Washington, D.C. Yet many compa- Moreover, the unique characteris-
nies are ill-prepared to adequately tics of trade secrets make companies
protect their IP in the face of particularly vulnerable to their loss.
increased attempts to steal it. “Once a trade secret is out of the
At least part of the problem is due bag you can’t get it back in,” Sabett
to economic pressure on U.S. firms to says. “If you are talking about some-
control costs, says Abe Michael thing like source code, that represents
Smith, chief security officer (CSO) at the crown jewels of the company.
Xilinx Inc., a digital programmable And when its status as a trade secret
logic device maker based in San Jose, is gone, it’s gone.”
Calif. As more enterprises outsource Worse, it can take years until a
part or even all of their research and trade secret theft is detected, Smith

9 DLP ESSENTIALS
CHAPTER 2 » PROTECTING YOUR SECRET SAUCE

says. “You wouldn’t even know it source code, marketing plans and
[your IP] was missing for five years, customer information. So varied are
when a competitor would suddenly the things that can be considered
introduce a product that sold for one trade secrets that your employees
third to one fifth of the price of yours.” may not even know when they are
And it is important to note that handling them.
trade secrets are vulnerable to not
a just malicious theft, but also acciden-
CHAPTER 1
DLP: IT’S NOT
tal leakage in the normal course of Part of the reason U.S
JUST FOR BIG business. For example, an engineer
FIRMS ANYMORE
who has not been properly trained in firms are struggling to
what constitutes trade secrets might protect IP is a wides-
a include some in a seemingly innocu-
CHAPTER 2
ous conference presentation.
pread misunderstanding
PROTECTING
YOUR SECRET of what a trade secret
SAUCE
is, and what legal
PUTTING THE SECRET
a IN TRADE SECRET
protection it possesses.
CHAPTER 3
WHERE DATA Part of the reason U.S. firms are
LIVES struggling to protect IP is a wide-
spread misunderstanding of what a For organizations that depend
a trade secret is, and what legal protec- heavily on commercializing the prod-
CHAPTER 4
MANDATING
tion it possesses. uct of their R&D activities, trade
ENCRYPTION A trade secret is a type of intellec- secrets are particularly important.
tual property that represents an orga- Patents are equally important, but
nization’s intangible assets. Unlike trade secrets differ from patents in a
tangible assets such as land, build- significant way. They are—as their
ings, office equipment or manufactur- name implies—secret. Whereas
ing equipment, intangible assets can- patents represent a set of exclusive
not be seen or touched and are rights granted by the government in
created not by physical materials but exchange for the public disclosure of
by human labor or thought. an invention, a trade secret is internal
According to the Uniform Trade information or knowledge that a com-
Secrets Act (UTSA), trade secrets pany claims it alone knows, and
include formulas, patterns, compila- which is a valuable intangible asset.
tions, program devices, methods, While patent owners have certain
techniques or processes. They also legal protections from anyone using
can be diagrams and flow charts, sup- their patents without permission,
plier data, pricing data and strategies, companies are responsible for prov-

10 DLP ESSENTIALS
CHAPTER 2 » PROTECTING YOUR SECRET SAUCE

ing they have the right to legal protec- cy of the IP in question.


tion of their trade secrets. According “A successful prosecution requires
to the UTSA, your company must that you prove you took sufficient
demonstrate that the specific infor- steps to protect your trade secrets,”
mation or knowledge is not generally says Joseph Schadler, an FBI special
known to the public, therefore it agent. “This includes everything from
derives independent economic value, putting banners on computers, to
a having secure logons, to requiring
CHAPTER 1
DLP: IT’S NOT
NDAs [nondisclosure agreements],
JUST FOR BIG
FIRMS ANYMORE
A trade secret’s validity to controlling physical access to a
room.”
can be proven only via
a litigation. Ironically, a
CHAPTER 2
PROTECTING trade secret must be UNSECURED SECRETS
YOUR SECRET Why are many companies not suffi-
SAUCE stolen or compromised ciently protecting their trade secrets?
before you can attempt Aside from not fully understanding
a to demonstrate it is what a trade secret is, many have not
CHAPTER 3
identified their own trade secrets.
WHERE DATA
LIVES legally a trade secret. Even if they have, a lot have not deter-
mined where in the organization their
a secrets are, in what form they exist
CHAPTER 4
MANDATING
and that you have made reasonable (such as digital or paper) and by
ENCRYPTION efforts to make sure the knowledge whom they are used.
remains secret. “If your employees don’t know what
A trade secret’s validity can be to protect, how can they protect it?”
proven only via litigation; there’s no asks Christopher Burgess, senior
automatic protection just because security adviser to the CSO at San
your company believes it possesses Jose, Calif.-based Cisco Systems Inc.
one. Ironically, a trade secret must be Additionally, some companies put a
stolen or compromised before you priority on innovation rather than
can attempt to demonstrate it is security. “The smaller tech compa-
legally a trade secret. Once in litiga- nies in particular need to be very nim-
tion, your company must convince ble, so the focus in the executive suite
the court of three points: secrecy, is on product development and cus-
value and security. Inevitably, the tomer service, rather than protecting
most difficult element to demonstrate IP,” says Parrella of the CHIP unit.
is that your company had reasonable Even with the IP protections many
controls in place to protect the secre- Fortune 500 companies have in

