Download as pdf or txt
Download as pdf or txt
You are on page 1of 1

DAN CISSP NOTES - 2018

Paper Records If a safe has a thermal relocking function, when a certain DLP policy server to update policies and report events.
Here are some principles to consider when protecting paper temperature is met (possibly from drilling), an extra lock is that is difficult for attackers to exploit.)
records: implemented to ensure the valuables are properly protected. Hybrid DLP deploys both NDLP and EDLP.
15
• Educate your staff on proper handling of paper records. Data Leakage Obviously, this approach is the costliest and most complex.
• Minimize the use of paper records. Data Leak Prevention (DLP) Watermarking
• Ensure workspaces are kept tidy. Data leak prevention (DLP) comprises the actions that Watermarking is the practice of embedding an image or pattern
• Lock away all sensitive paperwork as soon as you are done organizations take to prevent unauthorized external parties in paper that isn’t readily perceivable. It is often used with
with it. from gaining access to sensitive data. currency to thwart counterfeiting attempts.
• Prohibit taking sensitive paperwork home. That definition has some key terms. First, the data has to be
• Label all paperwork with its classification level. considered sensitive (not all data will be protected). Second,
• Conduct random searches of employees’ bags as they leave DLP is concerned with external parties. If somebody in the
the office to ensure sensitive materials are not being taken accounting department gains access to internal R&D data, that
home. is a problem, but technically it is not considered a data leak.

Way to Domain#3
• Destroy unneeded sensitive papers using a crosscut Finally, the external party gaining access to our sensitive data
shredder. For very sensitive papers, consider burning them must be unauthorized to do so. If former business partners
instead. have some of our sensitive data that they were authorized to
Safes get at the time they were employed, then that is not considered
The types of safes an organization can choose from are: a leak either.
• Wall safe Embedded into the wall and easily hidden. General Approaches to DLP
• Floor safe Embedded into the floor and easily hidden There is no one-size-fits-all approach to DLP, but there are
• Chests Stand-alone safes. tried-and-true principles that can be helpful.
• Depositories Safes with slots, which allow the valuables to be One important principle is the integration of DLP with our risk
easily slipped in. management processes.
• Vaults Safes that are large enough to provide walk-in access DLP products has two main approaches:
If a safe has a combination lock, it should be changed Network DLP applies data protection policies to data in motion.
periodically, and only a small subset of people should have NDLP products are normally implemented as appliances that
access to the combination or key. are deployed at the perimeter of an organization’s networks.
The safe should be in a visible location, so anyone who is Endpoint DLP applies protection policies to data at rest and
interacting with the safe can be seen. data in use.
If the safe has a passive relocking function, it can detect when EDLP is implemented in software running on each protected
someone attempts to tamper with it. endpoint (usually called a DLP agent, communicates with the
Advance and Protect The Profession

You might also like