<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>DLP - RiskInsight</title>
	<atom:link href="https://www.riskinsight-wavestone.com/en/tag/dlp-en/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.riskinsight-wavestone.com/en/tag/dlp-en/</link>
	<description>The cybersecurity &#38; digital trust blog by Wavestone&#039;s consultants</description>
	<lastBuildDate>Mon, 08 Feb 2021 15:44:17 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/Blogs-2024_RI-39x39.png</url>
	<title>DLP - RiskInsight</title>
	<link>https://www.riskinsight-wavestone.com/en/tag/dlp-en/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Migrate your work environment to Office 365 with confidence</title>
		<link>https://www.riskinsight-wavestone.com/en/2020/07/how-to-migrate-your-work-environment-serenely-to-office-365/</link>
		
		<dc:creator><![CDATA[GEneviEveLardon]]></dc:creator>
		<pubDate>Tue, 21 Jul 2020 17:14:42 +0000</pubDate>
				<category><![CDATA[Cloud & Next-Gen IT Security]]></category>
		<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Azure AD]]></category>
		<category><![CDATA[cloud]]></category>
		<category><![CDATA[data protection]]></category>
		<category><![CDATA[Digital Workplace]]></category>
		<category><![CDATA[DLP]]></category>
		<category><![CDATA[DRM]]></category>
		<category><![CDATA[identity]]></category>
		<category><![CDATA[Licensing]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[Office 365]]></category>
		<category><![CDATA[SaaS]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=13945</guid>

					<description><![CDATA[<p>Recent events have shown us that teleworking is no longer a luxury for employees, but a real necessity to ensure the continuity of organisations&#8217; activities. For those who have not yet taken the plunge (mainly ETIs and the public sector),...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/07/how-to-migrate-your-work-environment-serenely-to-office-365/">Migrate your work environment to Office 365 with confidence</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p style="text-align: justify;">Recent events have shown us that teleworking is no longer a luxury for employees, but a real necessity to ensure the continuity of organisations&#8217; activities.</p>
<p style="text-align: justify;">For those who have not yet taken the plunge (mainly ETIs and the public sector), it is essential to start thinking about Cloud collaboration and communication platforms as soon as possible. This, in order to be able to ensure continuity of service in case of force majeure (cyber attack, natural disaster or even pandemic), or even to envisage a more consequent migration.</p>
<p style="text-align: justify;">For this Digital Workplace platform, a close collaboration between the security team and the workplace will be a prerequisite!</p>
<p style="text-align: justify;">In this article, I will share with you some feedbacks on the deployment of Office 365, Microsoft&#8217;s solution that is becoming increasingly popular with the companies we support.</p>
<p style="text-align: justify;">There is a lot of interesting documentation on the subject on the Internet (&#8220;Top 10 best practices&#8221; or &#8220;3 good reasons to connect the xxx application to ensure your security&#8221;). Microsoft summarizes some of these good practices in these two articles:</p>
<ul style="text-align: justify;">
<li><a href="https://docs.microsoft.com/en-us/microsoft-365/security/office-365-security/security-roadmap?view=o365-worldwide">Security roadmap &#8211; Top priorities for the first 30 days, 90 days, and beyond</a></li>
<li><a href="https://docs.microsoft.com/en-us/microsoft-365/admin/security-and-compliance/secure-your-business-data?view=o365-worldwide">Top 10 ways to secure Microsoft 365 for business plans</a></li>
</ul>
<p style="text-align: justify;">Today, I am not going to repeat here a non-exhaustive list of these good practices, but rather to remind you of six points of attention when opening such a service.</p>
<h2 style="text-align: justify;">1st point: Building the safety standard, a pillar of the future relationship between the safety and workplace teams.</h2>
<p style="text-align: justify;">As with any project of this type, the first step is to assess the potential of the service and see how it can meet the initial need, through the development of a business case. The possibilities offered by Office 365 are numerous: office automation, instant messaging or email, data visualization, development of applications without code, etc.</p>
<p style="text-align: justify;">As far as cybersecurity teams are concerned, there are two choices: to oppose this migration because of the risks linked to the American Cloud or to support the reflection to create new secure uses.</p>
<p style="text-align: justify;">In the vast majority of cases, the second choice is preferred. A tripartite relationship then begins, between the workplace teams, security and architects, with the aim of building a service for the users. A result of this step could be the development of a security standard, resulting from a risk analysis, defining the services used and with the associated configuration.</p>
<p style="text-align: justify;">Among the issues to be addressed are generally the following three themes:</p>
<ul style="text-align: justify;">
<li>What uses should be offered to people in a situation of mobility? With what authentication?</li>
<li>What new services to offer with the possibilities of integration with APIs?</li>
<li>How to share documents with external users?</li>
</ul>
<p style="text-align: justify;">The current trend is to provide answers with a &#8220;<a href="https://www.wavestone.com/app/uploads/2017/07/generation-cybersecurity-model.pdf">Zero Trust</a>&#8221; approach. Any deviation from the defined safety standard will have to be detected, thanks to the implementation of dashboards and supervision. The adage &#8220;Trust does not exclude control&#8221; has never made more sense.</p>
<p style="text-align: justify;">This reflection may even be an opportunity to ask fundamental questions in order to lay a coherent foundation for the working environment. For example, why leave email, a 30-year-old system, open to everything and externally block my Teams and SharePoint shares? Improving the user experience can only be achieved by standardizing security practices.</p>
<figure id="post-15076 media-15076" class="align-none"><img fetchpriority="high" decoding="async" class="aligncenter wp-image-15076 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/1.png" alt="" width="1603" height="925" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/1.png 1603w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/1-331x191.png 331w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/1-68x39.png 68w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/1-120x70.png 120w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/1-768x443.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/1-1536x886.png 1536w" sizes="(max-width: 1603px) 100vw, 1603px" /></figure>
<p>&nbsp;</p>
<h2 style="text-align: justify;">2nd point: Data protection, a subject with the wind in its sails</h2>
<p style="text-align: justify;">Parallel to the construction of the service, comes the subject of the data that will be used in the tenant. For this, two simple questions must find answers (often complex).</p>
<h3 style="text-align: justify;">How do I protect my data?</h3>
<p style="text-align: justify;">Today, unstructured data protection strategies are based on <a href="https://www.riskinsight-wavestone.com/en/2018/05/classification-essential-aspect-data-protection/">a common basis</a>: the linking of data to a level of sensitivity. This correspondence leads to protection measures to be put in place:</p>
<ul style="text-align: justify;">
<li>&#8211; Encryption with keys controlled by the CSP or the organisation;</li>
<li>&#8211; Restriction of rights (or DRM);</li>
<li>&#8211; Conditional access with multi-factor authentication;</li>
<li>&#8211; Data Leakage Protection (or DLP).</li>
</ul>
<p style="text-align: justify;">In order not to over-protect data and thus avoid undermining the user experience, encryption and rights restriction can be reserved for the most critical data. Other data will still remain under control using more traditional measures, such as end-to-end encryption and exposure control.</p>
<p style="text-align: justify;">A key factor for such a project will be to turn it into a real business project, with a <a href="https://www.riskinsight-wavestone.com/en/2020/06/the-creation-of-wavestones-new-internal-awareness-program-1-2/">comprehensive awareness programme</a> dedicated to classification.</p>
<h3 style="text-align: justify;">How to remain compliant with the regulations?</h3>