11 DLP ESSENTIALS
CHAPTER 2 » PROTECTING YOUR SECRET SAUCE

place, trade secrets continue to leak tive education and awareness pro-
out. Weaknesses in security proce- grams all contribute to this problem.
dures, inherent vulnerabilities within All too often, senior management
business processes, disjointed risk teams, boards of directors and senior
management programs and ineffec- executives are lulled into a false sense

a
CHAPTER 1
DLP: IT’S NOT
JUST FOR BIG HOW YOUR DATA CAN LEAK
FIRMS ANYMORE
■ An executive of an Ohio hydraulic pump maker was convicted of stealing
a his company’s trade secrets by handing over financial and confidential mar-
CHAPTER 2 keting materials to a South African-based competitor.
PROTECTING
YOUR SECRET
SAUCE
■ A Kentucky man was convicted in 2006 of conspiring to steal and sell trade
secrets belonging to Corning. While an employee, the man stole drawings
of Corning’s thin filter translator liquid crystal display glass and sold them
a to an offshore-based business.
CHAPTER 3
WHERE DATA
LIVES ■ A Duracell employee downloaded sensitive data about a top-selling prod-
uct from company computers onto his home PC and sent it to two Duracell
a competitors; he was convicted earlier this year.
CHAPTER 4
MANDATING
ENCRYPTION
■ A magazine publisher kept its entire pricing strategy, competitive intelli-
gence, financing information and marketing plans for a new, unreleased
magazine stored within a hidden file share on its public Web server. Due to
a misconfiguration on its website, these trade secrets were exposed to the
public through Google hacking.

■ A large technology company, as a normal part of its request for proposal


process, sent detailed specifications, drawings and subassembly informa-
tion to potential suppliers without obtaining signed NDAs or confidentiality
agreements in advance.

■ Engineers working for a global technology organization moved between


employee and contractor status as individual projects required. Although
based out of offshore locations in countries without strong IP laws, they
were not required to re-sign the NDA/confidentiality agreements at the
onset of each new project. —R.L.J. AND R.M.

12 DLP ESSENTIALS
CHAPTER 2 » PROTECTING YOUR SECRET SAUCE

of security about trade secrets. This is secrets are not going to feel bound by
largely due to misunderstanding the an NDA.”
legal protection for trade secrets, And while a company might have a
coupled with being organizationally strong IP protection program on
buffered from the daily operations paper, it can get in the way of employ-
security managers face. ees doing their jobs effectively. A
related problem is that the corporate
a culture may be at odds with IP securi-
CHAPTER 1
DLP: IT’S NOT Many organizations ty directives and employees simply
JUST FOR BIG ignore them. Intellectual property
FIRMS ANYMORE believe they mitigate protection done wrong creates a bar-
the risk of a trade secret rier to creativity, which is what makes
a via a contractual agree- U.S. companies such great innova-
CHAPTER 2
tors.
PROTECTING
YOUR SECRET
ment such as NDAs
SAUCE
and confidentiality
a agreements, but this TECHNLOGICAL SOLUTIONS
Essentially, a trade secret is just
CHAPTER 3
WHERE DATA
simply isn't the case. another piece of corporate informa-
LIVES tion. Like all information, it has a life-
cycle—it is created, used, shared,
a “When we speak to victims, we are stored and eventually destroyed.
CHAPTER 4
MANDATING
finding out that the people responsi- What makes protecting a trade
ENCRYPTION ble for security on R&D projects are secret challenging is how it changes
not at the C-suite level, so that mag- form and proliferates through the
nitude of the risk is filtered out by the organization during its lifecycle. It
time it gets to the top of the organiza- may start as a chemical process writ-
tion,” Parrella says. ten in a lab notebook, at some point
Furthermore, many organizations be recorded in an electronic docu-
believe they mitigate the risk of trade ment, become a set of discrete tasks
secret theft via contractual agree- in a manufacturing process and even-
ments such as NDAs and confiden- tually be combined with other IP to
tiality agreements, but this simply form a product. Each of these forms—
isn’t the case. Although important to manual, digital, process, product—
have in place from a prosecution may have a different lifecycle. At each
standpoint, these agreements are not point, the IP may face different risks
particularly effective at preventing that must be examined and, where
theft, Schadler says: “The sort of peo- appropriate, mitigated.
ple who want to steal the trade Various products can help protect

13 DLP ESSENTIALS
CHAPTER 2 » PROTECTING YOUR SECRET SAUCE

trade secrets and IP data that exist in enterprise rights management prod-
digital form, during certain points in ucts designed to provide data protec-
the data’s lifecycle. There are emerg- tion—specifically IP—across business
ing technologies that monitor the processes and organizational bound-
movement of structured and unstruc- aries.
tured data and enforce actions on the Adobe offers products that securely
data based on custom policies. These capture, process, transfer and archive
a products work at the network and information, both online and offline.
CHAPTER 1
DLP: IT’S NOT
desktop levels and can monitor John Landwehr, Adobe’s director of
JUST FOR BIG movement, prevent data from being security solutions and strategy, says
FIRMS ANYMORE
copied from the originating applica- he believes the best protection of
tion to external sources—for exam- sensitive data happens at the docu-
a ple, USB drives—and help classify ment level: “Given the range of
CHAPTER 2
PROTECTING data as requiring more or less protec- devices that IP can live on—from
YOUR SECRET tion. desktops to laptops to PDAs and
SAUCE
EMC Corp.’s Infoscape can help mobile phones—we think that the
inventory unstructured data, such as only viable way to persistently pro-
a Microsoft Word documents, Adobe tect that information is if the protec-
CHAPTER 3
WHERE DATA .pdf files and various spreadsheets, tion travels with the document.”
LIVES and also classify it based on a compa- However, a word of caution about
ny’s data classification scheme. Com- some of these products designed to
a plementary EMC products offer protect confidential data: Because the
CHAPTER 4
MANDATING
secure storage and archiving of data. vast majority are based on rule set-
ENCRYPTION Sun Microsystems Inc.’s Identity driven engines, the number of false
Manager can provide a foundation for positives they generate can be signifi-
controlling what systems people are cant.
given access to and what roles they
are given within an application based
on company-defined policy. Sun also PROTECTIVE STEPS
offers integrated solutions for secure Despite the increasing sophistication
data storage. of technology, there’s no magic bullet
In addition, there are products from for protecting IP. “There is no
companies such as PGP Corp. and absolute, 100 percent, foolproof way
Entrust Inc. to protect mobile data to protect trade secrets,” Sabett says.
with combinations of file-level “You could spend all your time and
encryption and access controls on money on technological protections,
physical interfaces to the mobile and yet your trade secrets could be
device. Finally, vendors such as flowing out of the organization in all
Adobe Systems Inc. have developed sorts of other ways.”

