| CPC H04L 63/20 (2013.01) [G06F 16/285 (2019.01); G06F 16/951 (2019.01); G06F 21/6209 (2013.01); H04L 63/0281 (2013.01); H04L 63/10 (2013.01); H04L 63/104 (2013.01); H04L 63/105 (2013.01); H04L 63/12 (2013.01)] | 20 Claims |

|
1. A computer-implemented method of enforcing data loss prevention policies on resource-level transactions that do not identify resource data, the method including:
intercepting resource-level transactions from client endpoints, wherein:
the resource-level transactions request copying of an organization's resources on cloud storage services from controlled locations to uncontrolled locations,
the resource-level transactions do not identify data stored in the resources, and the controlled locations are subject to inspection for data loss prevention by a network security system while the uncontrolled locations are not subject to inspection for data loss prevention by the network security system;
extracting identifiers that identify the resources in the resource-level transaction;
generating substrings of the resource-level transactions by preprocessing the identifiers that identify the resources, wherein the preprocessing comprises lexically tokenizing the identifiers by demarcating the identifier using character-based delimiters;
comparing the substrings to entries in a resource list that identifies the organization's resources on the cloud storage services;
finding matches in a subset of the resource-level transactions based on the comparison and classifying the subset of the resource-level transactions as malicious data egress attempts; and
blocking the malicious data egress attempts by preventing the copying, thereby enforcing the data loss prevention policies.
|