Data Channel
Network
Implementation Specification
Considerations
Implement through Switched Port Analyzer ports from egress network points or through Internet Content Applica�on Protocol on web proxies.
If online, prevent the leakage of unencrypted sensitive data based upon predefined thresholds (e.g., files that contain > 100 records of PHI).
If out of band, activate IR procedures to contain data leakages that occur through the network.
Sub-Practices for Large Organizations 4.L.A
Advanced Data Loss Prevention
NIST FRAMEWKORK REF: PR.DS-5
After implementing basic DLP controls, you should consider expanding your DLP capabilities to monitor other common data access channels. Table 7 recommends methods for your consideration. Table 7. Expanding DLP to Other Data Channels Data Channel
Cloud storage
Implementation Specification Use cloud access security broker systems to monitor data flows into cloud systems.
Considerations
Label data identified as sensitive. Implement digital rights and encryption to limit access to sensitive data.
Ensure that cloud-based file storage and sharing systems do not expose sensitive data in an “open sharing” construct without authentication (i.e., do not permit the use of sharing data through a simple URL link).
49