Typical users store confidential data in any number of places. Is it possible for the CSA to identify confidential files by picking up the words 'company confidential' inside the file and then classifying them as sensitive files?
I am trying to ensure that any confidential files that are copied to removable media are at least logged but the current default method of preventing/logging copying of confidential data seems to rely on the file name or the file path.
Ideally the CSA should classify on the basis of file content such as the word confidential.
Cisco have whitepapers and videos on document security and obviously their solution is quite poor if it simply depends on file names or paths vs actual content. Educating and expecting users to always store confidential information in the same location is simply not realistic.
I'll raise a feature request and see where it goes.
I've heard from sources that this will be a feature in CSA 6.0. CSA will be able to indentify confidential data within files such as SSNs, CC #s, etc... As for whether you can key off of specified words, I'll leave that for Cisco to answer.
Table of ContentsIntroductionVersion HistoryPossible Future
UpdatesDocuments PurposeNAT Operation in ASA 8.3+ SectionsRule Types
Network Object NATTwice NAT / Manual NATRule Types used per SectionNAT
Types used with Twice NAT / Manual NAT and Network Obje...
Table of Contents Introduction:This document describes details on how
NAT-T works. Background: ESP encrypts all critical information,
encapsulating the entire inner TCP/UDP datagram within an ESP header.
ESP is an IP protocol in the same sense that TCP an...