Skip to main content

AD_4nXdY1-Y_ah9m0PrmQUZ5P5c8-Rb0fmhFbA4UfGX820ROTjE8cHnOBVcl-yUQkIOtR12G9xyksnn1xA8km4lxHFvv6SEfpSThN4yanUfbTnsFPft4bs_YKiwLutHPwVoW9ffhRmn4HeSKogogkseTz6sGcMMFX0bx53oPbHnRz1JeXeon3etiKCM?key=TiN0TFEBf8W3bfuyguz0vQ

Netskope Global Technical Success (GTS)

How to Craft Effective Generative AI Policies: A Walkthrough

 

Netskope Cloud Version - 120

Objective

In this article, we explore essential strategies for managing generative AI applications in the workplace. You’ll discover how to categorize AI tools, monitor their usage, and implement data protection measures. 

 

Prerequisite

Netskope CASB Inline/SWG license

Netskope Advanced Analytics license

 

Context

In today’s fast-paced digital landscape, the adoption of generative AI applications is rapidly increasing within organizations. As tools like ChatGPT and Google Bard gain popularity, it's essential to manage their use effectively to protect sensitive data and ensure compliance with security policies. This document aims to provide a comprehensive guide on developing effective generative AI policies. It covers key strategies for monitoring application usage, categorizing AI tools, implementing data protection measures, and establishing access controls.

 

Do You Know?

Generative AI is experiencing explosive growth, with enterprise usage increasing by 25% each month. This trend highlights the need for organizations to implement effective policies to manage this technology safely.

 

On average, 1 in 100 enterprise employees uses generative AI tools like ChatGPT daily, submitting around 8 prompts each. This widespread usage emphasizes the importance of monitoring and securing interactions with these applications.

 

Procedure

We will evaluate, configure, and explore the following points to craft an effective generative AI policy.

  • Usage Monitoring and Detection: Implement procedures for monitoring and detecting Gen AI usage across various departments using tools like Netskope Advanced Analytics. This will help you understand how Gen AI is being used within your organization and identify potential risks.
  • Categorization of Gen AI Applications: Define and categorize different types of Gen AI applications (e.g., Sanctioned , Coding Development ) that may be used within your organization. This will help in creating targeted policies for specific use cases.
  • Data Protection Measures: Implement Data Loss Prevention (DLP) policies for specific Gen AI applications, such as: Allowing or alerting on uploading and downloading of sensitive data (e.g., source code) for authorized users
  • Access Control Policies: Develop Real-Time Policies for both SaaS and web access to Gen AI applications. This includes: User alerts when accessing Gen AI applications, Allow and deny lists for specific Gen AI URLs , Custom categories for Gen AI applications

 

Usage Monitoring and Detection

Netskope offers a dashboard called "AI Usage" in its library, providing valuable insights into several key aspects of AI utilization including,

  1. User Engagement: Understand how many users are actively using AI applications.
  2. Popular AI Applications: Identify the top AI apps and sites being accessed.
  3. Activity Monitoring: View the activities being detected within AI applications.
  4. Usage Control: Gain insights into how AI usage is being managed and controlled.

A detailed overview of this dashboard is available here , Demo video here

Path : Netskope tenant UI >>> Advanced Analytics >>> Netskope Library

AD_4nXfhQQe15SkozGf-LXp3sO4vVf7DiYvrEHrJIUJufJTHLhHzsMjbIh4x6XUN_5TXNGQeTbtXQob44cZQCct2cOJQdafrhEvIx14D2Xrxn_0Ty6s3ZK4loIoJEFo5nMnBJijcddni8asC41ShxB226dYC1tDIPcwPfvJ5bWYzpOHLdsm-D4Ec0A?key=TiN0TFEBf8W3bfuyguz0vQ

 

While exploring the dashboard, I discovered that 22% of users in my test tenant are utilizing generative AI applications, with ChatGPT ranking at the top of the list. The report provides details on the applications and the activities associated with them. My focus is on the green bar in the 'Action Taken on AI App Usage' section, which highlights the default allowed policy.