<p style="text-align: justify;">An organisation may be subject to local, implementation-related and sector-specific regulations, depending on its activities.</p>
<p style="text-align: justify;">These regulations and directives in some cases impose real obstacles that need to be removed at the outset of the project: data retention, legal archiving, geolocation, judicial investigation, requests related to personal data.</p>
<p style="text-align: justify;">Let&#8217;s take a concrete example: Russia. With the law on personal data of 2015, the national regulatory authority imposes the obligation to keep the source (called primary database) of its citizens&#8217; data on Russian soil. In practice, this means that the Active Directory (primary base of corporate identities) of the Russian entity must remain Russian. From there, the information can be synchronized with the GAL (Global Access List) and Azure Active Directory.</p>
<h3 style="text-align: justify;">The thorny issue of stock management</h3>
<p style="text-align: justify;">What to do with the data already existing? This is a complex issue, especially if the opening of a Cloud collaboration solution is linked to the decommissioning of existing file servers.</p>
<p style="text-align: justify;">First of all, there is a technical question. Will the company&#8217;s network be able to support massive migrations of .pst and documents? In particular, it will not necessarily be useful to migrate data that does not comply with the retention policy.</p>
<p style="text-align: justify;">Secondly, historical data may have heterogeneous levels of sensitivity and be subject to various regulations. A trade-off will be necessary to arbitrate between local data retention, risk acceptance and a broad classification project before or after migration.</p>
<h2 style="text-align: justify;">3rd point: The Target Operating Model, guaranteeing the preservation of security over time</h2>
<p style="text-align: justify;">The operational model of a service such as Office 365 defines the responsibilities of the players (administrators, support staff, etc.) and the principles of object management. It is complementary to the security standard mentioned above, providing an operational vision.</p>
<p style="text-align: justify;">The TOM must be drawn up prior to the opening of the service and updated regularly. It must include at least the following subjects.</p>
<h3 style="text-align: justify;">A model of administration</h3>
<p style="text-align: justify;">Microsoft offers by default about 50 administration roles, not counting the RBAC roles of services (e.g. Exchange and Intune). A relevant use of these roles and custom roles will help to avoid having too many General Administrators and to follow the principle of least privilege. The implementation of Just-in-Time access will moreover make it possible to monitor the actual use of roles, while reinforcing security.</p>
<h3>A semi-architectural / semi-security community</h3>
<p style="text-align: justify;">Like any SaaS platform, Microsoft regularly upgrades the functionalities of its collaborative suite. The mission of this community will be to monitor trends, in order to master new uses and keep control of the tenant considering the evolutions.</p>
<h3 style="text-align: justify;">The life cycle of shared identities and spaces</h3>
<p style="text-align: justify;">If shared spaces (Teams, SharePoint) are not managed freely, this can lead to an explosion in the number of spaces that do not comply with the security standard. The reports of the editors of Data Discovery solutions are quite striking. To avoid this, it is necessary to establish a life cycle for shared spaces. These rules can include a naming convention, retention policies, a lifespan, principles for rights management.</p>
<p style="text-align: justify;">The establishment of a single portal for the creation of these spaces will make it possible to implement these good practices, while promoting the user experience.</p>
<p style="text-align: justify;">Similarly, a life cycle for Azure AD objects (including guest users, security groups, Office 365 groups and applications) must be defined and equipped. Here are two examples that deserve to be addressed: the delegation of APIs is left open and leaves the door open to massive data leaks; users invited to collaborate are never deleted. For this, two strategies are possible:</p>
<p style="text-align: justify;">If shared spaces (Teams, SharePoint) are not managed freely, this can lead to an explosion in the number of spaces that do not comply with the security standard. The reports of the editors of Data Discovery solutions are quite striking. To avoid this, it is necessary to establish a life cycle for shared spaces. These rules can include a naming convention, retention policies, a lifespan, principles for rights management.</p>
<p style="text-align: justify;">The establishment of a single portal for the creation of these spaces will make it possible to implement these good practices, while promoting the user experience.</p>
<p style="text-align: justify;">Similarly, a life cycle for Azure AD objects (including guest users, security groups, Office 365 groups and applications) must be defined and equipped. Here are two examples that deserve to be addressed: the delegation of APIs is left open and leaves the door open to massive data leaks; users invited to collaborate are never deleted. For this, two strategies are possible:</p>
<ul style="text-align: justify;">
<li>#1 &#8211; Creation of <em>a Custom Automation Engine</em> decorrelated from the IAM, via an in-house application developed in PowerShell ;</li>
<li>#2 &#8211; Integration of a Powershell / Graph API connector to the IAM solution in place in order to present a complete management of the objects, disregarding their direct hosting.</li>
</ul>
<h2 style="text-align: justify;">4th point: take a fresh look at the subject of user identity</h2>
<p style="text-align: justify;">Indeed, the subject of identity is a pillar of SaaS!  So, take the time to consider all the possibilities and risks of SaaS Identity Providers (or IdPs). In particular, it is unthinkable in 2020 to consider Azure Active Directory as a simple Domain Controller in the Cloud.</p>
<p style="text-align: justify;">Three approaches are possible for the source of identities accessing Office 365.</p>
<h3 style="text-align: justify;">The dissociation of identities, a quick-win but complicated from a user&#8217;s point of view</h3>
<p style="text-align: justify;">It is possible to dissociate the local and Cloud identities if the local DA is no longer available or to decorate the Cloud workspace from the historical IS. This scenario is obviously not in favour of an optimal experience, but may be a valuable asset in the event of a crisis.</p>
<h3 style="text-align: justify;">The use of local identity in the Cloud, a classic strategy</h3>
<p style="text-align: justify;">In order to reconcile security and user experience, it is necessary to use the same identity between the legacy applications and this new service. For this, three technical scenarios are available:</p>
<ul style="text-align: justify;">
<li>Identity Federation : This historic solution is widely used by large French companies that are reluctant to host passwords in the Cloud and wish to have SSO;</li>
<li>Password Hash Sync (PHS): This solution, recommended by Microsoft and the British equivalent of ANSSI, is implemented by the vast majority of Microsoft customers. This solution can also be used as a back-up when the federation service is no longer available;</li>
<li>Direct Authentication (Password Through Authentication or PTA): This solution provides the best user experience but has the disadvantage of passing the password through Azure AD.</li>
</ul>
<h3 style="text-align: justify;">Migrating one&#8217;s identity repository to the Cloud, a longer-term vision</h3>
<p style="text-align: justify;">Before or after migration, it may be appropriate to consider fully migrating the source of identities into the Cloud (whether Azure AD or a third party solution), in order to take advantage of the new possibilities. There are still several prerequisites that need to be lifted, such as printer, GPO and terminal management.</p>
<h2 style="text-align: justify;">5th point: Gradually open up services to encourage controlled adoption</h2>
<p style="text-align: justify;">It is always easier to open a new service than to go back for safety reasons. Massively opening the different services of the collaborative suite has the advantage of offering a maximum number of uses cases but can cause several side effects.</p>
<p style="text-align: justify;">First of all, services that are not officially supported and left in the hands of users for testing purposes represent a definite risk. They need to be configured and hardened. In some cases, it may even be preferable to disable the corresponding licenses.</p>