14 DLP ESSENTIALS
CHAPTER 2 » PROTECTING YOUR SECRET SAUCE

An effective protection program have a plan to educate users.”


must include a number of strategies, Finally, your company should define
such as educating employees, con- programmatic, compliance and oper-
tractors and partners about what ational metrics to measure the per-
constitutes trade secrets; establishing formance of your trade secret protec-
the right governance model (policies, tions against key indicators. Without
roles and responsibilities, enforce-
a ment); and setting process-level, pro-
CHAPTER 1
DLP: IT’S NOT
cedural, physical and technical con- “Education and
JUST FOR BIG trols to minimize risk to a level
FIRMS ANYMORE
acceptable by management. awareness is your first
The first step to protecting your and foremost practical
a trade secrets is to identify them
CHAPTER 2
through interviews with the business
solution for protecting
PROTECTING
YOUR SECRET process owners and then document trade secrets.”
SAUCE
them. Next, estimate how much —CHRISTOPHER BURGESS
these trade secrets are worth. SENIOR SECURITY ADVISOR TO
a Although this is just a snapshot that THE CSO, CISCO SYSTEMS INC.
CHAPTER 3
WHERE DATA will change over time, it’s essential for
LIVES building a business case to obtain the
funding to put protections in place. the metrics, you will not know
a Having this valuation is also impor- whether you are effectively protecting
CHAPTER 4
MANDATING
tant should a theft actually occur. “It’s your trade secrets.
ENCRYPTION a complicated process to do this, but Everyone agrees: Not doing any-
a critical element for prosecutors,” thing to protect your company’s trade
Schadler says. Then, rank the trade secrets is simply not an option any-
secrets according to their value as more. The U.S. Department of Justice
well as the threats, vulnerabilities and is making it a first order of business.
resulting risk. “The prosecution of IP theft
A comprehensive education and cases—specifically trade secret theft
awareness program is a critical step; and economic espionage—is a priori-
some experts argue that it’s the most ty for the CHIP unit and is critical to
important one. “Education and the economy of Silicon Valley and,
awareness is your first and foremost indeed, to the nation’s security,” Par-
practical solution for protecting trade rella says. ■
secrets,” says Cisco’s Burgess.
Adobe’s Landwehr agrees: “Whatever
Russell L. Jones and Rena Mears are partners
technology you decide to implement, in the security and privacy services at Deloitte &
it won’t be effective unless you also Touche LLP.

15 DLP ESSENTIALS
Could you use a little
direction when
choosing a
DLP solution?

One company is ready to guide you.


Visit www.rsa.com/SelectingDLP and download
“Five Considerations for Selecting a Data Loss Prevention Solution.”
CHAPTER 3 » WHERE DATA LIVES

Where Data Lives


Your brand’s reputation could be at risk when
sensitive information leaks outside your organization.
Data loss prevention tools can mitigate incidents
a and offer clarity on where this data resides.
CHAPTER 1
DLP: IT’S NOT
JUST FOR BIG
BY RI C H M O GU L L
FIRMS ANYMORE

a
CHAPTER 2
PROTECTING IT’S THE CALL you’ve feared. The phone scheduled for next month, making
YOUR SECRET rings at 9 a.m. on a Sunday. You’re the this about the worst time possible for
SAUCE
chief information security officer of a an accidental disclosure. It’s not like
medium-sized retailer, and weekend you can blame this one on evil hack-
a calls aren’t all that unusual. But within ers.
CHAPTER 3
WHERE DATA 30 seconds of picking up the phone, This situation is hypothetical, but it
LIVES you know your weekend, if not your illustrates the pressures companies
job, is over. One of the customer serv- are under. Data protection grows
a ice managers accidentally emailed an more critical every day as our sensi-
CHAPTER 4
MANDATING
Excel file of all the clients acquired tive information faces increasing
ENCRYPTION last quarter to an external distribution scrutiny from regulators and business
list while trying to send it to his per- partners. It’s no longer just a matter
sonal Gmail account to work on over of keeping the bad guys away from
the weekend. Worse yet, the file con- data. Businesses now are expected to
tains full credit card and verification handle it responsibly, often in accor-
numbers. dance with contractual or legal
The really bad news? You recently requirements. Yet the average organi-
signed off on your self-assessment zation typically has little idea of
for your Payment Card Industry Data where its sensitive data is, never mind
Security Standard audit and affirmed how it’s really being used.
that you don’t keep card numbers in During the past five years, a new
an unencrypted format. No one told category of tools emerged to address
you about the nightly database this problem. Data loss prevention
extract the customer relations team (DLP) products help companies
runs with the credit card number as understand where their sensitive data
the primary key. Your external audit is is located, where it’s going and how