AD_4nXcjE7HgsWlCPH_4iW0q7H81Gk8SpGaTn71wTLsVuPhtv6W7D38kr2c2Cm2oVtab3b_ktBQEb96AI2AP8Mxik6AfaZvXqLWdd9Wm3ZhyYLwdLLfuSNgjuJK3_BeM2oEll4lzSG5L0F2IyHvexAZOfZBXwNtSIK5gJOILaAPbjI6tHPyHa_8tFOo?key=TiN0TFEBf8W3bfuyguz0vQ

 

When you scroll down, you'll find a section that shows the policies applied to each activity and what is allowed by default. To focus on this, I filtered the application to “ChatGPT” for an exclusive view.

AD_4nXfDDu_Cs_5ft5rGFEVmlwMKpcVb1jbgw8CSbL8ZXoDSSEL6CbkI5hogwti-UGVDamL2fRRsSIQbrogZwzDILDZpJ6gqndL62GDh2W940T97GG8dyGLkDFWW0PsXZP7Tsk-4UPuPSX6BzuO6RkSArjKx6bhwBPyjhr7Ybo0tku1ZPAFQboHTClY?key=TiN0TFEBf8W3bfuyguz0vQ

 

The visualization indicates that 'Login Attempt' and 'Download' activities are allowed by default.I will now take a closer look at the 'Login Activity'.

AD_4nXfsn3J8KJ7fqdvo2Lg3mPTRIDZTi6JVgWHCy-HQ3PRz22iSWzyg-DFE_xZWmsiNpkebyZ2TQy8HIS2xeE64Vy8H8WABUNYYRTt3ykJeuA1xWoSMW-G4-M2FRQCGVFfGhdxkcpdfyRtzTSFQ_-EgzAE6w3n8zX_Vxl2_YRFAA-dM9kSgb-qdQQ?key=TiN0TFEBf8W3bfuyguz0vQ

 

The 'Top Instances' tab revealed that users are logging into ChatGPT using their corporate credentials. However, my goal is to block this access, so I’ve noted the need to implement a policy specifically to restrict users from using corporate credentials to access ChatGPT.

AD_4nXeE3-zN6T-ruv1G0c9tuuHpp4LSjbFuZElwxZOQnCZaSgI_tZ_KH1m079leDBuFg-BsXfcLOop-ukpnbUI_4xUSvh5UtB-TAjWO9ByjLnEQyFrySYoZybuq1NwdmrOY54UCn0ruKof7-etdXVHChpWMDvWCvoGwZnzz38hkf5eItrJPu3ikhA4?key=TiN0TFEBf8W3bfuyguz0vQ

 

After evaluating all the widgets, I have finalized the policy as follows:

  • The report indicates that there are approximately nine generative AI applications in use within our environment. Among these, ChatGPT/OpenAI and Microsoft Copilot are sanctioned. The remaining non-sanctioned generative applications should be blocked, while the sanctioned applications will be allowed with a User Coach notification. This approach will ensure that users read the privacy guidelines before accessing the Gen AI sanctioned applications..
  • Access to ChatGPT using corporate accounts must be restricted.
  • Prevent the use of Copilot without commercial data protection.
  • DLP policies need to be enforced for upload, download, and post activities related to both ChatGPT and Copilot.

 

Policy flow chart:

 

AD_4nXfNk5RwS_TMLlUy6VzC9ayqDD0bkOW2RnQEwoK1xkhBMFoMY-0M4TA2f6_UaD9gBp3lWcV3uq33VnBH8_FIVwDiL7Q4VsXEjGosM0o1pJWN5Mnvit6M2BgN8QdP385_e9LbKN2SuASDR_RnZFRRBPloetsQDzT30Tp0P1C81ldP_mERbSmaSA?key=TiN0TFEBf8W3bfuyguz0vQ

 

