CISSP Domain 2 – DLP Preventing Data Leakage

CISSP Domain 2 – DLP Preventing Data Leakage


Most organisations focus on protecting data where it is stored.

But CISSP asks a more important question:

What happens when data moves?

Because that is where control is often lost.

Why This Matters

Data breaches are not always the result of sophisticated attacks.

In many cases, data leaves the organisation through:

✔ Email
✔ File transfers
✔ USB devices
✔ Cloud uploads
✔ User actions

The problem is not just access.

It is movement.

The Core Principle

✔ Control data movement
✔ Prevent unauthorized data flow

This is the purpose of Data Loss Prevention (DLP).

What is DLP?

Data Loss Prevention (DLP) is a control mechanism that:

✔ Identifies sensitive data
✔ Monitors how it moves
✔ Prevents unauthorized sharing

DLP ensures that data stays where it is supposed to be.

The DLP Control Flow

DLP works as a continuous process:

Identify

Understand what data is sensitive.

✔ Based on classification
✔ Content inspection
✔ Context awareness

If you cannot identify sensitive data, you cannot protect it.

Monitor

Track how data is used and moved.

✔ User behaviour
✔ Data transfers
✔ System interactions

This provides visibility into risk.

Prevent

Stop unauthorized data movement.

✔ Block transfers
✔ Restrict actions
✔ Apply policies

This is where DLP actively enforces security.

Enforce & Review

Continuously improve controls.

✔ Audit events
✔ Tune policies
✔ Adapt to new risks

DLP is not static. It evolves with the environment.

Types of DLP

DLP is implemented across multiple layers:

Network DLP

✔ Monitors data in transit
✔ Controls email, web traffic, and file transfers

Endpoint DLP

✔ Monitors user devices
✔ Controls USB, local file movement, and user actions

Cloud DLP

✔ Monitors cloud platforms
✔ Controls SaaS and cloud storage data sharing

Where Organisations Fail

Common gaps include:

✔ No clear data classification
✔ Poor policy definition
✔ Over-reliance on detection without prevention
✔ Lack of monitoring and tuning

DLP fails when it is treated as just a tool.

CISSP Exam Perspective

CISSP will test scenarios such as:

✔ Data leaving via email → Network DLP
✔ Data copied to USB → Endpoint DLP
✔ Data exposed in cloud → Cloud DLP

Correct approach:

✔ Identify data movement
✔ Identify the channel
✔ Apply the appropriate DLP control

Key Takeaway

✔ Data is not lost when it is accessed

✔ Data is lost when it leaves without control

Listen to the Podcast

This article is part of the CISSP Blogpost and Podcast Series.

The podcast explains how DLP controls data movement across real-world environments.

Search on Spotify: PK’s Chronicles

Final Thought

Security is not just about preventing access.

It is about preventing uncontrolled movement.

Because in cybersecurity—

If data leaves unnoticed, it is already lost.

Think movement.
Think control.
Think like a CISSP.

Comments

No comments yet. Why don’t you start the discussion?

    Leave a Reply

    This site uses Akismet to reduce spam. Learn how your comment data is processed.