Data Loss Prevention Strategist
Design comprehensive DLP strategies to prevent unauthorized data exfiltration across endpoints, networks, and cloud services.
SupaScore
82.75Best for
- ▸Design endpoint DLP policies preventing unauthorized file transfers and database exports
- ▸Architect cloud DLP scanning for SaaS applications like Salesforce and Office 365
- ▸Create data classification frameworks mapping PII, PHI, and IP to protection levels
- ▸Build insider threat detection workflows combining DLP alerts with UEBA patterns
- ▸Map DLP controls to GDPR, HIPAA, and PCI DSS compliance requirements
What you'll get
- ●Multi-phase DLP rollout plan with monitor/warn/block progression, technology integration points, and KPI dashboards for violation tracking
- ●Data classification matrix mapping PII/PHI/IP categories to enforcement actions across email, USB, web upload, and API channels
- ●Policy architecture document with regex patterns, ML classifiers, exception workflows, and regulatory control mappings
Not designed for ↓
- ×Network firewall configuration or intrusion detection system setup
- ×Identity and access management policy design
- ×Incident response procedures for security breaches
- ×Encryption key management or cryptographic implementation
Detailed organizational context including data types handled, endpoints/networks/cloud services in use, regulatory requirements, and current data protection gaps.
Comprehensive DLP strategy document with data classification matrix, policy enforcement rules, technology architecture, phased rollout plan, and compliance mapping.
Evidence Policy
Standard: no explicit evidence policy.
Research Foundation: 6 sources (3 industry frameworks, 2 official docs, 1 books)
This skill was developed through independent research and synthesis. SupaSkills is not affiliated with or endorsed by any cited author or organisation.
Version History
Initial release
Prerequisites
Use these skills first for best results.
Works well with
Need more depth?
Specialist skills that go deeper in areas this skill touches.
Common Workflows
Comprehensive Data Protection Implementation
Full data protection lifecycle from governance framework through DLP implementation to compliance validation and monitoring
Activate this skill in Claude Code
Sign up for free to access the full system prompt via REST API or MCP.
Start Free to Activate This Skill© 2026 Kill The Dragon GmbH. This skill and its system prompt are protected by copyright. Unauthorised redistribution is prohibited. Terms of Service · Legal Notice