0% found this document useful (0 votes)
34 views9 pages

DLP - Revised

The document outlines various tests and evaluations for a Data Loss Prevention (DLP) solution, including its ability to detect and block sensitive data in different formats, such as text, compressed files, and source code. It also discusses integration capabilities with other systems like SIEM, ZTNA, and Google Workspace, as well as the creation of policies for data classification and routing. Additionally, it highlights the importance of compliance with data localization and retention requirements.

Uploaded by

vijaykb118
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as XLSX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
34 views9 pages

DLP - Revised

The document outlines various tests and evaluations for a Data Loss Prevention (DLP) solution, including its ability to detect and block sensitive data in different formats, such as text, compressed files, and source code. It also discusses integration capabilities with other systems like SIEM, ZTNA, and Google Workspace, as well as the creation of policies for data classification and routing. Additionally, it highlights the importance of compliance with data localization and retention requirements.

Uploaded by

vijaykb118
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as XLSX, PDF, TXT or read online on Scribd
You are on page 1/ 9

Item Check

Copy Paste on Verify that the DLP solution can detect and
web.whatsapp.com block the pasting of sensitive data

Confirm the DLP solution can inspect and


Compressed Document analyze the contents of ZIP files. Test if it can
(Zip,RAR) block or quarantine a ZIP file that contains
sensitive information

Uploading document template (consolidated


Document Template
Whitelist and Blacklist holding details or Bank documents) to the DLP
to either whitelist or blacklist

Data Classifications
Creation of data classification for applying
polices

Data Destinations
Creation of data destinations (safe and unsafe
destination )

Test the DLP's ability to identify and protect


source code, potentially by using keyword
Source Code Protection matching (e.g., "private key," "API key"), file
type recognition (e.g., .py, .java), or code
structure analysis
Evaluate the DLP's effectiveness in identifying a
wide range of PII, including names, addresses,
s social security numbers, credit card numbers,
and health records. Test it with both structured
and unstructured data.

Web/ Apps Filter


Evaluate the DLP's integration with web and
application filtering

Email DLP
Evaluate preventing PII data shared on Email
body and attachment

Integrate with ZTNA gateways to enforce data


ZTNA (Zero Trust Network policies for remote workers accessing corporate
Access) applications, ensuring that access is granted
based on the user, device, and context.

Data Localization
Confrim data stored within the county and not
transferred outside.

Data routing to our S3 Integrating our S3 bucket for shadow filing

Confirm that the DLP solution has a robust and


SIEM Integration reliable integration with your existing SIEM,
Innspark

API Integration For Alets and other integration (SEIM)


Alerts Creation Alerts through Webhooks,API and email.

Tenant Lock
Prevents personal email login on company
devices

Log Retention Period Check the default log retention period, logs det

Integration with GWS SAML integration with Google Workspace.

Licencing Check how device or user level licensing


Use case Foresight Feedback

WhatsApp Web employs end-to-end encryption by


RMs tries to paste a list of customer PII data default for all activities. Using Netskope RBI DLP
Controls on WhatsApp Web can be Implemented.

Using Netskope we can block data within compressed


files like ZIP or RAR . Leveraging DLP policies, we can
An employee attempts to exfiltrate a folder of
create a DLP profile that identifies and blocks these
financial reports by zipping them up and uploading
file types in Real-time.
them to a personal cloud storage service. The DLP
No DLP technology can decrypt a
solution detects the sensitive data within the ZIP file
compressed document. Hence it is always
and blocks the upload.
recommended to qurantine/ allow compressed
document ONLY to Authorised destinations.

Yes it is possible. Netskope allows you to create


policies to block or allow access to specific document
The DLP policy recognizes the template and
templates through whitelisting and blacklisting. This is
allow/blocks.
achieved by configuring real-time protection policies
that utilize URL lists and content analysis.

Based on data classification, different policy Yes it is possible. DLP solution can integrate with Data
restrictions can be applied classification tools to apply policies.

