What is DLP?DLP Investigation process & How it benefits organization
DLP TOOL SOP INVESGATION
1. Introduction
Force point DLP is the solution, enables organizations to encrypt information and block risky data flows properly in order to monitor and control the flow of data over their networks and to meet administrative compliance. The data visibility and controls managed by DLP network security enable policy based Protections to guarantee that delicate information is only being transmitted to or accessed by approved by beneficiaries. Which help to prevent the organization sensitive data lost, misused, or accessed by unauthorized users through endpoints (USB drive, Endpoint Printing, Endpoint HTTP/HTTPS, etc.) and through SMTP (Network DLP email monitoring) channel.
2. Purpose and Scope of this document
This document broadly outlines Company’s present Information Security and data protection monitoring and applies to all users of Mind tree infrastructure facilities and recipient of Company confidential Information and Information Asset(s).
This document is confidential to Company and may be share with Company Customers under appropriate agreements such as a NDA and / or MCA. Company Customers shall not share and / or publish this document.
3. Incident flowchart
4. Analyze incident details
After login to DLP console Go to Reporting Select Incident. We have multiple option to filter the incidents. Click on Table Properties to modify the filters/Search options available for incident grouping..
1. Under Report Catalog àSelect 7 days Incidents as shown below
2. For Incident validationà select under forensic Source àto filter the incident from source. We can also download the forensic files for further investigation as shown below.
5. Incident response Work Flow:
Analysts will monitor the DLP Dashboard 24/7; DLP Incident occurs when a user breach the Data protection policies defined by an organization.
1. Once the Incident created in DLP console, SoC analyst should assign the incident to their MID
2. Analyst should change the Incident status from New to In-Process
3. Based on the incident criticality, analyst will modify the severity of incident to progress further.
4. Validate the incident to understand for further escalations.
5. If the Incidents seems to be suspicious it as to escalate to Reporting manager to understand on the Event legitimacy.
6. Based on the confirmation from reporting manager, if the transaction performed by the violated user is legitimate then the incident status will be changed to False Positive
7. If the Manager confirms the transaction is suspicious then, this will have escalated to the next level to Security PoC Delivery team for further investigation.
8. Incident status should change to escalated and wait for response from IG PoC for closure
9. After the final confirmation from CISO(chief information security officer) team, the incidents will be concluding either False Positive or True Positive.
10. Refer section-10 for Incident escalation timelines.
Below screenshot to filters the incident count based on the status
Note: Filters can be modify based on the requirements as well.
6. DLP Monitoring Channels:
SOC team monitors the below SMTP and Endpoint channel for Incident response process.
1. Network Email: To monitor outbound emails send to specified destinations via protector/email security gateway.
2 .WEB Endpoint HTTP/HTTPS: To monitor endpoint devices like laptops and protect them from posting sensitive data to the WEB. This traffic can be monitor when endpoint machines are outside the network.
3. Endpoint Printing: To monitor when data send from an endpoint machine to a local or network printer. The system supports drivers that print to a physical device, not those that print to file or PDF.
4. Endpoint Removable Media: To monitor or prevent sensitive data from being transfer to removable media.
5. Endpoint Application: To monitor and prevent sensitive data from being transfer to Bluetooth
(Fsquirt.exe)
7. Incident and Response Escalation Matrix:
For Incident response validation follow the Vertical IRM PoC escalation process.
Level I-Data Policy Violated Source/user- Reportee Manager
Level II-Reporting Managers to Managers
Level III-Security PoC Delivery team
Level TV-CISO OFFICER
8. TRM Point of Contact Details - Security Delivery PoC
BFSI
CMT
9. Severity
![]()
Severity Response Time Resolution Time
High 30 mints 24 hours
Medium 30 mints 48 hours
Low 30 mints 72 hours
High- This breach is significant and may have a broad impact on the organization
Medium-This breach is moderate and should be reviewed
Low -This breach is in significant
10. Sample Mail Template
Hi User,
I am John from Cyber Security Team
As part of security monitoring, we found that your reportee "User Name" Company XXXXXXID has copied the below files to Endpoint/ SMTP Channel (Removable media/email attachment/ web/upload/ email).
Investigation details:
"Below forensic details are to be captured while sending the escalation to User's manager"
Event Time: XXXXXYXXXXXXXXXXX
File Path: XXXXXXXXXXXXXXXX
Destination: *****
Request your intervention to check the criticality of the files which has been shared to external device.
Please understand the intent behind doing this act and kindly confirm us to proceed further
Let me know for any clarification/ assistance"
Comments