17 DLP ESSENTIALS
CHAPTER 3 » WHERE DATA LIVES

it’s being used, and they can some- snap purchases or set their expecta-
times enforce protective policies. The tions inappropriately high will strug-
technology may not always stop evil gle with this powerful collection of
hackers, but it offers considerable tools.
help in protecting a business from
internal mistakes and in cost-effec-
tively managing compliance. DEFINING DLP
a Knowing where sensitive content is DLP is one of a dozen or so names for
CHAPTER 1
DLP: IT’S NOT
located protects the organization and this market; others are information
JUST FOR BIG may reduce the time and cost of leak prevention and content monitoring
FIRMS ANYMORE
audits; a company can prove that its and filtering. To further complicate
data is appropriately secured and matters, data loss prevention is so
a show real-time controls to detect vio- generic a term it could easily apply to
CHAPTER 2
PROTECTING lations. By gaining considerable any data protection technology;
YOUR SECRET insight into how data is communicat- everything from encryption to port-
SAUCE
ed internally and externally, odds are blocking tools is hopping on the DLP
that an organization will identify a bandwagon. While early tools were
a number of risky business processes— tightly focused on preventing data
CHAPTER 3
WHERE DATA like the above nightly database dump leaks on the network, the market is
LIVES and use of personal email accounts. It rapidly evolving toward robust solu-
also gains the ability to prevent acci- tions that protect data in motion on
a dents and eliminate bad habits, like the network, at rest in storage and in
CHAPTER 4
MANDATING
improper use of USB drives. DLP use on the desktop, all based on deep
ENCRYPTION won’t make you compliant, but its content inspection and analysis.
combination of risk reduction, insight So DLP is a class of products that,
and potential audit cost reduction is based on central policies, identify,
compelling. monitor and protect data at rest, in
Yet, while DLP tools have signifi- motion and in use, through deep con-
cant potential to reduce an organiza- tent analysis. Other defining charac-
tion’s risk of unapproved disclosures teristics are:
of sensitive information, they are
among the least understood and ■ Broad content coverage across
most overhyped security technolo- multiple platforms and locations.
gies on the market. Organizations ■ Central policy management.

that take the time to understand the ■ Robust workflow for incident

technology, define their processes handling.


and set appropriate expectations will
see significant value from their DLP It’s important to recognize that DLP
investments, while those that make solutions are very effective at reduc-

18 DLP ESSENTIALS
CHAPTER 3 » WHERE DATA LIVES

ing the risk of accidental disclosures tacting vendors.


or data leakage through a bad busi- Most organizations find that con-
ness process, but they offer minimal tent analysis techniques, architecture,
protection against malicious attacks. infrastructure integration and work-
A smart internal or external attacker flow are the top priorities in selecting
can easily circumvent most DLP tools, a product.
but the risk of inadvertent exposure is
a usually greater than that of a targeted
CHAPTER 1
DLP: IT’S NOT
attack. CONTENT ANALYSIS
JUST FOR BIG The most important characteristic
FIRMS ANYMORE
of DLP solutions is content analysis.
GETTING STARTED This allows the tools to dig into net-
a Long before contacting DLP vendors, work traffic and files, unwrap layers
CHAPTER 2
PROTECTING set expectations and decide what (like a spreadsheet embedded in a
YOUR SECRET content needs protection and how .pdf in a .zip file) and identify content
SAUCE
to protect it. Pull together a project based on policies. While DLP prod-
team with representatives from major ucts use different content analysis
a stakeholders including security, mes- techniques, they tend to fall into a few
CHAPTER 3
WHERE DATA saging, desktop management, net- categories that also use contextual
LIVES working, human resources (HR) and information, such as sender/recipient,
legal, and define protection goals, location and destination.
a including content and enforcement Content description techniques use
CHAPTER 4
MANDATING
actions. This is when you set expecta- regular expressions, keywords, lexi-
ENCRYPTION tions; educating project members on cons and other patterns to identify
what’s realistic with DLP can help content. They include rules/regular
avoid pitfalls that derail deployment. expressions for pattern matching,
These protection goals help deter- conceptual analysis involving preset
mine required features. They’ll estab- combinations of words and rules to
lish needs for content analysis tech- match a specific concept like insider
niques, breadth of coverage trading, and preset categories such as
(network/storage/endpoint), infra- personally identifiable information (PII),
structure integration, workflow and HIPAA and PCI.
enforcement requirements. You can Content registration techniques rely
decide if you need a full suite, a dedi- on content you provide the system
cated DLP solution or just the DLP that then becomes a policy. They in-
features of an existing product. Then, clude full or partial document match-
translate these requirements into a ing using hashes of files to identify
request for information or draft a content; database fingerprinting by
request for proposal and start con- hashing live database content in com-

19 DLP ESSENTIALS
CHAPTER 3 » WHERE DATA LIVES

binations to identify matches; and risk, and then slowly add other con-
statistical techniques that use a large tent—generally trade secrets and
repository of related content to iden- intellectual property—once they get
tify consistencies and create policies. comfortable with their tools.
All the leading products can com- The last major component of DLP
bine different analysis techniques into solutions is an endpoint agent to
a single policy to improve accuracy. monitor use of data on the user’s
a The content analysis technique will desktop. A “complete” agent theoreti-
CHAPTER 1
DLP: IT’S NOT
directly determine what products cally monitors network, file and user
JUST FOR BIG make the short list, but companies activity such as cut and paste, but
FIRMS ANYMORE
should make sure to account for few real-world tools provide full cov-
future needs. Although most of the erage. Most products start with file
a market—90%, by some estimates—is monitoring for endpoint content dis-
CHAPTER 2
PROTECTING focused on protecting PII, about 30% covery and to detect (and block) sen-
YOUR SECRET to 40% of those organizations are sitive data transfers to portable stor-
SAUCE
also interested in protecting unstruc- age. Rather than completely blocking
tured data. They start by using DLP to USB thumb drives to protect data, an
a protect PII to reduce their compliance organization can use these tools to
CHAPTER 3
WHERE DATA
LIVES

a CONTENT DISCOVERY HELPS


CHAPTER 4
MANDATING
ENCRYPTION
CREDIT UNION WITH PCI
THE MAJORITY OF organizations first deploy DLP for network data loss preven-
tion, since it’s the quickest way to identify their risk exposure. But from a
compliance standpoint, DLP for data at rest—or content discovery—is often
more valuable since it helps quickly identify stored data in violation of policy,
which is especially useful for PCI DSS.
For example, a medium-sized credit union started with network monitoring
and user education to reduce its risk of an inadvertent breach. It then moved
into content discovery to ensure that no PCI data was stored unencrypted,
followed by basic email filtering. The company’s vendor recently started beta
testing an endpoint agent, which the client plans to use for endpoint discov-
ery and blocking PII transfer to portable storage.
Executives at the credit union estimate it will take two to three years for
full deployment of all DLP components, based largely on internal political is-
sues and budget. —R.M.