<p style="text-align: justify;">Secondly, a controlled launch of the tools will help control costs during the first months or years of the transition. As Microsoft licences represent a certain load, it is possible to optimize unused licences.</p>
<p style="text-align: justify;">Change management is also a key aspect to consider; to promote the user experience, of course, but also to promote data security. It is essential to have a clearly defined roadmap and user journey. Accompanied adoption will lay the foundations for proper governance of shared spaces and data (both in terms of exposure and protection).</p>
<p style="text-align: justify;">It will be useful to consider creating a community of evangelists and users in order to maintain momentum in the adoption of the new functionalities brought by Microsoft. A uservoice system could be an asset; the ideal would be to listen to the needs of users and prioritise future openings.</p>
<h2 style="text-align: justify;">6th and last point: Licences, the lifeblood of Office 365 and its security</h2>
<p style="text-align: justify;">SaaS solutions are generally subject to a monthly invoiced licensing model. The choice of Microsoft 365 licences must be the result of a global reflection. It cannot remain the prerogative of workplace teams and be determined solely by the need for collaboration and communication.</p>
<p style="text-align: justify;">Indeed, the choice of licensing level will condition the security strategy of the tenant. This choice will have a wider impact on the strategy for securing the work environment. Indeed, Microsoft is increasingly positioning itself as a challenger to security solution providers, being the only one to offer such a complete suite.</p>
<p style="text-align: justify;">The <em>licensing</em> of security options must be dealt with at the start of the project and at each renewal. It will be cheaper to include a licensing package from the outset than to order AAD P1 licences on an emergency basis to cover an unforeseen need for conditional access.</p>
<p style="text-align: justify;">In this strategy to be defined, it may be appropriate to target individuals to adapt the security requirements to their profile (VIP, admin, medical population, etc.).</p>
<p style="text-align: justify;"><em>This approach, presented here for Office 365, can be generalised to any SaaS (Solution as a Service) service, or even IaaS (Infrastructure as a Service) or PaaS (Platform as a Service) service.</em></p>
<p style="text-align: justify;"><em> </em></p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/07/how-to-migrate-your-work-environment-serenely-to-office-365/">Migrate your work environment to Office 365 with confidence</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Boost your cybersecurity thanks to Machine Learning?  Part 1 – « Absolutely, here’s how! »</title>
		<link>https://www.riskinsight-wavestone.com/en/2020/07/boost-your-cybersecurity-thanks-to-machine-learning-1-2/</link>
		
		<dc:creator><![CDATA[Carole Meyziat]]></dc:creator>
		<pubDate>Fri, 03 Jul 2020 12:00:14 +0000</pubDate>
				<category><![CDATA[Cloud & Next-Gen IT Security]]></category>
		<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[data analysis]]></category>
		<category><![CDATA[DLP]]></category>
		<category><![CDATA[Machine learning]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=13821</guid>

					<description><![CDATA[<p>Nowadays, we hear about artificial intelligence (AI) everywhere, it affects all sectors&#8230; and cybersecurity is not to be left out! According to a global benchmark published by CapGemini in the summer of 2019, 69% of organizations consider that they will...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/07/boost-your-cybersecurity-thanks-to-machine-learning-1-2/">Boost your cybersecurity thanks to Machine Learning?  Part 1 – « Absolutely, here’s how! »</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Nowadays, we hear about artificial intelligence (AI) everywhere, it affects all sectors&#8230; and cybersecurity is not to be left out! According to a global benchmark published by CapGemini in the summer of 2019, 69% of organizations consider that they will no longer be able to respond to a cyber-attack without AI. Gartner places <strong>AI applied to cybersecurity</strong> in the top 10 strategic technological trends for 2020.</p>
<p>Throughout two articles, we will explore AI&#8217;s capabilities, specifically those pertaining to Machine Learning for cybersecurity. In this first article, we will go through each stage of a Machine Learning project focused on a cybersecurity use scenario: <strong>the exfiltration of data from the IS</strong>, on a very simplified case. We have chosen a case study, but the concepts of this article are applicable to all Machine Learning projects and can be transposed to any other use case, most notably cyber.</p>
<figure id="post-13789 media-13789" class="align-none"></figure>
<p>&nbsp;</p>
<h2>First of all, what are we talking about?</h2>
<p>The term Artificial Intelligence (AI) includes all the techniques that allow machines to simulate intelligence. Today, however, when we talk about AI, we very often talk about <strong>Machine Learning</strong>, one of its sub-domains. These are <strong>techniques that enable machines to learn a task, without having been explicitly programmed to do so</strong>.</p>
<p>For us cybersecurity professionals, this is a good thing: we often find it difficult to describe explicitly what it is we want to detect! Machine Learning then provides us with new perspectives, that have already many application cases, of which the main ones are illustrated hereunder:</p>
<p>&nbsp;</p>
<figure id="post-13847 media-13847" class="align-none"><img decoding="async" class="size-full wp-image-13847 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/07/Image-0-1.png" alt="" width="1189" height="543" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/07/Image-0-1.png 1189w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/07/Image-0-1-418x191.png 418w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/07/Image-0-1-71x32.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/07/Image-0-1-768x351.png 768w" sizes="(max-width: 1189px) 100vw, 1189px" /></figure>
<p>&nbsp;</p>
<h2>The example of a use case for ML-enhanced cybersecurity: the DLP</h2>
<p>To illustrate the contribution of Machine Learning to cybersecurity, we have chosen to focus on the fraudulent extraction of data from a company&#8217;s information system. In other words, the case of DLP (Data Leakage Prevention), an issue encountered by many companies. We want to detect suspicious outbound communications in order to prevent them from happening.</p>
<p>&nbsp;</p>
<figure id="post-13829 media-13829" class="align-none"><img decoding="async" class="size-full wp-image-13829 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/07/Image-1-2.png" alt="" width="1363" height="335" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/07/Image-1-2.png 1363w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/07/Image-1-2-437x107.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/07/Image-1-2-71x17.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/07/Image-1-2-768x189.png 768w" sizes="(max-width: 1363px) 100vw, 1363px" /></figure>
<p>&nbsp;</p>
<p><em>«Very well but… how do we identify a suspicious communication? »</em></p>
<p>By large traded volumes? By a strange destination? By an unusual connection time?</p>
<p>In reality, our problem is <strong>complex to explain </strong>and what we need to assess is <strong>likely to change over time</strong>. Therefore, by using only static detection rules, our security teams find it difficult to be exhaustive. They can play on the thresholds of these rules to refine the detected elements, but unfortunately still find themselves with a large number of false positives to deal with.</p>
<p>We understand that the Machine Learning as we defined it previously can be useful here. What if we try it?</p>
<p>&nbsp;</p>
<figure id="post-13831 media-13831" class="align-none"><img loading="lazy" decoding="async" class="size-full wp-image-13831 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/07/Image-2-3.png" alt="" width="1239" height="561" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/07/Image-2-3.png 1239w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/07/Image-2-3-422x191.png 422w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/07/Image-2-3-71x32.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/07/Image-2-3-768x348.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/07/Image-2-3-730x330.png 730w" sizes="auto, (max-width: 1239px) 100vw, 1239px" /></figure>
<p>&nbsp;</p>
