Skip to main content

Check out Interactive Visual Stories to gain hands-on experience with the SSE product features. Click here.

Skyhigh Security

About Sanctioned DLP Policy Rules and Rule Groups

The Sanctioned DLP Policy Rules section defines the match criteria for a policy violation. Several different types of rules can be combined using Boolean logic. Boolean logic is supported through Rule Groups. All rules in a group are logically combined with an AND operator.  All rules must match within the group. Multiple Rule Groups can be named, defined, and combined logically with an OR operator. This means any group within a policy must match the policy to be triggered.  

IMPORTANT: Skyhigh Security does not support importing or exporting policies or policy templates that include more than 50 rule groups or that exceed 64 KB in size, whichever limit is reached earlier.

Rule Groups are assigned by Severity: Warning, Info, Minor, Major, or Critical. This allows you to conditionally execute different response actions based on the triggered Rule Group.

IMPORTANTWhen you create DLP policy or add exceptions, if you add certain reserved SQL keywords, such as "Select", "Update", or "Delete", they appear with the first letter masked, as "#elect", "#pdate", or "#elete." This is a security feature of the GWT framework in Java. The workaround is to add the file name to a Policy Dictionary and add the dictionary as an exception rule.

Several Rule types can be added to a policy, including:

NOTE: From the SSE 6.5.2 release, the Structured Data Fingerprint and Unstructured Data Fingerprint are available to users who have already defined DLP policies using these rules. It will not be available to other users.