20 DLP ESSENTIALS
CHAPTER 3 » WHERE DATA LIVES

restrict file transfers based on con- leakage over communications chan-


tent. nels such as email, instant messaging
Endpoint DLP tools are starting to (IM), FTP and HTTP. These simple
add more advanced protection, such monitoring and alerting tools evolved
as limiting cut and paste, detecting into more comprehensive solutions,
sensitive content in unapproved adding email integration and gate-
applications such as certain encryp- way/proxy integration for Web, FTP
a tion tools, and automatically encrypt- and IM. This allows organizations to
CHAPTER 1
DLP: IT’S NOT
ing items based on content. Over block traffic before the data escapes,
JUST FOR BIG time, they will increase the type and rather than just being alerted when
FIRMS ANYMORE
number of policies they can enforce it’s already gone. (See “Network
and integrate more deeply into com- Monitoring Tips”).
a mon endpoint applications. For email, DLP vendors embed a
CHAPTER 2
PROTECTING mail transport agent, which is then
YOUR SECRET added as another hop in the email
SAUCE
ARCHITECTURE AND INTEGRATION path to block, quarantine, encrypt or
DLP architectures are defined by even bounce messages back to the
a where they protect the content: data- user. Since email is a store-and-for-
CHAPTER 3
WHERE DATA in-motion network monitoring, data- ward protocol, integration is fairly
LIVES at-rest file storage scanning and data- straightforward. A few tools support
in-use monitoring of the endpoint. similar actions on internal mail by
a Full-suite solutions include compo- integrating with Exchange and other
CHAPTER 4
MANDATING
nents for each of these areas, while mail servers.
ENCRYPTION partial suite tools cover only a por- Other channels, such as Web, FTP
tion, such as an endpoint DLP tool and IM, are more difficult to block
with an email-only gateway. There are since that traffic uses synchronous
also single-channel products and protocols. By integrating with proxies,
non-DLP tools that bundle some DLP a session analysis can be performed
features, like an email gateway that to reconstruct and evaluate content
can block messages with credit card before it’s released. Few DLP tools
numbers. In the long run, most organ- provide proxies and instead partner
izations—especially large enterpris- with major gateway/proxy vendors, or
es—will prefer full-suite solutions, but use the Internet Content Adaptation
partial-suite and DLP-as-a-feature Protocol. When integrated with a tool
tools often meet tactical needs where that proxies Secure Sockets Layer
complete coverage isn’t necessary. traffic, you gain the ability to sniff
The DLP market started with pas- encrypted traffic.
sive network monitoring tools DLP for data at rest is often equally
focused on detecting information if not more valuable than network

21 DLP ESSENTIALS
CHAPTER 3 » WHERE DATA LIVES

monitoring. This is called content dis- features.


covery; these tools scan enterprise Enforcing this kind of policy
repositories and file shares for sensi- requires integration with enterprise
tive content. Imagine knowing the directories and dynamic host configu-
identity of every server storing credit ration protocol servers to identify the
card information, and being alerted to user’s location (system and IP
unapproved ones. address)—a critical feature to look for
a Content discovery falls into three in the evaluation process. Role-based
CHAPTER 1
DLP: IT’S NOT
categories: network scanning, local administration and hierarchical man-
JUST FOR BIG agents and application integration. agement ease management overhead
FIRMS ANYMORE
With network scanning, the DLP tool and are particularly important in large
connects to file shares for analysis, deployments.
a which provides wide coverage but DLP policy violations are extremely
CHAPTER 2
PROTECTING limited performance. A local agent sensitive and usually require dedicat-
YOUR SECRET may be available on major platforms ed workflow. Unlike virus infections
SAUCE
to scan directly on the server rather or intrusion detection system alerts,
than across the network, which is these incidents lead to employee dis-
a more effective for large repositories missal or legal actions. The heart of
CHAPTER 3
WHERE DATA but requires more management. the DLP management system is the
LIVES Some tools integrate directly with incident handling queue, where inci-
document management systems and dent handlers see open violations
a other repositories to leverage native assigned to them, take action and
CHAPTER 4
MANDATING
ENCRYPTION

NETWORK MONITORING TIPS


WHEN SHOPPING FOR network monitoring tools for data loss prevention, don’t
get hung up on high performance. Since outbound communications traffic is
the only concern, even if a company is running gigabit Ethernet, it will likely
monitor only a fraction of that traffic.
Large enterprises typically need to monitor about 300 Mbps to 500 Mbps
at most, while midsized enterprises fall below the 100 Mbps range, and small
enterprises as low as 5 Mbps.
Also, make sure to determine if a product monitors all protocols, or just a
subset, and if it requires hard-code port and protocol combinations or can
detect traffic on nonstandard ports. The stronger tools also detect tunneled
traffic, like IM over HTTP. —R.M.

