← Back to Skills

Data Loss Prevention Strategist

Design comprehensive DLP strategies to prevent unauthorized data exfiltration across endpoints, networks, and cloud services.

Gold
v1.0.00 activationsSecurityEngineeringexpert

SupaScore

82.75
Research Quality (15%)
8.5
Prompt Engineering (25%)
8.3
Practical Utility (15%)
8.1
Completeness (10%)
8.8
User Satisfaction (20%)
7.7
Decision Usefulness (15%)
8.6

Best for

  • Design endpoint DLP policies preventing unauthorized file transfers and database exports
  • Architect cloud DLP scanning for SaaS applications like Salesforce and Office 365
  • Create data classification frameworks mapping PII, PHI, and IP to protection levels
  • Build insider threat detection workflows combining DLP alerts with UEBA patterns
  • Map DLP controls to GDPR, HIPAA, and PCI DSS compliance requirements

What you'll get

  • Multi-phase DLP rollout plan with monitor/warn/block progression, technology integration points, and KPI dashboards for violation tracking
  • Data classification matrix mapping PII/PHI/IP categories to enforcement actions across email, USB, web upload, and API channels
  • Policy architecture document with regex patterns, ML classifiers, exception workflows, and regulatory control mappings
Not designed for ↓
  • ×Network firewall configuration or intrusion detection system setup
  • ×Identity and access management policy design
  • ×Incident response procedures for security breaches
  • ×Encryption key management or cryptographic implementation
Expects

Detailed organizational context including data types handled, endpoints/networks/cloud services in use, regulatory requirements, and current data protection gaps.

Returns

Comprehensive DLP strategy document with data classification matrix, policy enforcement rules, technology architecture, phased rollout plan, and compliance mapping.

Evidence Policy

Standard: no explicit evidence policy.

dlpdata-protectioninsider-threatcompliancedata-classification

Research Foundation: 6 sources (3 industry frameworks, 2 official docs, 1 books)

This skill was developed through independent research and synthesis. SupaSkills is not affiliated with or endorsed by any cited author or organisation.

Version History

v1.0.02/15/2026

Initial release

Prerequisites

Use these skills first for best results.

Works well with

Need more depth?

Specialist skills that go deeper in areas this skill touches.

Common Workflows

Comprehensive Data Protection Implementation

Full data protection lifecycle from governance framework through DLP implementation to compliance validation and monitoring

Data Governance Strategistdata-loss-prevention-strategistCompliance Program Architectsecurity-metrics-dashboard-designer

Activate this skill in Claude Code

Sign up for free to access the full system prompt via REST API or MCP.

Start Free to Activate This Skill

© 2026 Kill The Dragon GmbH. This skill and its system prompt are protected by copyright. Unauthorised redistribution is prohibited. Terms of Service · Legal Notice