Skip to main content
McAfee Enterprise MVISION Cloud

Policy Templates for Compliance and DLP

This table lists the policy templates provided for Compliance and DLP.  

Policy Name Benchmark Description
ABA Routing Numbers and Banking Keywords   This API policy looks for valid ABA Routing Numbers in conjunction with banking related keywords. It quarantines medium severity violations and deletes high severity violations.
Password Files  

This policy detects and quarantines password files and formats such as SAM, /etc/password, and /etc/shadow.

Document Classification   This policy searches data for Confidential, Personal Information or Highly Restricted tags.  Confidential data creates an incident, Personal Information is quarantined and Highly Restricted data is deleted per corporate policy.
Design Documents   This policy detects various types of design documents at risk of exposure.
Confidential Documents   This policy quarantines documents with confidential keywords in metadata/header for specific set of file types if they were shared.
Encrypted Data   This policy detects the use of encryption by a variety of methods including S/MIME, PGP, GPG, and file password protection.
Financial information   This policy detects financial data and information, and quarantines high severity incidents if specified keywords are found in header/metadata.
M&A Activity   This policy detects contracts and official documentation about Merger & Acquisition activity against defined keywords. The response for the incident is to quarantine the file.
PCI DSS   The Payment Card Industry (PCI) Data Security Standard (DSS) is jointly determined by the major payment card companies (such as Visa, MasterCard, American Express, and Discover). This policy detects credit card data that, if exposed, could represent a violation of this standard.
PST Files   This API policy is designed to delete the PST files that, according to enterprise policy, are not to be stored on cloud storage CSPs.
Sarbanes-Oxley   The US Sarbanes-Oxley Act (SOX) imposes requirements on financial accounting including the preservation of data integrity and the ability to create an audit trail. This policy detects and quarantines sensitive financial data.
SSH Private Keys   This policy detects and quarantines SSH Private Key files.
US Social Security Numbers   This policy looks for valid US SSN numbers. It quarantines data with medium severity and deletes with high severity violations.
Source Code     This policy detects various types of source code at risk of exposure including Java source, C source, VB source and PERL as well as matching source code file extensions from Assembly to Visual Basic.  An incident is created if a file extension match occurs and if source code is discovered it is quarantined.
Resume Policy   The policy is designed to prevent Resume related data being sent to cloud providers. This looks for Resume Keywords in conjunction with a file type.
HIPAA and HITECH including PHI   This policy strictly enforces the US HIPAA by searching for data concerning prescription drugs, diseases, and treatments in conjunction with PHI. This policy may also be used for organizations which are not subject to HIPAA but want to control PHI data. Any incidents are quarantined.
Contact Lists    The policy flags Contact List related data being sent to cloud providers.
AIP Confidential   Finds all documents that were marked "Confidential" by Microsoft Advanced Information Protection.
Boldon James Confidential    Detect files with Boldon James Tag "Confidential" (id_classification_confidential)
Caldicott Report   The Caldicott Report (December 1997) was a review commissioned by the UK Chief Medical Officer to make recommendations to improve the way the National Health Service handles and protects patient information. The Caldicott Committee was set up to review the confidentiality and flows of data throughout the NHS for purposes other than direct care, medical research or where there is a statutory requirement for information. Its recommendations are now being put into practice throughout the NHS and in the Health Protection Agency.
Canadian Social Insurance Numbers   This policy detects patterns indicating Canadian social insurance numbers (SINs) at risk of exposure.
Credit Card Numbers   This policy detects patterns indicating credit card numbers at risk of exposure.
Customer Data Protection    This policy detects customer data at risk of exposure.
Data Protection Act 1998   The Data Protection Act 1998 (replacement of Data Protection Act 1984) set standards which must be satisfied when obtaining, holding, using or disposing of personal data in the UK. The Data Protection Act 1998 covers anything with personal identifiable information (e.g. data about personal health, employment, occupational health, finance, suppliers, and contractors).
Defense Message System (DMS) GENSER Classification   This policy detects information classified as confidential according to the guidelines established by the Defense Information Systems Agency for the Defense Message System (DMS) General Services (GENSER) message classifications, categories and markings. These standards outline how to mark classified and sensitive documents according to US standards, as well as providing interoperability with NATO countries and other US allies.
Employee Data Protection   This policy detects employee data at risk of exposure.
Export Administration Regulations (EAR)   The Export Administration Regulations (EAR) are enforced by the US Department of Commerce. These regulations primarily cover technologies and technical information with both commercial and military applications, also known as dual use technologies (e.g., chemicals, satellites, software, computers, etc.). This policy detects violations based on countries and controlled technologies designated by the EAR.
FACTA 2003 (Red Flag Rules)   This policy helps to address sections 114 and 315 (or Red Flag Rules) of the Fair and Accurate Credit Transactions Act of 2003. These rules specify that a financial institution or creditor that offers or maintains covered accounts must develop and implement a written Identity Theft Prevention Program that is designed to detect, prevent, and mitigate identity theft in connection with the opening of a covered account or any existing covered account.
General Data Protection Regulations (Banking and Finance)   This template focuses on GDPR banking and finance related keywords, Data Identifiers and an EDM profile with related columns. The GDPR is a Regulation by which the European Commission intends to strengthen and unify data protection for individuals within the EU. It also addresses export of personal data outside the EU. The Commission's primary objectives of the GDPR are to give citizens back the control of their personal data and to simplify the regulatory environment for international business by unifying the regulation within the EU.