22 DLP ESSENTIALS
CHAPTER 3 » WHERE DATA LIVES

manage workflow for investigations. with endpoint tools. Also test


A good workflow interface eases enforcement actions and integration
identification of critical incidents and into the infrastructure, especially
reduces incident handling time, man- directory integration. Finally, run the
agement overhead and total cost of workflow past the business units
ownership. involved with enforcement to ensure
Recently, a DLP customer chose its it meets their needs.
a product ultimately on workflow. After Organizations report that DLP de-
CHAPTER 1
DLP: IT’S NOT
narrowing the field to two vendors it ployments tend to go more smoothly
JUST FOR BIG considered equal in terms of technical than other security installations from
FIRMS ANYMORE
features, the company selected the a technical level, but it may take up to
product with the workflow and inter- six months to tune policies and adjust
a face its nontechnical users (legal, HR workflow, depending on the complex-
CHAPTER 2
PROTECTING and compliance) preferred. ity. Many find they need only part-
YOUR SECRET Beyond policy management and time resources to manage incidents,
SAUCE
incident handling, look for a tool that but this varies based on the intricacy
integrates well with existing infra- and granularity of policies. A 5,000-
a structure and includes robust man- person organization, on average, needs
CHAPTER 3
WHERE DATA agement tools like incident archiving, only a half-time incident handler and
LIVES backup and performance monitoring. administrator to manage incidents
Since senior management and audi- and keep the system running.
a tors might be interested in DLP activi- DLP tools are still fairly adolescent,
CHAPTER 4
MANDATING
ties, robust reports are needed for which means they provide good value
ENCRYPTION this nontechnical audience and com- but are not as polished as more
pliance support. mature product categories. This
shouldn’t slow down deployments if
you have data protection needs, but
TESTING, DEVELOPMENT you should understand that the tools
AND THE FUTURE will evolve rapidly. Already, the mar-
After bringing in vendors for sales ket is transitioning from data loss pre-
pitches and demonstrations, narrow vention, focused on plugging leaks, to
the field to three or four and start a more robust content monitoring and
proof-of-concept trial. Preferably, protection (CMP), designed to pro-
place the tools side by side in passive tect data throughout its lifecycle.
monitoring mode on the network and CMP will eventually become one of
test them with representative poli- the most important tools in the secu-
cies. This allows a user to directly rity arsenal. ■
compare results for false positives
and negatives, but it’s tougher to do Rich Mogull is CEO of Securosis LLC.

23 DLP ESSENTIALS
Co m p l e t e A p p l i c a t i o n a n d
D a t a b a s e S e c u r i t y L i fe c yc l e

Data is under attack from multiple points of vulnerability.


Imperva, the Data Security Without the ability to track the databases, applications, and
leader, enables a complete users accessing data, organizations will never solve their data
security lifecycle to provide security and audit requirements. Imperva delivers a complete
visibility and control for lifecycle for organizations to secure their data in an automated
business databases and the and repeatable process, thus providing full visibility and control
applications that use them. of the data driving their business.

Free Guide:
Register for the Essential Series “The Role of Database Activity Monitoring in Database
Security”. This guide outlines the best practices for database activity monitoring and
describes how to implement this increasingly important technology.
Divided into three articles:
» Article 1: Data Discovery and Classification in Database Security
» Article 2: Database Assessment and Management in Database Security
» Article 3: Mitigating Risks and Monitoring Activity for Database Security

Download your copy today: www.imperva.com/go/DAM

Toll Free (U.S. only): 1-866-926-4678 or +1-650-345-9000


www.imperva.com
© Copyright 2009, Imperva All rights reserved. Imperva and SecureSphere are registered trademarks of Imperva.
CHAPTER 4 » MANDATING ENCRYPTION

Mandating Encryption
State laws and industry standards are
forcing organizations to encrypt or face penalties.
Here are the options they can use.
a
CHAPTER 1 BY B R I E N P O S E Y
DLP: IT’S NOT
JUST FOR BIG
FIRMS ANYMORE

a FOR YEARS, ENCRYPTION was something STORAGE ENCRYPTION


CHAPTER 2 companies could choose to use if Storage encryption is simply a mech-
PROTECTING
YOUR SECRET they wanted an extra degree of secu- anism that encrypts files stored on a
SAUCE rity for their data. However, the days hard drive or other media such as
of optional encryption are gone forev- backup tapes. This type of encryption
a er. Today, companies in a variety of is used primarily as a contingency
CHAPTER 3
industries are subject to regulations against a physical security breach
WHERE DATA
LIVES that mandate encryption and other such as a stolen laptop containing
security measures, and they face stiff sensitive data. In such a situation, the
a penalties for failure to adequately Windows operating system will pro-
CHAPTER 4 protect their data. Even if a company vide at least some protection. Assum-
MANDATING
is not subject to these types of regu- ing that the hard drive is using the NT
ENCRYPTION
lations, many states have laws requir- file system and the appropriate file
ing companies to disclose security system permissions are being used,
breaches in which unencrypted cus- the thief shouldn’t be able to access
tomer data has been compromised. the user’s data unless he knows the
Consequently, it is no longer a user’s password.
question of whether a company However, a computer-savvy thief
should use encryption, but rather could use one of the many utilities
how a company should encrypt data. available to reset the local adminis-
The first step in planning an encryp- trator’s password as a means of
tion strategy is to understand the pri- accessing the data, or he could just
mary types of encryption solutions: remove the hard drive, install it into
storage, network and application- another computer and bypass Win-
level. While each offers benefits, dows altogether. Unless the data on
there are also drawbacks to take the drive is encrypted, both of these
into account. methods will allow the thief to quickly