<h2>Step 1: Clarify the need</h2>
<p>That is what we just did!</p>
<p>&nbsp;</p>
<h2>Step 2: Choose the data</h2>
<p>When we hear the words Machine Learning, we usually must understand &#8220;data&#8221; to feed the algorithms. <strong>Lots of data, and of good quality!</strong></p>
<p>When asking where to get useful data for our data exfiltration case to our <strong>requesting business</strong> (which for once is cybersecurity!), the web proxy stands out as the big winner: it sees almost all the traffic that comes out through the IS. So, we recovered its logs and they look like this:</p>
<p>&nbsp;</p>
<figure id="post-13833 media-13833" class="align-none"><img loading="lazy" decoding="async" class="size-full wp-image-13833 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/07/Image-3-2.png" alt="" width="1227" height="331" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/07/Image-3-2.png 1227w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/07/Image-3-2-437x118.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/07/Image-3-2-71x19.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/07/Image-3-2-768x207.png 768w" sizes="auto, (max-width: 1227px) 100vw, 1227px" /></figure>
<p><em> </em></p>
<p><em>« This all seems quite complicated…»</em></p>
<p><em>Data scientists </em>have indeed enough reasons to get lost: on the one hand, the whole thing is not easily understandable, and on the other hand, after consultation with the cybersecurity business, <strong>not all fields are really useful for our use case. We therefore selected some</strong> of them with the cybersecurity business before continuing.</p>
<p>&nbsp;</p>
<figure id="post-13835 media-13835" class="align-none"><img loading="lazy" decoding="async" class="size-full wp-image-13835 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/07/Image-4-2.png" alt="" width="1297" height="218" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/07/Image-4-2.png 1297w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/07/Image-4-2-437x73.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/07/Image-4-2-71x12.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/07/Image-4-2-768x129.png 768w" sizes="auto, (max-width: 1297px) 100vw, 1297px" /></figure>
<p>&nbsp;</p>
<p>The result is easier for data scientists to use!</p>
<p>&nbsp;</p>
<h2>Step 3: prepare the data</h2>
<p>Data scientists can now &#8220;explore the data&#8221; in order to ensure optimal learning of the algorithm. Here, they give us a surprising element in the distribution of our requests according to their upload volume. Since we want to detect data exfiltration, this variable is of particular interest to us.</p>
<p>&nbsp;</p>
<figure id="post-13837 media-13837" class="align-none"><img loading="lazy" decoding="async" class="size-full wp-image-13837 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/07/Image-5-4.png" alt="" width="1179" height="481" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/07/Image-5-4.png 1179w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/07/Image-5-4-437x178.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/07/Image-5-4-71x29.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/07/Image-5-4-768x313.png 768w" sizes="auto, (max-width: 1179px) 100vw, 1179px" /></figure>
<p>&nbsp;</p>
<p>The value of our variable is not distributed, we even have a very high volume at 0.</p>
<p><em>“But still, there are a lot of these requests with a null upload volume; is it really relevant to keep them in our case? “. </em></p>
<p>Indeed, after discussion with the cybersecurity business, it appears that these data do not bring much for our use case. So we decided to remove them. Our sample was then distributed as follows:</p>
<p>&nbsp;</p>
<figure id="post-13839 media-13839" class="align-none"><img loading="lazy" decoding="async" class="size-full wp-image-13839 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/07/Image-6-4.png" alt="" width="1177" height="511" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/07/Image-6-4.png 1177w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/07/Image-6-4-437x191.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/07/Image-6-4-71x31.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/07/Image-6-4-768x333.png 768w" sizes="auto, (max-width: 1177px) 100vw, 1177px" /></figure>
<p>&nbsp;</p>
<p>After several back and forth exchanges between data scientists challenging the data from a statistical point of view and cybersecurity teams responding with their professional eye, the data is simplified as much as possible. Data is then:</p>
<ul>
<li><strong>Enriched </strong>by creating new variables that are denser in useful information. We introduced a<strong> relative upload volume </strong>to each site, measuring the difference between the upload volume of a request and its average value over the last 90 days. We could also add the<strong> connection time </strong>for example.</li>
<li><strong>Normalized </strong>by reducing the amplitude of each variable to decrease an over- or underweighting of certain variables.</li>
<li><strong>Digitized</strong>, as most algorithms can only interpret numerical variables.</li>
</ul>
<p>We can now split our data set in two: <strong>one set that will be used to train our model</strong>, <strong>one set that will allow us to test its performance</strong>. Several separation methods exist, enabling us to keep certain characteristics of the data (e.g. seasonality), but the objective remains the same: to guarantee an evaluation measure as close as possible to the model&#8217;s real performances, by presenting the model with data that it did not have at its disposal during training.</p>
<p>&nbsp;</p>
<h2>Step 4: Choosing the learning method and training the model</h2>
<p>Some algorithms are more efficient than others for a given problem, it is therefore necessary to make a reasoned choice.</p>
<p>There are two main categories of Machine Learning algorithms:</p>
<ul>
<li><strong>Supervised, </strong>when we have labeled data as a reference to give as an example to our algorithm. These algorithms are for example used in cybersecurity by anti-spam solutions: they can learn via the users’ classification of emails as spam for example.</li>
<li><strong>Unsupervised,</strong> when we do not know precisely what we want to detect or when we lack examples to provide the algorithm with for its learning (i.e. we lack labeled data).</li>
</ul>
<p>As explained above, the context of our use case points us more towards the second option. It is for the same reasons that we initially thought of Machine Learning. We then choose our unsupervised learning algorithm (Isolation Forest here, but we could have chosen another one) and train our model.</p>
<p>&nbsp;</p>
<h2>Step 5: Analyze results</h2>
<p>We use our test data set to evaluate the effectiveness of our model in detecting exfiltration cases.</p>
<p>The designed model detects patterns in the data (queries), then compares the new data (queries) with these patterns and <strong>highlights those that deviate from what it considers to be the norm through its learning (anomaly score).</strong></p>
<p>Here are our results:</p>
<p>&nbsp;</p>
<figure id="post-13841 media-13841" class="align-none"><img loading="lazy" decoding="async" class="size-full wp-image-13841 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/07/Image-7-2.png" alt="" width="1212" height="515" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/07/Image-7-2.png 1212w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/07/Image-7-2-437x186.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/07/Image-7-2-71x30.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/07/Image-7-2-768x326.png 768w" sizes="auto, (max-width: 1212px) 100vw, 1212px" /></figure>
<p>&nbsp;</p>
<p><em>« Ok, but how should I interpret all this ? »</em></p>
<p>The graph on the left represents the anomaly scores associated with each query in the test set, sorted in chronological order. To the right are the logs with the highest anomaly scores.</p>
<p>After investigation with the cybersecurity business:</p>
<ul>
<li>The peak in yellow, corresponds to <strong>a much larger upload volume</strong> than others, from a user who extracts a large volume of data. This anomaly is legitimate. However, an alert based on a static volume per request rule would also have detected this suspicious communication.</li>
<li>More interesting now, the peaks in red, correspond to <strong>requests for low volumes of regular uploads to unknown sites from the same user.</strong> These anomalies are harder to detect with conventional means, yet <strong>our algorithm has given them the same anomaly score as a large volume.</strong> They therefore become just as high a priority to qualify for our cybersecurity alert management teams.</li>
</ul>
