Go to the table of contents Go to the previous page Go to the next page
Planning Data Security Deployment > Planning a phased approach
Planning a phased approach
Deployment and Installation Center | Data Security Solutions | Version 7.7.x
Next, you need to consider the tactics you can employ in protecting your data, how to configure policies, manage incidents and control access.
To assess how to protect your data from compromise, we recommend using Define Product Name Variable in a multi-phased approach. Listed below is just one approach of many.
Phase 1: Monitoring
Start by monitoring data (auditing without blocking). The following steps usually constitute this phase (you may skip some of the steps if they are not relevant):
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
Phase 2: Monitoring with notifications
At this stage, we recommend enabling email notifications to various people in the organization when a policy breach is discovered. The options are:
*
*
*
*
Phase 3: Policy tuning
(Phase 3 can be ongoing, in parallel to Phases 1 and 2.) Make sure that you keep the amount of incidents manageable and that all incidents are relevant. The options are:
*
*
*
*
Phase 3 is also good for making sure that you assign proper incident managers for various types of incidents, and that you create policy category groups in Data Security Manager and assign them to relevant incident managers.
Phase 4: Enforcing
This phase should begin after all the policies were successfully tuned and business owners, data owners and incident managers are trained and ready to handle the incidents:
*
*
*
Phase 5: Discovery
Again, this phase can start earlier, in parallel with other phases.
Establish discovery tasks on sensitive corporate servers, databases, Exchange servers, and SharePoint sites that are widely accessed to ensure you know what sensitive information is located where, and who is allowed to access it.
Phase 6: Endpoint deployments
As explained with other phases, this phase can also be instituted earlier in the security process.
Make sure you are controlling data in use (removable media, clipboard operations, file access) by deploying Websense Data Endpoint in your enterprise:
*
*
Local discovery will assist you in getting to the files that network discovery wouldn't reach. (Essentially, local discovery is looking at the drives on a local machine, like a laptop, which can be disconnected from the network.)
 

Go to the table of contents Go to the previous page Go to the next page
Planning Data Security Deployment > Planning a phased approach
Copyright 2016 Forcepoint LLC. All rights reserved.