Categorization of Gen AI Applications

Netskope categorizes CCI applications using the tag option primarily for the centralization of application management within the Cloud Confidence Index (CCI) interface.We currently have around 239 applications in the Generative AI category. Note that the number of applications in this category may change over time as new Generative AI tools emerge and are added to Netskope's database. For the most current information, it's recommended to check the latest Netskope CCI database updates -

AD_4nXdj3ZL2FEZ81eD6ChQ3DhAa_ashFVzFjc2HB8aUNx8AKui-06AB_bIo1QR8qSrMQagxuJDgGCN_RLhx29bUmWZSxtpAgDHP_W9oKh2LLq0Rd3O6gV0XLNqR4U2GKMGGlAmFoegY6q6MjnT3_b7JFN_XytjR9GpSY6nx6f6ZuQMHJbIsxYvK-w?key=TiN0TFEBf8W3bfuyguz0vQ

AD_4nXcCeg8uOvTK2xqs1lra7kgmzHh-JvoPcaj-qe4g1mMPTr49TkyaT6GUOfvmwWwsLyhe7RBwKhgi2QXCjtHgRO5Sy_r7zQejPjiwOCLkkXR_2ET1zKgeZ20oWxE-GFA3f6Ox1Nc40_SeyslQHIuyYmmxQdAmEWpdO5HkROA5woGBqtAt9MyQBQ?key=TiN0TFEBf8W3bfuyguz0vQ

 

Now Let’s create a Application tag for ChatGPT and Microsoft Copilot naming it as “Gen AI Sanctioned List”

Path : Netskope UI >>> CCI >>> Cloud Apps >>> ChatGPT

AD_4nXdz4XrUctSWJSWWuStyMwZwFYx7ApymuJYQUuCrZiUfCIzLfO0AfQwN2pAgyBX4ozizQSWOVJ3sELWDMzfBAddGqPVv52QgE0bgtWSzV_R0255-y4OUFx3t2rLYVkSj-ucyTeN8pIZpYk7Go84RvKoE1QxRhhHEpWl1YVxUYfIpAQUwaOxSrZ8?key=TiN0TFEBf8W3bfuyguz0vQ

 

Open the ChatGPT CCI app, then click on the pencil icon next to the Tag option. Type “Gen AI Sanctioned List” and select the create tag option.

AD_4nXcWNEBReNMgB2rpD0RHx-neto2BfR1vz3FgIDzgYn58KRXdxwCJea_HqhkBY0NqkrUCTvwAEOIOI7CsoBL7eFGl2xY5jEbB_BKiQ4IJTfmRH0AdJ6hux1d6nhUSQk5II8V5WaPpYuRtgH7aIvREfYhjl952R0C3zmH3WAwjQZ58T7aBfTCDPg?key=TiN0TFEBf8W3bfuyguz0vQ

 

AD_4nXexNruLunZZkKe8iDYn0iPrIOvYUEPwTEpjjIXbzuJ2qJejEhLG5kBRlPlyGegq3ddojR48dKqOJyuaSJW47dCnVWGo9fqhfwltTzuaA4nl9crvk3PFPmTP3DI1ZN1zS9h8SPEoGfqblZKMSvdeg0G27PsPjTzVjMdoDs2ph6lCXWGPeveIpLc?key=TiN0TFEBf8W3bfuyguz0vQ

 

In a similar manner, search for “OpenAI” and “Microsoft Copilot Application,” click on the Tag edit option, and then select the “Gen AI Sanctioned List” that we created earlier.

Now we have 3 applications mapped to the custom Tag “Gen AI Sanctioned List”.

We will use this CCI tag for next policy creations.

AD_4nXd4vY83a5jUqEms-IG0LCYFbVX4lnJ8Zji3I7M5RSys-uVk4yle0oMwFlLHM4kjZEG3kCmweRiT5QhrCbdLWXQ-rIpkikyX9Or4m21fdCUAtZifZxF6FBL1neR2V0-iIWq_KafTHUe7J1PllYyk4gQ8Jjuzo7pY2469fYA_oms7Upk6nymmWQ?key=TiN0TFEBf8W3bfuyguz0vQ

 

Data Protection Measures

Applying a DLP profile for Generative AI applications is crucial to safeguard sensitive information from unauthorized access and leaks.It ensures compliance with data protection regulations and protects the organization's reputation. 

