ASD's Blueprint for Secure Cloud

Data Loss Prevention

This section describes the design decisions associated with Data Loss Prevention with Microsoft Purview for system(s) built using ASD's Blueprint for Secure Cloud.

Estimated reading time: 6 minutes

Data Loss Prevention

Data Loss Prevention (DLP) helps organisations protect sensitive and security classified information by enforcing policy-based controls upon information at rest, in use, and in motion. Creating an effective policy can be complex due to the large number of options available within policy configurations, the interactions between policies and other Microsoft 365 services (for example, Exchange Transport Rules) and the interactions between policies and other Purview capabilities (for example, auto-labelling).

Policy rules

DLP policies are made up of rules containing four main components:

  • Conditions define what a rule applies to, and can be grouped by boolean operators (AND, OR, NOT) to focus on specific scenarios
  • Actions define what happens as a consequence of a condition being met
  • User notifications define the end-user emails or in-application prompts for when conditions are met
  • Administrative alerts and reports define the admin-user emails and dashboard notices for when conditions are met

Rules are evaluated in priority order and if information matches multiple rules, the rule with the most restrictive action is enforced.

DLP policies

Block SECRET and TOP SECRET emails

The block SECRET and TOP SECRET emails policy blocks emails by checking for SECRET and TOP SECRET PSPF markings in the email’s X-Protective-Marking X-header and subject.

The policy would only apply if a user was an intended recipient of a highly classified email, or if a user attempted to forward or reply to a pre-existing highly classified email.

Apply email X-header and subject marking to outgoing emails

The add PSPF X-header and subject marking policy applies the PSPF X-Protective-Marking X-header and subject marking to emails.

The policy has a large number of rules to cater for each different PSPF marking and has separate rules for applying X-header and subject markings:

  • The X-header marking rules check if the sensitivity label applied to the email matches the current X-header marking, if the X-header marking doesn’t exist (i.e. the email is new) or if the X-header marking is different (i.e. the email is a reply or forward and the label has been changed), the X-Protective-Marking X-header is overwritten with the correct marking. Checking if the X-header marking is different helps preserve any existing X-Protective-Marking values that were created with the original email which may include ORIGIN=, EXPIRES= DOWNTO=, or other special handling markings.
  • The subject marking rules overwrite any existing subject marking according to the sensitivity label applied to the email, irrespective of whether the label is the same or not. This is done to prevent the prevent repetitively appending the subject marking on replies and forwards, for example Re: Re: subject [SEC=OFFICIAL] [SEC=OFFICIAL] [SEC=OFFICIAL].

The applied markings adhere strictly to the Australian Government Email Protective Marking Standard with the exception of excluding the ORIGIN= marking. If the originator of an email needs to be obtained, the unified audit log can be searched with any organisation that uses Microsoft 365 services. DLP policy, auto-labelling policy, and sensitive information type configurations all use regular expressions which cater for any use of EXPIRES= DOWNTO= markings.

Block PROTECTED emails except for approved domains

The block PROTECTED emails except for approved domains policy blocks emails and attachments1 with PROTECTED2 sensitivity labels, except for specifically allowed internal and external organisation domains used for sending and receiving email.

The policy would match incoming emails from external organisations even though the emails would not have an internal organisation specific sensitivity label applied, this is because an auto-labelling policy would be triggered (and apply a label) before the DLP policy, thereby enabling the DLP policy to meet its condition. The ordering of DLP and auto-labelling is discussed in more detail in the email handling page.

1: The policy will not block PROTECTED attachments from external organisation where the email is not also marked as PROTECTED. This would be mitigated by the external organisations enabling the email inherits highest priority label from attachments setting in their label publishing policies).

2: Including associated special handing and information management markings.

Block PROTECTED emails except for approved users

The block PROTECTED emails except for approved users policy blocks emails and attachments with PROTECTED1 sensitivity labels, except for specifically allowed group members.

The policy is not able to cater for groups that are configured in external organisations. The policy should use the same groups as used for publishing PROTECTED labels and set in the users up to PROTECTED publishing policy configuration.

While the users up to PROTECTED publishing policy ensures that only specific users have access to apply PROTECTED labels and to a degree, access PROTECTED labelled information, the DLP policy ensures that if users excluded from the publishing policy do access PROTECTED labelled information, they cannot email it.

1: Including associated special handing and information management markings.

Endpoint DLP

DLP capabilities can be extended to certain Windows desktop and server and MacOS operating systems, including virtualised environments and browsers. Endpoint DLP enables the monitoring and control of a number of actions such as copying, uploading and printing, and domain-based restrictions.

Implementing endpoint DLP policies may require the deployment of the Purview Information Protection client or browser plugins, and will require some organisational specific knowledge about user behaviour. Implementation is recommended and can be started by onboarding devices and observing events in Activity Explorer before creating policies.

Using sensitive information types

Each DLP policy could be complimented by the use of sensitive information types (or other classifiers) to improve the conditional matching of information. However, due to the requirements to implement sensitive information types, capabilities based on them types must be developed and implemented only within an organisation specific context.

User notifications

Each DLP policy rule defines user notifications in terms of policy tips displayed while using an application to perform an action, or email notifications sent after an action has taken place. As with other Purview solutions, the user experience can depend on the applications used. For example, some applications cannot show policy tips and others can be slow to show policy tips which can result in actions being performed before tips are displayed1. Using both policy tips and email notifications can help ensure users are made aware of their actions regardless of the application used, email notifications are also able to be sent to external organisations for certain actions.

1: This can be partially remediated by using the dlpwaitonsendtimeout Registry key.

Security & Governance

Design

Configuration

References

Do you have a suggestion on how the above page could be improved? Get in touch! ASD's Blueprint for Secure Cloud is an open source project, and we would love to get your input. Submit an issue on our GitHub, or send us an email at blueprint@asd.gov.au

Acknowledgement of Country icon

Acknowledgement of Country
We acknowledge the Traditional Owners and Custodians of Country throughout Australia and their continuing connections to land, sea and communities. We pay our respects to them, their cultures and their Elders; past, present and emerging. We also recognise Australia's First Peoples' enduring contribution to Australia's national security.

Authorised by the Australian Government, Canberra