General Data Protection Regulations (Government Identification)   This template focuses on government identification related keywords, Data Identifiers and an EDM profile with related columns. The GDPR is a Regulation by which the European Commission intends to strengthen and unify data protection for individuals within the EU. It also addresses export of personal data outside the EU. The Commission's primary objectives of the GDPR are to give citizens back the control of their personal data and to simplify the regulatory environment for international business by unifying the regulation within the EU.
General Data Protection Regulations (Healthcare and Insurance)   This template focuses on healthcare and insurance related keywords, Data Identifiers and an EDM profile with related columns. The GDPR is a Regulation by which the European Commission intends to strengthen and unify data protection for individuals within the EU. It also addresses export of personal data outside the EU. The Commission's primary objectives of the GDPR are to give citizens back the control of their personal data and to simplify the regulatory environment for international business by unifying the regulation within the EU.
Gramm-Leach-Bliley   The Gramm-Leach-Bliley (GLB) Act gives consumers the right to limit some sharing of their information by financial institutions. This policy detects transmittal of customer data.
Human Rights Act 1998   The Data Protection Act 1998 (replacement of Data Protection Act 1984) set standards which must be satisfied when obtaining, holding, using or disposing of personal data in the UK. The Data Protection Act 1998 covers anything with personal identifiable information (e.g. data about personal health, employment, occupational health, finance, suppliers, and contractors).
Gramm-Leach-Bliley   The Gramm-Leach-Bliley (GLB) Act gives consumers the right to limit some sharing of their information by financial institutions. This policy detects transmittal of customer data.
Individual Taxpayer Identification Numbers (ITIN)   An Individual Taxpayer Identification Number (ITIN) is a tax processing number issued by the US Internal Revenue Service (IRS). The IRS issues ITINs to track individuals are not eligible to obtain a Social Security Numbers (SSNs).
Individual Taxpayer Identification Numbers (ITIN)   An Individual Taxpayer Identification Number (ITIN) is a tax processing number issued by the US Internal Revenue Service (IRS). The IRS issues ITINs to track individuals are not eligible to obtain a Social Security Numbers (SSNs).
International Traffic in Arms Regulations (ITAR)   The International Traffic in Arms Regulations (ITAR) are enforced by the US Department of State. Exporters of defense services or related technical data are required to register with the federal government and may need export licenses. This policy detects potential violations based on countries and controlled assets designated by the ITAR.
NASD Rule 2711 and NYSE Rules 351 and 472   NASD Rule 2711 and NYSE Rules 351 and 472 stipulate separation of investment banking from research and trading to ensure trust in the public markets. This template allows monitoring of the communications of research analysts when they are subject to these regulations.
NASD Rule 3010 and NYSE Rule 342   NASD Rule 3010 and NYSE Rule 342 require broker-dealers to supervise certain brokerage employees' communications. This policy allows monitoring the communications of registered principals when they are subject to these regulations.
Network Diagrams   This policy detects computer network diagrams at risk of exposure.
Network Security   This policy detects evidence of hacking tools and attack planning.
Office of Foreign Assets   The Office of Foreign Assets Control of the US Department of the Treasury administers and enforces economic and trade sanctions based on US foreign policy and national security goals against certain countries, individuals, and organizations. This policy detects communications involving these targeted groups.
OMB Memo 06-16 and FIPS 199 Regulations   This policy detects information classified as confidential according to the guidelines established in the Federal Information Processing Standards (FIPS) Publication 199 from the National Institute of Standards and Technology (NIST). These security classifications were reinforced as the basis for compliance with memorandum 06-16 from the Office of Management and Budget (OMB).
Payment Card Industry Data Security Standard   The Payment Card Industry (PCI) Data Security Standard (DSS) is jointly determined by the major payment card companies (such as Visa, MasterCard, American Express, and Discover). This comprehensive standard is intended to help organizations proactively protect customer account data. This policy detects credit card data that, if exposed, could represent a violation of this standard.
PIPEDA   Canada's Personal Information Protection and Electronic Documents Act (PIPEDA) protects personal information in the hands of private sector organizations and provides guidelines for the collection, use and disclosure of that information. This policy detects customer data protected by PIPEDA regulations.
Project Data    This policy helps find discussions of sensitive projects.
Proprietary Media Files   This policy detects various types of video and audio files that could be proprietary and intellectual property of your organization and at risk for exposure.
Publishing Documents    This policy detects various types of publishing documents such as FrameMaker files at risk of exposure.
SEC Fair Disclosure Regulation   The US SEC Selective Disclosure and Insider Trading Rules prohibit public companies from selectively divulging material information to analysts and institutional investors prior to its release generally to the public. This policy detects data indicating disclosure of material financial information.
State Data Privacy   Many states in the US have adopted statutes mandating data protection and public disclosure of information security breaches in which confidential data of individuals is compromised. This policy detects these breaches of confidentiality.
SWIFT Codes    The Society for Worldwide Interbank Financial Telecommunication (SWIFT) is a cooperative organization under Belgian law and is owned by its member financial institutions. The SWIFT code (also known as a Bank Identifier Code, BIC, or ISO 9362) has a standard format to identify a bank, location, and the branch involved. These codes are used when transferring money between banks, particularly across international borders.
Titus Internal-Only   Detect files with Titus Labs Tag "Internal Only".
UK Drivers Licence Numbers   This policy detects UK Drivers Licence Numbers using the official specification of the UK Government Standards of the UK Cabinet Office.
UK Electoral Roll Numbers   This policy detects UK Electoral Roll Numbers using the official specification of the UK Government Standards of the UK Cabinet Office.
Defense Message System (DMS) GENSER Classification   This policy detects information classified as confidential according to the guidelines established by the Defense Information Systems Agency for the Defense Message System (DMS) General Services (GENSER) message classifications, categories and markings. These standards outline how to mark classified and sensitive documents according to US standards, as well as providing interoperability with NATO countries and other US allies.

 

  • Was this article helpful?