25 DLP ESSENTIALS
CHAPTER 4 » MANDATING ENCRYPTION

access the user’s data. extremely common problem. When


Storage-level encryption is the key is lost, the encrypted data
designed to protect data in these becomes unreadable unless a backup
types of situations, but some encryp- key is available. The result is perma-
tion technologies work better than nent data loss.
others. For example, the Windows
Encrypting File System (EFS) can
a encrypt a volume containing data, but If you are considering
CHAPTER 1
DLP: IT’S NOT
it cannot encrypt the system vol- using storage-level
JUST FOR BIG ume—the disk volume that contains
FIRMS ANYMORE
the hardware-specific files needed to encryption, it is impor-
start Windows. This means EFS- tant to carefully plan for
a encrypted data can remain protected
CHAPTER 2
only if physical security is guaranteed.
key management and
PROTECTING
YOUR SECRET If a computer is stolen, EFS encryp- have a mechanism in
SAUCE
tion will prevent data from being place for key recovery.
compromised if an encrypted hard
a drive is removed and then installed
CHAPTER 3
WHERE DATA into another machine. However, since Most third-party storage encryp-
LIVES the system volume is unprotected tion products on the market work
there is nothing stopping a thief from similarly to EFS but offer better man-
a using a utility to reset the administra- ageability. One important difference
CHAPTER 4
MANDATING
tive password, booting Windows, log- between EFS and some of the other
ENCRYPTION ging in with the new password and products (besides the varying
gaining access to the data. encryption algorithms they use) is
Windows Vista and Windows Serv- how they store the encryption keys.
er 2008 solve this problem by offer- Windows stores the EFS encryption
ing BitLocker, which uses the Trusted keys on the system drive, which can
Platform Module to encrypt the sys- lead to a couple of problematic situa-
tem volume. Since this is a BIOS-level tions. First, if the system drive fails,
encryption mechanism, it will protect the encryption keys are lost, which
against password reset attacks results in permanent data loss unless
(assuming the system volume is a backup key is available (Windows
encrypted). workstations that are a part of a
If you are considering using stor- domain always designate the domain
age-level encryption, it is important administrator as a key recovery
to carefully plan for key management agent). Second, if a laptop is stolen, a
and to have a mechanism in place for skilled hacker may be able to extract
key recovery. Encryption key loss is an the encryption keys from the system

26 DLP ESSENTIALS
CHAPTER 4 » MANDATING ENCRYPTION

drive and use them to unlock the Of course, these are just software-
encrypted data. Many third-party based encryption solutions native to
encryption products protect against Windows. There are also third-party
this by storing the encryption keys on encryption solutions that work at the
USB flash drives or on network hardware and software levels.
servers.

a Network encryption
CHAPTER 1
NETWORK ENCRYPTION
DLP: IT’S NOT
JUST FOR BIG Encryption at the storage level does a
has traditionally been
FIRMS ANYMORE
good job of protecting files residing difficult to implement.
on storage media, but it does nothing The other major
a to protect data in transit. Data flow-
CHAPTER 2
ing across a network or the Internet is
drawback is it can
PROTECTING
YOUR SECRET unprotected unless the session is degrade performance.
SAUCE
encrypted. A hacker can easily use a
packet sniffer to capture a copy of
a individual packets as they flow across There are two major drawbacks to
CHAPTER 3
WHERE DATA the network, a technique used in encrypting network traffic. First, net-
LIVES recent high-profile credit card thefts work encryption has traditionally
from retailers. These packets can been difficult to implement. For
a then be reassembled and the data example, using IPSec encryption usu-
CHAPTER 4
MANDATING
within them extracted. At one time ally requires an organization to install
ENCRYPTION this was considered a fairly advanced an enterprise certificate authority. An
type of attack. Today, though, utilities administrator will also have to under-
exist that take all the work out of a stand the key management process
network sniffing attack. Even an and know how to set group policies
unskilled hacker can use such a utility that require network computers to
to steal data. use IPSec encryption. Additionally,
There are countless mechanisms IPSec encryption will fail unless net-
available for protecting data as it work clients are using operating sys-
flows across a network. Windows tems that support IPSec.
Server provides IPSec encryption. The other major drawback to net-
Mobile users accessing a Windows work traffic encryption is that it can
network through a Windows-based degrade performance. Every time a
virtual private network can be pro- client needs to communicate over the
tected by Point-to-Point Tunneling network, the client must establish a
Protocol, Layer 2 Tunneling Protocol session and encrypt the data that is
or Secure Sockets Layer encryption. to be transmitted. The recipient must

27 DLP ESSENTIALS
CHAPTER 4 » MANDATING ENCRYPTION

then decrypt the data. This process Application-level encryption works


increases the amount of traffic flow- well for augmenting your existing
ing across the network, and forces security but tends to be difficult to
network client machines to spend manage. Every application with built-
additional time and CPU resources in encryption capabilities works dif-
encrypting and decrypting data. ferently, but generally most require
Network cards exist that can the user who creates a file to enter a
a offload the encryption and decryption password to access it. This password
CHAPTER 1
DLP: IT’S NOT
process from the CPU. This doesn’t is treated as an encryption key. The
JUST FOR BIG decrease the traffic flowing across the problem is there is usually no way to
FIRMS ANYMORE
network, but it prevents network centrally manage these passwords. If
clients from suffering from decreased a user forgets the password he
a performance. assigned to a file, he loses access to
CHAPTER 2
PROTECTING the data in the file.
YOUR SECRET Furthermore, many encryption-
SAUCE
APPLICATION-LEVEL ENCRYPTION enabled applications are not multi-
Application-level encryption is essen- user-aware. This means a user who
a tially a hybrid method. The basic idea wants to share a file with another
CHAPTER 3
WHERE DATA is that the developers assume that user typically must also share the
LIVES their applications will be used in inse- password.
cure environments, and therefore Whatever solution you choose
a build proprietary encryption capabili- needs to be “end-user proof.” In most
CHAPTER 4
MANDATING
ties into their tools. cases, applications that offer built-in
ENCRYPTION Many products on the market encryption capabilities require users
include application-level encryption to choose to encrypt the data. Given a
capabilities. Some of the best known choice, they will often take the easy
are file compression utilities such as way out and not encrypt.
WinZip, which allows a user to create
an encrypted archive file. This file
remains encrypted whether or not it RIGHTS MANAGEMENT
is stored on a hard drive that has Rights management is a more ad-
encryption enabled. Likewise, the file vanced form of application-level
remains encrypted even if transmit- encryption that’s starting to gain pop-
ted across the Internet using a non- ularity. Rights management is a tech-
encrypted session. This is because nology that allows permissions to be
the encryption algorithm is applied assigned to an encrypted file. For
directly to the data within the file and example, such a policy might prevent
is independent of the storage medium users from copying data out of the file
or network connection being used. or from printing a protected document.

