Data loss prevention (DLP)
Demonstrate that the organization has deployed and configured Data Loss Prevention controls to identify, monitor, and prevent unauthorized transmission or exposure of sensitive data across endpoints, network boundaries, and cloud services.
Description
What this control does
Data Loss Prevention (DLP) is a set of technologies and processes that detect, monitor, and block sensitive data from being transmitted outside authorized boundaries, whether intentionally or accidentally. DLP solutions inspect data at rest (stored files), in motion (network traffic, email, web uploads), and in use (endpoint applications) by applying content inspection rules, classification labels, and contextual analysis to identify protected information such as PII, PHI, credit card numbers, intellectual property, or confidential business data. Effective DLP prevents unauthorized exfiltration through endpoints, email gateways, cloud services, removable media, and network channels, providing both preventive controls and forensic audit trails.
Control objective
What auditing this proves
Demonstrate that the organization has deployed and configured Data Loss Prevention controls to identify, monitor, and prevent unauthorized transmission or exposure of sensitive data across endpoints, network boundaries, and cloud services.
Associated risks
Risks this control addresses
- Unauthorized exfiltration of customer personally identifiable information (PII) via email, cloud storage, or removable media by malicious insiders
- Accidental disclosure of confidential intellectual property or trade secrets through misconfigured cloud sharing links or unsecured file transfers
- Theft of payment card data or protected health information (PHI) transmitted through unauthorized channels in violation of regulatory requirements
- Malware or ransomware staging sensitive data for exfiltration through encrypted tunnels or command-and-control channels undetected by perimeter defenses
- Contractor or third-party access resulting in unauthorized download or transmission of proprietary data beyond contractual boundaries
- Shadow IT usage (personal email, unapproved cloud services) bypassing enterprise security controls and creating unmonitored exfiltration paths
- Incomplete visibility into data movement across hybrid environments leading to undetected policy violations and compliance gaps
Live threat patterns this control mitigates:
Testing procedure
How an auditor verifies this control
- Obtain and review the current DLP policy documentation, including data classification scheme, sensitive data types covered, and defined exfiltration channels monitored (email, web, endpoint, cloud).
- Export and examine DLP system configuration for all deployed enforcement points (email gateways, web proxies, endpoint agents, cloud access security broker integrations) to verify coverage of critical egress paths.
- Review content inspection rules, regular expressions, and data identifiers configured to detect sensitive data types aligned to the organization's data classification policy (PII, PHI, PCI, IP, confidential).
- Select a sample of 15-20 DLP policy violations or alerts from the past 90 days and trace each incident through detection, user notification, quarantine action, and resolution workflow to verify enforcement effectiveness.
- Test DLP detection capabilities by simulating exfiltration attempts using sample sensitive data across multiple channels: send test PII via personal webmail, upload sample credit card numbers to unapproved cloud storage, and copy test files to USB devices.
- Interview three end users from different departments to confirm awareness of DLP policies, their experience with block notifications, and understanding of authorized methods for sharing sensitive data externally.
- Review DLP system logs and reporting dashboards to verify continuous monitoring, alert thresholds, false positive tuning activities, and integration with SIEM or security operations workflows.
- Examine exception and whitelist configurations to ensure business-justified exemptions are documented, approved by data owners, reviewed periodically, and do not create unacceptable risk exposure.
Where this control is tested