UEM-11: Are managed endpoints configured with data loss prevention (DLP) technologies
and rules per a risk assessment?
The organization should have a DLP program to discover, monitor, and protect data with regulatory or compliance implications in transit and at rest across the network, storage, and endpoint systems.
The DLP solution should monitor and control the data flow. Furthermore, any anomalies that exceed normal traffic patterns should be noted, and appropriate action should be taken to address them.
The DLP solution should also be used to monitor for sensitive information (e.g., personally identifiable information), keywords, and metadata in order to discover unauthorized attempts for their disclosure across network boundaries and block such transfers by alerting information security personnel. The organization should configure the DLP solution to enforce ACLs even when data is copied off a server.
Control implemented
Control ownership
Description
Configure managed endpoints with Data Loss Prevention (DLP) technologies
and rules in accordance with a risk assessment.