I have been reviewing the patterns, and while I do see a set of security patterns, do you know of any related to Data Leak Protection ( DLP) ?
Hello and thanks for the question!
Snarkier -- as one of the main authors of the blueprints, he can provide the best guidance here.
Hello dmsherr , thanks for the question. This is a complex topic and needs a an answer that covers a number of important aspects:
Data Leakage Prevention is becoming a growing concern for enterprises as they distribute their applications and services out from behind their centralized firewall and use a variety of clouds to run their applications or integrate with SaaS platforms. There are a variety of tactics that will help enterprises minimize this threat.
The use of secure network intersection control points at the digital edge provide the basis for minimizing data leakages
All of these tactics when combined can be used to effectively reduce data leakage. By leveraging an ecosystem of security service partners that are discoverable in the network control hub, enterprises can take advantage of an ecosystem of well tested security and analytic services, reducing deployment time and risk. These services can be composed into a service chain that can be configured at each hub to meet the needs of the local traffic and policy requirements.
All of these capabilities will help reduce data leakage, but there are process components as well. Policy changes need to be rapidly propagated to all distributed nodes for the security measures to be effective
I hope this helps
Hello dmsherr ! Please advise if this answer was helpful. This in turn, helps others with the same question. Many thanks for the question!
Choose a location
There are no forums in this space.