<p>&nbsp;</p>
<figure id="post-13843 media-13843" class="align-none"><img loading="lazy" decoding="async" class="size-full wp-image-13843 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/07/Image-8-2.png" alt="" width="1184" height="523" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/07/Image-8-2.png 1184w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/07/Image-8-2-432x191.png 432w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/07/Image-8-2-71x31.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/07/Image-8-2-768x339.png 768w" sizes="auto, (max-width: 1184px) 100vw, 1184px" /></figure>
<p>&nbsp;</p>
<p>Now, let&#8217;s focus on the large package in the center of the graph (in orange). On the first day, we observe a large anomaly score, a sudden <strong>sending of data by many users to the city&#8217;s transit website</strong>. After investigation we realize that this is <strong>not a real security incident</strong>, but the annual sending of receipts for the continuation of transport subscriptions (we are at the beginning of September &#8230;).  We then observe that the <strong>algorithm &#8220;understands&#8221; that these flows return to several users and progressively integrates them as a habit. The risk score therefore decreases day by day.</strong></p>
<p>The model therefore detects what is out of the norm, regardless of the standard, and corrects itself with experience. <strong>This is where Machine Learning presents a real added value compared to traditional detection methods.</strong></p>
<p>If the performance of the model on this first simplified use case attests to the potential value of the Learning Machine, it may be time to move on to step 6 &#8211; deployment to scale!</p>
<p>In a second article we will come back to these steps to highlight the success factors and pitfalls to be avoided when studying the possibilities of Machine Learning in cybersecurity.</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/07/boost-your-cybersecurity-thanks-to-machine-learning-1-2/">Boost your cybersecurity thanks to Machine Learning?  Part 1 – « Absolutely, here’s how! »</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>DLP: how to avoid leaks without having to plug any holes</title>
		<link>https://www.riskinsight-wavestone.com/en/2019/02/dlp/</link>
		
		<dc:creator><![CDATA[GEneviEveLardon]]></dc:creator>
		<pubDate>Mon, 11 Feb 2019 18:40:56 +0000</pubDate>
				<category><![CDATA[Cloud & Next-Gen IT Security]]></category>
		<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[data management]]></category>
		<category><![CDATA[data protection]]></category>
		<category><![CDATA[data security]]></category>
		<category><![CDATA[DLP]]></category>
		<category><![CDATA[governance]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=11683</guid>

					<description><![CDATA[<p>Today, more than ever, data protection is one of the major challenges facing companies. Pressure in this area is mounting: increasing legislation (such as the GDPR), new requirements from regulators, rising cyber threats, the challenge of user awareness, and more....</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2019/02/dlp/">DLP: how to avoid leaks without having to plug any holes</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><em>Today, more than ever, data protection is one of the major challenges facing companies. Pressure in this area is mounting: increasing legislation (such as the GDPR), new requirements from regulators, rising cyber threats, the challenge of user awareness, and more.</em></p>
<p><em>Meanwhile, the ecosystem within which data develops is becoming</em> <em><u><a href="https://www.riskinsight-wavestone.com/en/2016/05/levolution-modele-de-securite-chateau-fort-a-laeroport/">continually more complex</a></u></em><em>. Indeed, information systems, which are in the full throes of transformation, are opening up to the outside world, becoming interconnected with numerous public cloud services, and creating escape routes for the company’s data.</em></p>
<p>&nbsp;</p>
<p>A diversity of events can result in a data leak: employee negligence, internal fraud, third-party hacking etc. and the routes out are just as varied: email, Shadow IT, USB sticks, printers, etc. When an incident occurs, the <strong>consequences can be significant</strong>. The media take pleasure in persistently highlighting cases of hacking that have resulted in data leakage from major companies, something that permanently damages <strong>corporate reputations</strong>. The associated <strong>financial losses</strong> can also be significant, compounded by <strong>regulatory penalties</strong> and <strong>lost confidence</strong> on the part of customers and partners.</p>
<p>&nbsp;</p>
<figure id="post-11684 media-11684" class="align-none"><img loading="lazy" decoding="async" class="aligncenter wp-image-11684 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2019/02/image1.png" alt="" width="1657" height="766" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2019/02/image1.png 1657w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/02/image1-413x191.png 413w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/02/image1-768x355.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/02/image1-71x33.png 71w" sizes="auto, (max-width: 1657px) 100vw, 1657px" /></figure>
<p style="text-align: center;"><em> Today’s IS: a complex ecosystem that can open many doors to data leaks</em></p>
<p>&nbsp;</p>
<h2>DLP, an under-used &#8211; but eminently feasible &#8211; approach</h2>
<p>The major challenge that data leaks represent is not, however, insurmountable. Some companies, including banks, have taken the lead in this area, compared with other sectors, in deploying tools to avoid data leaks that come under the heading of Data Leak Prevention (or Data Loss Protection—DLP). These tools enable them to <strong>track sensitive data</strong> and <strong>apply rules</strong> that control data flows, in line with defined policies. These rules can be applied at <strong>terminal level</strong> (workstations, servers, etc.), <strong>application level</strong> (Office 365, etc.) or <strong>network level</strong> (proxies, etc.).</p>
<p>Implementing such solutions, however, requires a <strong>rigorously-designed project</strong> involving both the Information Security Department and the company’s business functions. Three main factors can be used to reduce the complexity involved in this approach:</p>
<p>&nbsp;</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-11688 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2019/02/image3.png" alt="" width="1516" height="360" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2019/02/image3.png 1516w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/02/image3-437x104.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/02/image3-768x182.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/02/image3-71x17.png 71w" sizes="auto, (max-width: 1516px) 100vw, 1516px" /></p>
<p>&nbsp;</p>
<p>The issues that need to be addressed, and the corresponding technical solutions, in such a project, will depend on corporate objectives aimed at mitigating the risk of data leakage, as well as the level of current practices and <u><a href="https://www.riskinsight-wavestone.com/en/2018/05/classification-essential-aspect-data-protection/">classification methods</a></u>.</p>
<p>It’s also imperative, when implementing DLP solutions, to preserve the <strong>user experience</strong>: users should not expect to see their activities impacted by new protection mechanisms. Therefore, security objectives must <strong>take into account the needs of the business, which may require sensitive information to be exchanged with the outside world</strong>.</p>
<p>&nbsp;</p>
<h2>The recipe for a successful DLP project</h2>
<p>Firstly, selection of the DLP tool should be based on the objectives defined at the start of the project, in terms of the structure of the data to be protected and the channels of exchange to be analyzed.</p>
<p>Some market solutions are highly mature when it comes to detecting whether data is sensitive, regardless of the data structure or transmission channel. The detection of structured data is simpler because it’s easier to characterize (for example: a social security record, or credit card number, have a defined number of digits). For unstructured data (which comprises 80% of all data, according to Gartner), detection can be based on <strong>the analysis of the metadata introduced during classification</strong>.</p>
<p>Next, the project should be framed to define and formalize the <strong>four essential areas</strong> of a DLP project, which are the keys to success in deploying the solution:</p>
<p>&nbsp;</p>
<h3>Mapping sensitive data and defining the associated protection rules</h3>
