Answer yes if your organisation has any form of Data Loss Prevention (DLP) controls in place to ensure only authorised data is transferred outside of your organisation. Describe the controls you have in place and how these are managed.
Data Loss Prevention (DLP) controls can help detect and prevent confidential data travelling across your organisational boundaries. This might include:
• Local email clients
• Web-based email
• Online file transfer services
• Online document repositories
• Live web chat
• Removable media such as external hard drives, mobile phone transfers etc.
Most DLP solutions come with default rule sets you can use, such as detecting personal data or banking details, but you will need to configure the solution to be relevant to your organisation based on the information you hold and your usual operating procedures. For example, you may want to create rules to check for particularly sensitive project names or client names.DLP controls can be helpful to detect and prevent accidental data losses, or as a way to increase the cost to an attacker, but they should not be relied upon as the only method of preventing a data breach. This is because implementation can be extremely complex and a determined attacker will often be able to find a way around the controls.
Before implementing DMARC, you should create a policy dictating exactly what controls you would need. This should be a collaborative effort that reflects your business needs and IT capabilities.
The actual implementation will vary depending on your email infrastructure. If you use on-premise or dedicated email and DNS servers you will need to follow the configuration guidance applicable to their particular DNS and Email services, which are typically part of the operating system. If you use cloud-based email and DNS services, such as Microsoft 365, you will typically find all the relevant configuration options in the management console. You can also use third party services such as OnDMARC to help.
There are numerous consultancies or individual consultants that will be able to assist in crafting a policy and implementing these technical controls to meet your business and technical requirements.
If you would like to contribute to this article or provide feedback, please email knowledge@riskledger.com. Contributors will be recognised on our contributors page.