Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and Copilots
    • Innovation & Leadership
    • Cybersecurity
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
  • Summit NA
  • Dynamics Communities
  • Ask Copilot
Twitter Instagram
  • Summit NA
  • Dynamics Communities
  • AI Copilot Summit NA
  • Ask Cloud Wars
Twitter LinkedIn
Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and CopilotsWelcome to the Acceleration Economy AI Index, a weekly segment where we cover the most important recent news in AI innovation, funding, and solutions in under 10 minutes. Our goal is to get you up to speed – the same speed AI innovation is taking place nowadays – and prepare you for that upcoming customer call, board meeting, or conversation with your colleague.
    • Innovation & Leadership
    • CybersecurityThe practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
    • Login / Register
Cloud Wars
    • Login / Register
Home » How Poor Data Loss Prevention (DLP) Policies Could Be Putting You at Risk
Cybersecurity

How Poor Data Loss Prevention (DLP) Policies Could Be Putting You at Risk

Robert WoodBy Robert WoodOctober 14, 2022Updated:December 1, 20224 Mins Read
Facebook Twitter LinkedIn Email
data loss prevention DLP policies
Share
Facebook Twitter LinkedIn Email
Acceleration Economy Cybersecurity

Data loss prevention (DLP) sounds like a great idea. Protecting data from loss, tampering, or theft is a central part of the security practitioner’s day-to-day job. Anyone who has ever gone through a DLP solution deployment likely has the metaphorical battle scars and war stories to prove it. DLP solutions, regardless of what the marketing whitepapers say, are notorious for breaking things, being false-positive-prone, and generally leading to frustrating conversations about return on investment (ROI).

Throughout my own career, on multiple occasions, I have experienced my fair share of these frustrations with DLP tools and DLP functionality that exist in the cloud access security broker (CASB) solution space. This article will dig into how DLP could be putting you at risk, especially with poorly written policies or tool selection.

False Sense of Confidence

The technology world continues to evolve rapidly. Network boundaries are collapsing, cloud service consumption is on the rise, users are interacting with tools and data from a more diverse set of devices, and so on. These dynamics all make DLP and CASB tools harder to integrate in a way that gets them maximum coverage across all relevant devices, networks, applications, or data types.

When coverage is limited for these types of tools, or when DLP policies can only be written to cover a subset of relevant data in the organization, it creates a false sense of security. Assumptions can (and likely will) be made that these deployments are making a much bigger impact on risk management than they actually are. When those assumptions lead to further investments or projects not being pursued in the way that they should be, they become dangerous.

Operational Strain

False positives coming out of any tool put a strain on the teams trying to triage and respond to them. DLP solutions are notorious for producing a lot of false positives, largely because data security is in many ways contextual. Sometimes policy can be interpreted in a binary way, say, that a particular kind of data should never be in a particular kind of system or network. Often though, there’s more context required to determine whether or not a particular event (or cluster of events) is a security issue. Or, phrased a better way, how risky a particular event is.

The challenge here is that a centralized security operations center (SOC), or whatever function on the security team is managing alerts, lacks, by design, much of the context required to properly triage alerts from a DLP solution. Gaining this context takes a tremendous amount of time which puts strain on the operational capacity of the SOC and on those they are coordinating with.

Broken Functionality

One of the common deployment patterns for DLP and CASB tools is to install an agent on a device. From here, not only can local file system scans occur but also network traffic can be proxied for potential inclusion of data-matching DLP policies. If matches are identified, then alerts can be triggered, or, in some cases, the data can be deleted, or the network traffic blocked. This is, of course, dependent on the solution and the agent’s capabilities.

The problems arise when legitimate tools and functionality are broken on account of this scanning. Users’ work is impeded even when they’re not breaking any rules or violating any policies. While this may not be a security risk right now, it’s operational. The security risk comes when a resolution can’t be found, the debugging continues, the frustration builds, and then eventually the DLP tool is just turned off or uninstalled. At this point, there are also residual trust issues and frustration.

Cloud Cybersecurity data data security featured
Share. Facebook Twitter LinkedIn Email
Robert Wood

Robert Wood is an Acceleration Economy Analyst focusing on Cybersecurity. He has led the development of multiple cybersecurity programs from the ground up at startups across the healthcare, cyber security, and digital marketing industries. Between experience with startups and application security consulting he has both leadership and hands on experience across technical domains such as the cloud, containers, DevSecOps, quantitative risk assessments, and more. Robert has a deep interest in the soft skills side of cybersecurity leadership, workforce development, communication and budget and strategy alignment. He is currently a Federal Civilian for an Executive Branch Agency and his views are his own, not representing that of the U.S. Government or any agency.

Related Posts

PwC Updates AI Agent Orchestrator With Support for AWS-Native Services

July 25, 2025

SAP Q2 Results: The Good News, and the Not-As-Good News

July 24, 2025

SAP Still #1 in Apps Growth, but Big Backlog Slowdown

July 24, 2025

U.K. Government Partners with Google Cloud to Modernize Infrastructure and Upskill 100,000 Workers

July 23, 2025
Add A Comment

Comments are closed.

Recent Posts
  • PwC Updates AI Agent Orchestrator With Support for AWS-Native Services
  • SAP Q2 Results: The Good News, and the Not-As-Good News
  • SAP Still #1 in Apps Growth, but Big Backlog Slowdown
  • U.K. Government Partners with Google Cloud to Modernize Infrastructure and Upskill 100,000 Workers
  • Thailand Turns to Microsoft Azure AI for Legal System Overhaul

  • Ask Cloud Wars AI Agent
  • Tech Guidebooks
  • Industry Reports
  • Newsletters

Join Today

Most Popular Guidebooks and Reports

SAP Business Network: A B2B Trading Partner Platform for Resilient Supply Chains

July 10, 2025

Using Agents and Copilots In M365 Modern Work

March 11, 2025

AI Data Readiness and Modernization: Tech and Organizational Strategies to Optimize Data For AI Use Cases

February 21, 2025

Special Report: Cloud Wars 2025 CEO Outlook

February 12, 2025

Advertisement
Cloud Wars
Twitter LinkedIn
  • Home
  • About Us
  • Privacy Policy
  • Get In Touch
  • Marketing Services
  • Do not sell my information
© 2025 Cloud Wars.

Type above and press Enter to search. Press Esc to cancel.

  • Login
Forgot Password?
Lost your password? Please enter your username or email address. You will receive a link to create a new password via email.
body::-webkit-scrollbar { width: 7px; } body::-webkit-scrollbar-track { border-radius: 10px; background: #f0f0f0; } body::-webkit-scrollbar-thumb { border-radius: 50px; background: #dfdbdb }