Skip to main content

Check out Interactive Visual Stories to gain hands-on experience with the SSE product features. Click here.

Skyhigh Security

User Risk Rules

User risk rules allow you to categorize users based on their risk types, such as Low, Medium, and High-risk users, and enforce security policies associated with that risk type. This helps you apply the necessary controls to mitigate potential threats in your organization and protect your most sensitive information even from low-risk users.

The risk type of a user provided by Skyhigh CASB is determined by their current user risk score, which ranges from Low to High. Low is (1-3), Medium is (4-6), and High is (7-9). For details on user risk score, see User Risk Score.

clipboard_e6c564282c3de76c6b0a459b7db1ee866.png

Create a Sanctioned DLP Policy for User Risk

Create a sanctioned DLP policy using user risk to meet your data protection needs. For example, you can create a policy that detects and quarantines Australian personally identifiable information (PII) from being shared by low-risk users in Microsoft SharePoint Online. 

To add a user risk type to a DLP policy:

  1. In Skyhigh CASB, go to Policy > DLP Policies.
  2. Click Actions > Sanctioned Policy > Create New Policy to create a policy. (See Create a DLP Policy from a Template for information about templates.)
    clipboard_e743c4c208faa97a8613e30d56e5a2d7e.png
  3. On the Description page, name the policy and describe its status and scope:
    1. Name. Enter a descriptive name to identify the policy easily.
    2. Description. (Optional) Enter a description for your DLP Policy. 
    3. Deployment Type. Select an integration method: API, Lightning Link, or Reverse Proxy. Some user actions and response actions depend on the type you choose.
    4. Services. Click Select Service Instances and select your instance from the list. For example, select Microsoft Sharepoint Online. Click Done
    5. Users. Select the users to apply the policy to. 
      • All Users. Click to apply the policy to all users.
      • Use a predefined dictionary. Click to select a predefined dictionary from the menu.  
      • Manually enter users. Click to manually enter user emails using a comma to separate items. There is a limit of 1,000 characters. 
    6. Click Save
    7. Add Exclusions. Click to add users to exclude from the policy, if needed. 
      • None. 
      • Use a predefined dictionary. Click to select a predefined dictionary from the menu. 
      • Manually enter users. Click to manually enter user emails using a comma to separate items. There is a limit of 1,000 characters. 
    8. Click Save
    9. User Groups. If your tenant has User Data (Active Directory) configured, click Edit to select the User Groups to include in the policy. 
    10. Click Done
    11. Add Exclusions. Click to add user groups to exclude from the policy, if needed. Select user groups from the list and click Done
    12. Click Done
  4. Click Next
    clipboard_e045de08cbb23ebf96f0dc1be924a99a7.png
  5. On the Rules & Exceptions page, configure the following information:
    1. Rules. For IF, select User Risk. Select one of the following options:
      • High. This risk type includes users with a high potential to become vulnerable to threats. This level is the least trustworthy. 
      • Medium. This risk type includes users with a moderate potential to become vulnerable to threats.
      • Low. This risk type includes users with a low potential to become vulnerable to threats. This level is the most trustworthy.
        clipboard_e74edfa02067faeaf1be8227d401ba932.png
  6. Click AND to add another rule, if needed. 

NOTE: Skyhigh recommends that you use the User Risk rule in combination with other rules in your DLP policy. For details on the supported DLP policy rules, see About Sanctioned DLP Policy Rules and Rule Groups.

 

  1. Click THEN to add a severity: Critical, Major, Minor, Warning, or Info. For example, select Critical.
    clipboard_e8cf90e7540ef5758826fea4166e66d33.png
  2. Click New Rule Group to add more, if needed. 
  3. Click Add Exception. Add one or more exceptions, if needed. A DLP policy ignores any exception group within the policy. An exception group is ignored when ALL exceptions within the group match.
  4. Click Add Exception Group to add more. 
  5. Click Next
  6. On the Responses page:
    1. Responses. Select one or more response actions that are triggered when the policy rules are matched. By default, all DLP policies create an incident.
    2. Click Done.
      clipboard_ed24451270496c8db542471d3abd66196.png
    3. Click Next
  7. Click Save.
    clipboard_ee03f19f84da049b463173e35425f749a.png
  • Was this article helpful?