<p>Where a company has already <strong><u><a href="https://www.riskinsight-wavestone.com/en/2018/02/turn-records-management-business-asset/">mapped data and processing activities</a></u></strong> that are considered sensitive—as well as what it deems legitimate flows—this can serve as a basis for the development of the DLP policies and detailed protection rules during the project.</p>
<p>If such mapping has not been carried out, a DLP project cannot succeed without <strong>strong involvement from the business functions</strong>. The project team will need to connect with the relevant departments and activities, to identify the sensitive data and the associated processing activities. This initial analysis will enable the demarcation of <strong>legitimate processing, storage, and transmission channels</strong>, both internal and external, to be separated out. And doing it successfully will mean working closely with key contacts from the various departments who will need to be interviewed to gather the information needed.</p>
<p>Following this, the project team can create the DLP policies to cover scenarios that represent data leaks.</p>
<p>Feedback from major corporates, however, shows that <strong>a key success factor in such projects is knowing how to pick your fights</strong>; it’s unrealistic—at least at first—to try to implement all potential DLP policies. Implementing good coverage of the company’s most critical data will already demonstrate a satisfactory level of maturity compared with current norms.</p>
<p>&nbsp;</p>
<h3>The identification of the legal and regulatory requirements associated with the processes being analyzed</h3>
<p>The regulations that apply to sensitive data, such as <u><a href="https://www.riskinsight-wavestone.com/en/2016/03/8822/">personal data</a></u> (for example national information processing laws, the EU’s GDPR, etc.) impose specific limits on the extent that such data can be legitimately processed. Moreover, companies operating in an international context have to comply with local regulatory frameworks, of which each has its own particularities. This results in a diversity of rules to be followed concerning data processing.</p>
<p>When it comes to legal compliance, it’s important to <strong>take the advice of the company’s own legal and compliance departments,</strong> as well as the various international entities who can approve the analyses and protection rules to be applied to the data.</p>
<p>The main points to be addressed during this <strong><em>regulatory due diligence</em></strong> are the processing of personal data, the notification of users about the processing being carried out, the place that the processed data is stored, and the transfer channels used.</p>
<p>&nbsp;</p>
<h3>Defining the process for managing data leak incidents</h3>
<p>The operational implementation of previously considered DLP scenarios then requires the project team to define the resources and processes that will be set in motion when a data leak is detected. These will, of course, <strong>need to be tailored to the company’s incident management processes</strong>:</p>
<ul>
<li>Who will receive the alerts related to potential data leaks (the SOC (if there is one), a dedicated team linked to a business function, etc.)?</li>
<li>What resources are to be put in place during the investigation of an impacted area (for example, in the event of a highly sensitive area being affected, will an inquiry need to maintain a certain level confidentiality)?</li>
<li>Depending on the level of criticality, which hierarchical and operational levels should be made aware?</li>
</ul>
<p>Unlike technical security incidents, it may be important to integrate relevant business teams, or the security manager of the part of the business in question, into the process in order to define the criticality of a data leak and its scope. In cases involving structured data, criticality can be evaluated simply, using correspondence tables, but the thinking required is of a completely different nature when unstructured data is involved (for example, an email from a company manager or a document related to a confidential project).</p>
<p>Strong <em>sponsorship</em> will also be required to ensure that the objectives and methods implemented under DLP are approved by the various business functions, the HR department, and employee representatives.</p>
<p>&nbsp;</p>
<h3>Implementing a tool tailored to the scenarios defined</h3>
<p>Along with the definition of the incident management process, the supervision model and choice of tools must also be fleshed out. In addition <strong>to being able to address the detection scenarios defined, the tool selected will need to comply with certain prerequisites specific to the company&#8217;s ecosystem, as well as with the results of the regulatory due diligence performed</strong>. The criteria for the choice of technical solution should include the ability to:</p>
<ul>
<li>Integrate it with SOC tools (SIEM, etc.), and ideally with other enterprise security solutions (proxy, encryption tools/DRM, etc.);</li>
<li>Tailor it to the business environment (collaborative platforms, file servers, etc.);</li>
<li>Take into account the diversity of IT assets and the information system in case of deployment of add-on or application.</li>
</ul>
<p>In addition, the effective implementation of a DLP strategy must, as an imperative, cover all channels of exchange and business use cases, in order <strong>not to leave any backdoors open</strong> (for example, installing a DLP tool at server, mail, and file levels, while leaving USB ports unprotected).</p>
<p>&nbsp;</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-11686 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2019/02/Image2.png" alt="" width="1460" height="643" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2019/02/Image2.png 1460w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/02/Image2-434x191.png 434w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/02/Image2-768x338.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/02/Image2-71x31.png 71w" sizes="auto, (max-width: 1460px) 100vw, 1460px" /></p>
<p style="text-align: center;"><em>The four pillars of DLP</em></p>
<p>&nbsp;</p>
<p>Implementing the solution doesn’t mark the end of the interest in data leak prevention: the DLP process must be part of a <strong>process of continuous improvement</strong>. The study of false positives and alerts should lead to <strong>regular reviews</strong> (at least every six months) to improve the detection scenarios in use. To do this, it’s good practice to <strong>anticipate, right from the beginning of the project, the associated resource requirement from </strong><em>Run</em><strong> teams, and to start with the basic scenarios</strong>.</p>
<p>&nbsp;</p>
<p><em>It also makes sense to incorporate the DLP project’s objectives within a larger program to address data protection, including the review of file server rights and permissions, authentication with conditional access, and the integration of supervision with SOC and the encryption of files and applications.</em></p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2019/02/dlp/">DLP: how to avoid leaks without having to plug any holes</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Classification: that essential aspect of data protection</title>
		<link>https://www.riskinsight-wavestone.com/en/2018/05/classification-essential-aspect-data-protection/</link>
		
		<dc:creator><![CDATA[GEneviEveLardon]]></dc:creator>
		<pubDate>Sat, 12 May 2018 13:31:39 +0000</pubDate>
				<category><![CDATA[Cloud & Next-Gen IT Security]]></category>
		<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Classification]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[data protection]]></category>
		<category><![CDATA[DLP]]></category>
		<category><![CDATA[information protection]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=10765/</guid>

					<description><![CDATA[<p>Data is the 21st century’s black gold: an observation you won’t be particularly surprised to hear. The fact that it is ever-more exposed (through the increasing use of APIs and SaaS applications such as Office365, Salesforce, Shadow IT, etc.) and...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2018/05/classification-essential-aspect-data-protection/">Classification: that essential aspect of data protection</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Data is the 21st century’s black gold: an observation you won’t be particularly surprised to hear. The fact that it is ever-more exposed (through the increasing use of APIs and SaaS applications such as Office365, Salesforce, Shadow IT, etc.) and therefore at greater risk, won’t surprise anyone either.</p>