28 DLP ESSENTIALS
CHAPTER 4 » MANDATING ENCRYPTION

The nice thing about rights man- often provide guidance on the types
agement is that permissions are typi- of encryption solutions that must be
cally linked to a back-end server. This used.
means that if a user were to copy a Most organizations will want to
rights-managed file onto removable take a layered approach. When it
media and then leave the company,
the administrator could prevent the
a data in that file from being accessed The nice thing about
CHAPTER 1
by the former employee by simply
DLP: IT’S NOT
JUST FOR BIG removing the rights. rights management
FIRMS ANYMORE
Windows natively supports rights is the permissions are
management, but third-party prod- typically linked to a
a ucts offer similar capabilities. For the
CHAPTER 2
PROTECTING most part, rights management works back-end server.
YOUR SECRET very well, but the initial setup can be
SAUCE
complicated, depending on the prod-
uct. Also, depending on how rights comes to encryption, the general rule
a management is set up, mobile users is that data needs to be protected at
CHAPTER 3
WHERE DATA may not be able to open rights-man- rest and in motion. If data is encrypt-
LIVES aged documents unless they have ed at only the storage level, or only
connectivity to the company’s rights while in transit, then the data is not
a management server. Another poten- fully protected against potential
CHAPTER 4
MANDATING
tial downside is that not all types of exposure. Although application-level
ENCRYPTION data can be rights managed. On the encryption fulfills both of these crite-
upside, rights management does ria, it should be used only to augment
solve the management headaches your network’s security, not as the
typically associated with application- sole encryption method. The reason
level encryption. is that not every application offers
built-in encryption, and those that do
have varying encryption strengths.
HOW TO CHOOSE If a company is not subject to regu-
With so many types of encryption lations requiring encryption, it’s criti-
available, it can be tough for a com- cal to consider the total cost and staff
pany to figure out which one is best requirements associated with deploy-
suited to its needs. The first step is to ing and maintaining the technology.
determine whether your organization Encryption can cost a significant
is subject to any federal or industry amount in terms of hardware, soft-
regulations that mandate how data is ware and support, and it is important
to be secured. If so, these regulations to make sure the benefits justify the

29 DLP ESSENTIALS
CHAPTER 4 » MANDATING ENCRYPTION

expenditures.
Whatever encryption solution a
company chooses, it should be trans-
parent to end users and compatible
with your network infrastructure.
Some encryption solutions cause
complications with backing up data
a or with accessing or encrypting data DLP Essentials is produced by
CHAPTER 1 Security Media Group and CIO Decisions/
DLP: IT’S NOT
on a storage area network. Make sure IT Strategy Media Group,
JUST FOR BIG the solutions you are considering will © 2009 TechTarget.
FIRMS ANYMORE
not cause a significant administrative
burden once the initial setup is com- MANAGING EDITOR
a plete. CIO/IT STRATEGY MEDIA GROUP
CHAPTER 2 Jacqueline Biscobing
PROTECTING While encryption definitely has its
YOUR SECRET place in an enterprise security strate-
SAUCE
gy, a company can’t rely on encryp- ART DIRECTOR OF DIGITAL CONTENT
Linda Koury
tion to solve its security problems.
a Most security experts agree that
CHAPTER 3
WHERE DATA there is no such thing as a foolproof CONTRIBUTING WRITERS
Richard E. Mackey, Russell L. Jones,
LIVES security solution. Any security mech- Rena Mears, Rich Mogull, Brien Posey
anism can be circumvented with
a enough time and effort, including
EDITORIAL DIRECTOR
CHAPTER 4
MANDATING
strong encryption. The key to good SECURITY MEDIA GROUP

ENCRYPTION security is to make a breach more Kelley Damore


trouble than it’s worth. This is best
achieved by taking a layered EXECUTIVE EDITOR
CIO/IT STRATEGY MEDIA GROUP
approach to security that involves Scot Petersen
comprehensive policies and multiple
technologies. ■ FOR SALES INQUIRIES:
Stephanie Corby,
Brien Posey is a freelance technical writer who has Senior Director of Product Management
received Microsoft’s MVP award six times for his CIO/IT Strategy Media Group
work with Exchange Server, Windows Server, IIS scorby@techtarget.com
and File Systems Storage. Posey has written or con- (781) 657-1589
tributed to about three dozen books, and has written
well over 4,000 technical articles and white papers
for a variety of printed publications and websites. Zemira DelVecchio,
Previously, Posey was CIO for a national chain of Director of Sales, Security Media Group
hospitals and health care companies. He has also zdelvecchio@techtarget.com
served as a network administrator for the Depart- (781) 657-1448
ment of Defense at Fort Knox, and for some of the
nation’s largest insurance companies.

30 DLP ESSENTIALS
R E SO U RC E S FROM OUR SPONSORS

q Whitepaper: Managing Risk to Sensitive Data


q Insider Threats – Interview with Former Deputy
Director of the NSA

q Whitepaper: Protecting Databases from


Unauthorized Activities

q McAfee Buyer's Guide to Data Protection


q Total Protection for Secure Business
q Secure in 15: An at-a-glance Calendar

q The Cost-Based Business Case for Data Loss


Prevention

q 5 Considerations for Selecting a Data Loss


Prevention Solution

q Diagnose your security posture via our


complimentary assessment now!

q The business impact of data security regulations:


Featuring Massachusetts

q Closing the gaps in enterprise data security:


A model for 360° protection

q Is your data at risk? : Why physical security is


insufficient for laptop computers

31 DLP ESSENTIALS

You might also like