Difficulty
easy
Average duration
3 hrs
Technologies
cybersecurity
dlp
data loss prevention
politicas de seguridad de datos
Difficulty
easy
Average duration
3 hrs
Technologies
cybersecurity
dlp
data loss prevention
politicas de seguridad de datos
We need you! These exercises are created and maintained in collaboration with people like you. If you find any errors or typos, please contribute and/or report them.
This exercise focuses on the creation and implementation of security policies for Data Loss Prevention (DLP) within an organization, applying the principle of least privilege and ensuring that only authorized personnel have access to sensitive data.
Introduction to Data Loss Prevention. Write an introduction to DLP, explaining the general concept of DLP and its importance within an organization, highlighting its role in protecting confidential data.
Data Classification. Define how the organization will classify data based on its sensitivity. Establish at least three classification categories, for example:
Access and Control. Apply the principle of least privilege by establishing access policies based on this principle, and define the permission review workflow, indicating which roles within the organization will be responsible for these reviews and how they will be carried out.
Monitoring and Auditing. Establish rules for monitoring sensitive data and auditing activities related to that data. Provide more detailed descriptions of the monitoring and auditing tools that will be used (e.g., SIEM solutions or specific DLP tools to monitor data usage).
Leak Prevention. Define how the leakage of sensitive data will be prevented, using technologies such as encryption and DLP tools.
Education and Awareness. Describe how staff will be trained on security policies and the associated risks.
For a practical illustration, refer to the Data Loss Prevention Case Study. This example focuses on the use of Google Drive, but it can be adapted to any cloud or local storage or collaboration system. The key is ensuring that only authorized users access the information as needed to perform their work, always respecting the Principle of Least Privilege.
The second part of this exercise involves implementing policies to restrict the use of USB devices. These restrictions are essential to prevent the leakage of confidential data through removable storage devices. This policy is directly linked to the DLP policies created in the first part of the exercise.
💡 The following practice will focus on a Windows virtual machine.
⚠ To carry out this practice and apply restrictions on USB device access, we must ensure that the VM we are working on can access the USB devices connected to your physical machine (host). Follow these steps:
Settings > Ports > USB
, and enable the USB 2.0 (EHCI) Controller
or USB 3.0 (xHCI) Controller
, depending on the port you are using.Devices > USB
and choose the connected device. The VM will take control of the USB.Once this is done successfully, let's get started!
Open the Group Policy Editor. Press Win + R
, type gpedit.msc
, and press Enter to open the Group Policy Editor.
Configure the Policy to Deny Access to USB Devices. Enable the following policies:
This will prevent users from reading or writing to connected USB devices.
Create a new regular user in Windows. Open Settings (Win + I), go to Accounts > Family & other users
.
Click Add someone else to this PC
, select I don’t have this person’s sign-in information
, then Add a user without a Microsoft account
.
Create the user with a name and password (this will be a standard user without privileges).
Test the restriction with the regular user. Log in with the new regular user and connect the USB device to verify that access is denied due to the applied restrictions.
We assume that by this point you are a confident student, so we ask you to research how to enable exceptions for specific users. The idea is that you log in with an administrator account, open the Group Policy Editor
, and investigate how to enable exceptions in the USB device policies for certain users or groups of users.
Finally, you should verify that the exceptions have been applied by conducting tests with different users.
Difficulty
easy
Average duration
3 hrs
Technologies
cybersecurity
dlp
data loss prevention
politicas de seguridad de datos
Difficulty
easy
Average duration
3 hrs
Technologies
cybersecurity
dlp
data loss prevention
politicas de seguridad de datos
Difficulty
easy
Average duration
3 hrs
Technologies
cybersecurity
dlp
data loss prevention
politicas de seguridad de datos
Difficulty
easy
Average duration
3 hrs
Technologies
cybersecurity
dlp
data loss prevention
politicas de seguridad de datos
Difficulty
easy
Average duration
3 hrs
Technologies
cybersecurity
dlp
data loss prevention
politicas de seguridad de datos
Difficulty
easy
Average duration
3 hrs
Technologies
cybersecurity
dlp
data loss prevention
politicas de seguridad de datos