Yes, it is possible to create policies to allow/ block


Unsafe destinations the policy action to be blocked.
Trusted / Untrusted (Competitive) destinations

Yes, it is possible. 1. To
block private keys, custom DLP policies can be created
A developer tries to email a snippet of proprietary to identify and flag private key data 2, Using Netskope
source code containing an API key to a personal predefined data identifiers, we can detect common
email address. The DLP solution detects the sensitive API keys, like those from AWS, GitHub, and Facebook.
code and blocks the email, preventing the key from 3. Using Netskope's advanced file type recognition,
being exposed. identify specific programming language files like .py
(Python) and .java (Java), and Netskope DLP can even
perform analysis of code structure.
The DLP solution's PII detection engine recognizes
Yes it is possible. Using Source code templates this
the data and blocks the download, preventing a
policy can be implemented.
sensitive data exposure.

Block websites and apps based on categories, ex; Netskope has Web, Email & Endpoint DLP. Web +
gambling, adult etc Web DLP will be a native integration.

Copy pasting PII on email body or attaching any


Email DLP checks for Header, Body & attachment.
sensitive file

Yes. Need to understand in detail on the Applications.

Need clarity.

Netskope routes data to Amazon S3 through its log


Routing a copy of the file to the corporate S3 bucket streaming capabilities. and by enabling data
for auditing. protection for S3 buckets.

A DLP policy violation is detected and the event is


immediately sent to the SIEM, where it is correlated
with other user activity logs and alerts. This allows Yes it is possible
the security team to see a complete picture of the
user's actions leading up to the policy violation.

Yes it is possible. Netskope integrates with SIEM


platforms to provide security alerts and other
telemetry data for enhanced threat detection and
response. This integration allows organizations to
centralize security information, improve visibility, and
automate incident response.
Yes it is possible.
Netskope provides various methods for delivering
alerts to administrators and integrated systems,
including webhooks, APIs, and email notifications.

Blocking personal email logging on company device


Yes it is possible
and any browsers.

Netskope by default audit logs are retained for 90


days. Customer can also subscribe for extended Data
Retention period & can increase this to one year.
Push it to the S3 or SEIM
Transaction events, if not consumed, are retained for
seven days by default. Device logs are kept for 365
days.

Netskope integrates with Google Workspace (GWS) to


provide enhanced security and control over cloud
usage. This integration allows organizations to apply
SSO
granular policies to Google Workspace, its ecosystem,
and other cloud services, leveraging Netskope's deep
cloud context and flexible policy enforcement.

Number of users
Windows Mac Remarks

Yes, as mentioned we can achieve the copy and paste


activity by using the Remote browser isolation
Yes Yes module. But we cant attach a DLP Profile for that. Just
we can completely block copy paste activity

YES, It can be achievable. Not only ZIP Files we do


Yes Yes have 1000+ files types in Netskope on top of which we
can configure the policies.

Yes, Definitely we can achieve this , but we need


Yes Yes Advanced Web DLP to achieve the same

Also we do have several predefined file classifiers


Yes Yes inbulit in Netskope, Based on which we can configure
the policies

Yes, we can configure the policies based on Source IP


Yes Yes or Source Country Criteria

Yes, It is possible and we do have a souce code family


Yes Yes containing all major coding languages.
Yes Yes Yes, Its possible

Yes, we do have 240+ categories in house. And we can


Yes Yes customize the URLs as well

Yes, It is possible. But if the same activity the user is


performing we need separate Email DLP module to
Yes Yes achieve. (Will integrate with your email like Outlook
or Gmail)

Anyway we can provide access to critical applications


with Netskope ZTNA But if we want to have DLP
Yes Yes policies on top of that then we need to configure
Remote browser access and currently it will work only
on HTTP/HTTPS applications

Yes Yes

Yes, We can integrate netskope with AWS for


Yes Yes forencies

Yes Yes Yes, It is possible

Yes Yes Available with Netskope


Yes, Anyway will get alerts on Tenant and apart from
Yes Yes that we can configure email notifications for every
policy to achieve the same.

Yes Yes Yes, we can restrict it through app instance

Yes Yes Yes, Possilbe

Yes Yes Yes, It is possible

Yes Yes No. of Users

You might also like