<p>The question is no longer whether data can leak (intentionally or not) and be misappropriated, but rather, how to secure it, and limit the impact when it does leak.</p>
<p>Against a backdrop like this, <strong>security models need to evolve</strong>. The <a href="https://www.riskinsight-wavestone.com/en/2016/05/levolution-modele-de-securite-chateau-fort-a-laeroport/">castle model is now largely outdated</a>, and is <a href="https://www.wavestone.com/app/uploads/2017/02/cybersecurite-directive-nis-union-europeenne.pdf">being replaced by that of the airport</a>. <strong>Data-centric protection</strong> then becomes an imperative. And such protection also has to <strong>meet the daily needs of those same users who worry about being affected.</strong></p>
<p>&nbsp;</p>
<h2>2 the different types of data &#8230; And the different approaches they require</h2>
<p>The large data-protection projects launched by major players all face the same problem: how to decide how sensitive a given piece of information actually is. The answer to this question is key: it’s this that determines the relevant level of protection needed to avoid data leakage.</p>
<p>Today, there are two broad types of data:</p>
<ul>
<li><strong>Structured data</strong>, which refers to all information that follows a particular format, and is easily identifiable as such: a CRM field, social security number, official certificates, and email addresses, as well as a host of other data that can be expressed in a clearly defined format (1). Typically, this information is found in the databases of applications.</li>
<li><strong>Unstructured data</strong>, which can exist in any format (such as MS Office documents, PDFs, images, videos, music, business application files, etc.). It should be noted that data which, at first glance, might be considered structured (for example, the telephone field of a CRM), may not be so if the format in which the data is entered is not followed strictly.</li>
</ul>
<p>Structured data can be easily identified, and its sensitivity assessed according to predefined norms; but unstructured data presents a problem of a whole different magnitude—and it’s mostly this type of data that employees generate day to day. In concrete terms, this translates into an inability of the relevant security tools (such as: Data Loss Prevention/DLP) to identify a leak or the misappropriation of vital information.</p>
<p>The classification of unstructured data, then, represents the cornerstone of any data protection strategy—and it&#8217;s something that has to be done manually by end users.</p>
<p>&nbsp;</p>
<h2>But what is classification?</h2>
<p>&#8220;Data classification&#8221; means <strong>the entirety of the technical and organizational processes used to categorize information produced</strong> by the employees of an organization. Following the categories defined – according to levels of sensitivity (for example, internal, confidential, secret, etc.) or by relevant organizational functions (such as HR, R&amp;D, Purchasing, etc.) – classification allows data to be placed within the appropriate regulatory, legislative, or security framework.</p>
<p>Historically very basic (for example, a checkbox in a header or on the first page of a document, or the manual addition of metadata), classification consolidates data, and makes users responsible, by placing them at the center of the process, while, at the same time, offering them an improved experience (a simple interface and clear advice).</p>
<p>In practice, classification tools offer a diverse range of functionality:</p>
<ul>
<li>For new files, either <strong>manual or automatically determined classification </strong>according to predefined rules (for example, the presence of a certain number of social security numbers);</li>
<li>For existing files, <strong>the manual scanning of files stored in local directories or on premises</strong>, according to predefined rules;</li>
<li><strong>The addition of metadata (or tagging) to the file</strong>: this metadata, which can be interpreted by third-party tools, unlocks visibility for supervisory tools such as Data Loss Prevention;</li>
</ul>
<p><strong>The addition of visual marking elements</strong> (such as headers, footers, and watermarks) to raise awareness among end users.</p>
<p>&nbsp;</p>
<h2>The results of classification projects have been inconclusive so far</h2>
<p><strong>RSSI procedures tend to take into account</strong> issues of data classification, and the issue is core to most major corporations’ policies. This <strong>imperative is reinforced</strong> by recent regulations such as the <a href="https://www.riskinsight-wavestone.com/en/2017/07/rgpd-1an-travaux-bilan-12/">GDPR</a> or the <a href="https://www.riskinsight-wavestone.com/en/2016/12/reussir-mise-conformite-loi-de-programmation-militaire/">French Military Programming Act (LPM)</a> which require the <a href="https://www.riskinsight-wavestone.com/en/2018/02/turn-records-management-business-asset/">mapping of data and uses</a>. <strong>However, few organizations, other than banks, have successfully implemented effective classification strategies.</strong></p>
<p>There are several reasons for this gap:</p>
<ul>
<li><strong>End users are generally not aware of the nature of the sensitive data or its impact</strong>: while the highest classification levels (&#8220;C4&#8221;, &#8220;Secret&#8221;, &#8220;Confidential&#8221;, etc.) are used for documents likely to put companies, or even entire Groups, at risk; these usually represent about 1% of all such information &#8211; although this proportion is close to 10% in some companies. Conversely, it is not uncommon for a user to share files containing sensitive personal data, or passwords, without any classification or protection.<br />
Thus, any data-classification project requires <strong>strong change-management support for end users</strong>. This should use clear messages and concrete examples, that allow users to classify information easily. Periodic recaps will also be needed to remind users what constitutes good practice. In fact, a user who handles sensitive data—day in, day out, may no longer be aware of the impact of this data being compromised.</li>
<li><strong>If they fail to provide users with sufficiently ergonomic approaches</strong>, companies cannot expect solid results. Experience shows that checkboxes for classification levels on cover pages, headers, or footers are only rarely selected.</li>
<li>The classification of the entirety of a company&#8217;s data is a transformation project in its own right and requires <strong>strong commitment from functional and corporate teams</strong> if it is to be widely delivered. This commitment must be even greater if the classification strategy that has been defined impacts users (through obligations to classify documents, use encryption, etc.).</li>
</ul>
<p>&nbsp;</p>
<h2>Classification takes center stage again</h2>
<p>The topic is back, in force, with large corporates, driven by digital transformation programs—requiring the rethinking of data protection, and with the large players in the market—who are shaping their offerings around the subject. Some analysts, like Gartner, even foresee the consolidation of data-protection solutions into a single, classification-centric solution.</p>
<p>Awareness and ergonomics will need to be combined, if such approaches are to be successful and end users are to buy into the process. The two will need to work together – hand in glove.</p>
<p>&nbsp;</p>
<p><em>In a future article, we’ll be looking at how the market is evolving for historical security players, and how the implementation of an effective classification strategy can provide a springboard for new impetus in data protection.  </em></p>
<p>&nbsp;</p>
<p>(1) A regular expression is a string of characters that corresponds to a specific syntax. For example, a French phone number can have one of three formats: 0123456789, +33123456789 or 0033123456789.</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2018/05/classification-essential-aspect-data-protection/">Classification: that essential aspect of data protection</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Le paradoxe des projets de Data Leak Prevention (DLP) : une problématique clé, des solutions matures… mais une mise en œuvre qui fait encore peur</title>
		<link>https://www.riskinsight-wavestone.com/en/2013/03/le-paradoxe-des-projets-de-data-leak-prevention-dlp-une-problematique-cle-des-solutions-matures-mais-une-mise-en-oeuvre-qui-fait-encore-peur/</link>
		
		<dc:creator><![CDATA[Ali Fawaz]]></dc:creator>
		<pubDate>Thu, 28 Mar 2013 13:14:18 +0000</pubDate>
				<category><![CDATA[Cloud & Next-Gen IT Security]]></category>
		<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Métiers - Stratégie & projets IT]]></category>
		<category><![CDATA[data protection]]></category>
		<category><![CDATA[DLP]]></category>
