Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and Copilots
    • Innovation & Leadership
    • Cybersecurity
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
  • Summit NA
  • Dynamics Communities
  • Ask Copilot
Twitter Instagram
  • Summit NA
  • Dynamics Communities
  • AI Copilot Summit NA
  • Ask Cloud Wars
Twitter LinkedIn
Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and CopilotsWelcome to the Acceleration Economy AI Index, a weekly segment where we cover the most important recent news in AI innovation, funding, and solutions in under 10 minutes. Our goal is to get you up to speed – the same speed AI innovation is taking place nowadays – and prepare you for that upcoming customer call, board meeting, or conversation with your colleague.
    • Innovation & Leadership
    • CybersecurityThe practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
    • Login / Register
Cloud Wars
    • Login / Register
Home » How Poor Data Loss Prevention (DLP) Policies Could Be Putting You at Risk
Cybersecurity

How Poor Data Loss Prevention (DLP) Policies Could Be Putting You at Risk

Robert WoodBy Robert WoodOctober 14, 2022Updated:December 1, 20224 Mins Read
Facebook Twitter LinkedIn Email
data loss prevention DLP policies
Share
Facebook Twitter LinkedIn Email
Acceleration Economy Cybersecurity

Data loss prevention (DLP) sounds like a great idea. Protecting data from loss, tampering, or theft is a central part of the security practitioner’s day-to-day job. Anyone who has ever gone through a DLP solution deployment likely has the metaphorical battle scars and war stories to prove it. DLP solutions, regardless of what the marketing whitepapers say, are notorious for breaking things, being false-positive-prone, and generally leading to frustrating conversations about return on investment (ROI).

Throughout my own career, on multiple occasions, I have experienced my fair share of these frustrations with DLP tools and DLP functionality that exist in the cloud access security broker (CASB) solution space. This article will dig into how DLP could be putting you at risk, especially with poorly written policies or tool selection.

False Sense of Confidence

The technology world continues to evolve rapidly. Network boundaries are collapsing, cloud service consumption is on the rise, users are interacting with tools and data from a more diverse set of devices, and so on. These dynamics all make DLP and CASB tools harder to integrate in a way that gets them maximum coverage across all relevant devices, networks, applications, or data types.

When coverage is limited for these types of tools, or when DLP policies can only be written to cover a subset of relevant data in the organization, it creates a false sense of security. Assumptions can (and likely will) be made that these deployments are making a much bigger impact on risk management than they actually are. When those assumptions lead to further investments or projects not being pursued in the way that they should be, they become dangerous.

Operational Strain

False positives coming out of any tool put a strain on the teams trying to triage and respond to them. DLP solutions are notorious for producing a lot of false positives, largely because data security is in many ways contextual. Sometimes policy can be interpreted in a binary way, say, that a particular kind of data should never be in a particular kind of system or network. Often though, there’s more context required to determine whether or not a particular event (or cluster of events) is a security issue. Or, phrased a better way, how risky a particular event is.

The challenge here is that a centralized security operations center (SOC), or whatever function on the security team is managing alerts, lacks, by design, much of the context required to properly triage alerts from a DLP solution. Gaining this context takes a tremendous amount of time which puts strain on the operational capacity of the SOC and on those they are coordinating with.

Broken Functionality

One of the common deployment patterns for DLP and CASB tools is to install an agent on a device. From here, not only can local file system scans occur but also network traffic can be proxied for potential inclusion of data-matching DLP policies. If matches are identified, then alerts can be triggered, or, in some cases, the data can be deleted, or the network traffic blocked. This is, of course, dependent on the solution and the agent’s capabilities.

The problems arise when legitimate tools and functionality are broken on account of this scanning. Users’ work is impeded even when they’re not breaking any rules or violating any policies. While this may not be a security risk right now, it’s operational. The security risk comes when a resolution can’t be found, the debugging continues, the frustration builds, and then eventually the DLP tool is just turned off or uninstalled. At this point, there are also residual trust issues and frustration.

Cloud Cybersecurity data data security featured
Share. Facebook Twitter LinkedIn Email
Robert Wood

Robert Wood is an Acceleration Economy Analyst focusing on Cybersecurity. He has led the development of multiple cybersecurity programs from the ground up at startups across the healthcare, cyber security, and digital marketing industries. Between experience with startups and application security consulting he has both leadership and hands on experience across technical domains such as the cloud, containers, DevSecOps, quantitative risk assessments, and more. Robert has a deep interest in the soft skills side of cybersecurity leadership, workforce development, communication and budget and strategy alignment. He is currently a Federal Civilian for an Executive Branch Agency and his views are his own, not representing that of the U.S. Government or any agency.

Related Posts

IBM Tackles AI Data Complexity with New watsonx.data Integration and Intelligence Software

June 20, 2025

Enterprises Ramp Up Use of Multiple AI Models, Third-Party Apps, and AI-Native Innovators

June 20, 2025

Microsoft Introduces AI Model Safety Rankings to Guide Developer Choices on Azure

June 20, 2025

The New Christian Klein: Supercharges SAP and Helps Europe Avoid Data-Center Disaster

June 19, 2025
Add A Comment

Comments are closed.

Recent Posts
  • IBM Tackles AI Data Complexity with New watsonx.data Integration and Intelligence Software
  • Enterprises Ramp Up Use of Multiple AI Models, Third-Party Apps, and AI-Native Innovators
  • Microsoft Introduces AI Model Safety Rankings to Guide Developer Choices on Azure
  • The New Christian Klein: Supercharges SAP and Helps Europe Avoid Data-Center Disaster
  • Inside Rabbit’s Strategy to Automate Cloud Cost Optimization for Engineering Teams with Balazs Molnar | Cloud Wars Live

  • Ask Cloud Wars AI Agent
  • Tech Guidebooks
  • Industry Reports
  • Newsletters

Join Today

Most Popular Guidebooks

Accelerating GenAI Impact: From POC to Production Success

November 1, 2024

ExFlow from SignUp Software: Streamlining Dynamics 365 Finance & Operations and Business Central with AP Automation

September 10, 2024

Delivering on the Promise of Multicloud | How to Realize Multicloud’s Full Potential While Addressing Challenges

July 19, 2024

Zero Trust Network Access | A CISO Guidebook

February 1, 2024

Advertisement
Cloud Wars
Twitter LinkedIn
  • Home
  • About Us
  • Privacy Policy
  • Get In Touch
  • Marketing Services
  • Do not sell my information
© 2025 Cloud Wars.

Type above and press Enter to search. Press Esc to cancel.

  • Login
Forgot Password?
Lost your password? Please enter your username or email address. You will receive a link to create a new password via email.