		<category><![CDATA[données]]></category>
		<category><![CDATA[fuite de données]]></category>
		<category><![CDATA[gestion des identités]]></category>
		<category><![CDATA[SOC]]></category>
		<guid isPermaLink="false">http://www.solucominsight.fr/?p=3598</guid>

					<description><![CDATA[<p>L’évolution des menaces et de la réglementation pousse les entreprises à être de plus en plus attentives à leurs données et à orienter les protections sur ce périmètre. Les solutions de prévention contre la fuite d’information, ou DLP, apportent des...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2013/03/le-paradoxe-des-projets-de-data-leak-prevention-dlp-une-problematique-cle-des-solutions-matures-mais-une-mise-en-oeuvre-qui-fait-encore-peur/">Le paradoxe des projets de Data Leak Prevention (DLP) : une problématique clé, des solutions matures… mais une mise en œuvre qui fait encore peur</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><em>L’évolution des menaces et de la réglementation pousse les entreprises à être de plus en plus attentives à leurs données et à orienter les protections sur ce périmètre. Les solutions de prévention contre la fuite d’information, ou DLP, apportent des éléments de réponses à leur problématique. Pour autant, si le besoin semble réel et les solutions matures, les retours d’expérience restent limités par rapport à ce que l’on pourrait attendre.</em></p>
<h2>Un apport des DLP complémentaire à la lutte contre l’intrusion et au contrôle d’accès</h2>
<p>Une fuite d’information peut provenir de trois sources différentes. L’attaquant externe est souvent celui qui vient à l’esprit en premier. Cependant, l’expérience montre que ce sont les utilisateurs internes, autorisés ou non, qui font fuir le plus d’information.</p>
<p>Suivant la position de celui qui fait fuir l’information, trois grandes étapes peuvent être enchaînées : intrusion, accès à l’information, diffusion de l’information – dont la nécessité dépend des accès initiaux de l’acteur à l’origine de la fuite d’information. À chacune de ces étapes, des solutions de sécurité permettant de réduire le risque existent.</p>
<p><a href="http://www.solucominsight.fr/2013/03/le-paradoxe-des-projets-de-data-leak-prevention-dlp-une-problematique-cle-des-solutions-matures-mais-une-mise-en-oeuvre-qui-fait-encore-peur/role-dlp/" rel="attachment wp-att-3604"><img loading="lazy" decoding="async" class="alignnone  wp-image-3604" title="rôle DLP" src="http://www.solucominsight.fr/wp-content/uploads/2013/03/rôle-DLP-.jpg" alt="" width="631" height="308" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2013/03/rôle-DLP-.jpg 902w, https://www.riskinsight-wavestone.com/wp-content/uploads/2013/03/rôle-DLP--392x191.jpg 392w, https://www.riskinsight-wavestone.com/wp-content/uploads/2013/03/rôle-DLP--71x35.jpg 71w" sizes="auto, (max-width: 631px) 100vw, 631px" /></a></p>
<p>Il convient d’agir à toutes les étapes d’une fuite d’information en s’appuyant sur des mesures allant de la sécurité physique aux solutions de <em>Digital Right Management</em> (DRM), en passant par le chiffrement de flux, le cloisonnement, ou encore la gestion des accès et des habilitations…</p>
<p>Si de telles mesures sont déjà mises en œuvre,<strong> les outils de DLP permettent alors essentiellement de se prémunir contre des erreurs ou malveillances d’utilisateurs ayant un accès légitime à l’information</strong>. En ce sens, ils permettent d’apporter<strong> une protection au plus proche de la donnée</strong>.</p>
<h2>Des solutions fonctionnellement matures</h2>
<p>Les mécanismes de contrôle des DLP sont mis en œuvre à travers des <strong>règles ou politiques centralisées</strong> permettant d’analyser les traitements faits sur la donnée quelle que soit sa nature ou son support.</p>
<p><a href="http://www.solucominsight.fr/2013/03/le-paradoxe-des-projets-de-data-leak-prevention-dlp-une-problematique-cle-des-solutions-matures-mais-une-mise-en-oeuvre-qui-fait-encore-peur/fonctionnement-dlp/" rel="attachment wp-att-3605"><img loading="lazy" decoding="async" class="alignnone  wp-image-3605" title="Fonctionnement DLP" src="http://www.solucominsight.fr/wp-content/uploads/2013/03/Fonctionnement-DLP.jpg" alt="" width="572" height="368" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2013/03/Fonctionnement-DLP.jpg 954w, https://www.riskinsight-wavestone.com/wp-content/uploads/2013/03/Fonctionnement-DLP-297x191.jpg 297w, https://www.riskinsight-wavestone.com/wp-content/uploads/2013/03/Fonctionnement-DLP-61x39.jpg 61w" sizes="auto, (max-width: 572px) 100vw, 572px" /></a></p>
<p>Grâce à des <strong>agents déployés sur le réseau et/ou sur les postes de travail</strong>, le DLP va pouvoir empêcher la copie d’un fichier sur un périphérique externe, l’envoi d’un document sensible par email, l’impression d’un document ou encore la publication d’une information confidentielle sur les réseaux sociaux.</p>
<p>Après analyse et filtrage des données par la solution DLP, différentes mesures de prévention peuvent être prises, avec un impact plus ou moins élevé pour l’utilisateur : alertes, demande de justification, blocage…</p>
<p>Enfin, il convient de noter que les acteurs du marché mettent de plus en plus l’accent sur le contexte d’utilisation de la donnée. Certains éditeurs proposent ainsi des fonctionnalités de gouvernance au sein de leur solution de DLP permettant par exemple de <strong>savoir exactement où se trouvent les données sensibles et qui y a accès</strong>.</p>
<p><strong>Le marché des DLP est donc de plus en plus mature</strong> : la couverture fonctionnelle proposée est élevée et évolutive, la gestion de l’impact sur les collaborateurs de plus en plus souple. <strong>Néanmoins, les retours d’expérience restent limités par rapport à ce que l’on pourrait attendre</strong>.</p>
<p>La raison de ce paradoxe vient du fait que <strong>les métiers sont trop souvent insuffisamment impliqués dans les projets de DLP, alors même que ces projets n’ont que peu de chance d’aboutir sans eux, en particulier vu le volet RH nécessairement associé</strong>.</p>
<h2>Adopter une approche par les résultats pour mobiliser les métiers</h2>
<p><strong>Il est illusoire de vouloir protéger toutes ses données dans tous les cas d’usage imaginables</strong>. Une approche purement technique visant un périmètre exhaustif n’a que peu de chance de convaincre, particulièrement dans la conjoncture économique actuelle.</p>
<p><strong>Une approche par les résultats</strong> mêlant ciblage précis, démarche outillée, accompagnement et visibilité est donc à favoriser dès la sélection de la solution. Une fois les objectifs atteints sur un périmètre prioritaire, on peut envisager de l’élargir.</p>
<p>La première étape, primordiale, est donc <strong>la définition du périmètre prioritaire de données à protéger et des cas d’usage fonctionnels à traiter</strong>. Identifier les<strong> dix données les plus critiques, s’appuyer sur des situations fonctionnelles avérées</strong>, commencer par un nombre limités de supports pour réduire les aléas techniques sont autant de facteurs clés de succès.</p>
<p>La <strong>définition des processus de surveillance</strong> (politiques d’interaction avec les utilisateurs, processus en cas d’alerte…) ne doit également pas être négligée. Sur ce volet, et dès le début du projet, il est important de mobiliser les fonctions RH de l’entreprise pour valider le mode de mise en œuvre de la démarche DLP (alerte, blocage, journalisation…), construire les processus de gouvernance associés et au final envisager un passage devant les instances représentatives du personnel.</p>
<p>Lorsque le <strong>cadrage global du périmètre fonctionnel</strong> est effectivement achevé, la phase de sélection de la solution peut être entamée. Une démarche outillée impliquant la <strong>réalisation d’une maquette est indispensable</strong> pour s’assurer de l’adéquation de la solution aux cas d’usages fonctionnels identifiés et <strong>évaluer les résultats envisageables</strong>.</p>
<p>En cas de résultats satisfaisants, un déploiement progressif est à envisager avec un leitmotiv : la sensibilisation des utilisateurs.</p>
<p>Enfin, en mode récurrent, <strong>l’intégration à un SOC</strong> (Security Operation Center) peut permettre de bénéficier de la maturité de la gestion opérationnelle de la sécurité pour optimiser la surveillance d’une part et l’accompagnement et la visibilité fournis aux métiers d’autre part.</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2013/03/le-paradoxe-des-projets-de-data-leak-prevention-dlp-une-problematique-cle-des-solutions-matures-mais-une-mise-en-oeuvre-qui-fait-encore-peur/">Le paradoxe des projets de Data Leak Prevention (DLP) : une problématique clé, des solutions matures… mais une mise en œuvre qui fait encore peur</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