Check out the DLP webinar series on Netskope Academy for a best practice approach rLink]

Netskope has a wide list of predefined DLP profiles available for use in policies .This includes Predefined DLP rules for well-known compliance regulations (e.g., PCI, PHI, PII). Here I am creating a DLP policy to block source code for ChatGPT and Copilot. Please refer to the section below in the GTS article for detailed configuration steps.

https://community.netskope.com/generative-ai-60

AD_4nXcppd1RNHGMMupGtiksWf34sH5p8EvhahTWhRQ0mbwAQkD4xAlzgh1eii01GBJmZ-S3snoES7TchKexlzgaSp-vAdxeNvRQpKZxIVirgbnGDwgyoTChGT5bh1uDJEjcu4aW9O0z-rL70974x8IKf11BSvmKpdoGJrx9WVXNAwc0Jo22BxM2JE8?key=TiN0TFEBf8W3bfuyguz0vQ

AD_4nXdFmoQQb3o8SRF8hXoB4d38IZyV3dnsq1VHbKCDcZDgS-qzuBy5P1drlALfJnBdzbom1K0T5WcQG6dmvA-UClg-U5KUsSOWkdfopF5eYPppQbnRl9pmgN7YMtTgiMWvFWQlBHow0JB6skGi4jzSFRCheCaAMLibLvpks57QnV9V5PyxoReIsUA?key=TiN0TFEBf8W3bfuyguz0vQ

 

DLP Policy :

AD_4nXfWDwg2cY3Br9A5K6yiImIvkvTdzVUaeujlld9gc8_4QIiChziMbAed6igPvlJ871m2hznTTx9FLJ-nenDM7s5F0d-AHVzwK0feP1DRAiTVC14RR-2By18tIb_Qz76vjKf_CuXIAezd7qP7_jEhHMsplNWY6gLnX4wSqsk0HQbPh_AqRDGtE3U?key=TiN0TFEBf8W3bfuyguz0vQ

 

Access Control Policies

We’ve covered the creation of a DLP policy, but before moving forward, we must first implement inline policies to reduce the surface area for DLP evaluation.

As per the flowchart, we need to configure the following inline policies:

  1. Block all Generative AI applications except those that are sanctioned.
  2. For sanctioned Generative AI applications, implement a user coaching message that outlines the organization's data protection policy. Users must acknowledge this notification in order to proceed.9Ref]
  3. Prevent users from logging into ChatGPT using corporate credentials.0Ref]
  4. Enforce the use of Copilot only with a Commercial Data Protection license.sRef]

Netskope processes policies sequentially and stops at the first matching policy unless it's a DLP policy set to "Alert and Continue.We have structured the policy to reduce the surface area for DLP evaluation by placing block rules at the top, which prevents unsanctioned traffic.

 

AD_4nXfncaZ8-abHSPHWUSaOLM29hG2erGiI2r437Ia2htz19g4zM3HB_fFa_LeFCZ5tZRPUsao2YtB4iei1omTEPLmEz1E-bun83O2Wnb6WbUF7zEzHpZKygsxUU2LsW7VXVPY2TVTIZXgsPqbutTN1B3wvkdlifiXph65E75E8mNpvyZlvrDPVLuQ?key=TiN0TFEBf8W3bfuyguz0vQ

  • As shown in the screenshot above, the first rule (7.1) is configured with the category set to Generative AI and includes the CCI tag “Gen AI Sanctioned AI.” This rule applies a domain profile constraint to detect and block all corporate emails.
  • The second rule (7.2) is having a category as “Generative AI” with the same CCI tag “Gen AI Sanctioned AI.”. Here, I selected the action as “User Alert” and added a customized template for the user coaching message, which includes the organization's data protection guidelines.
  • The third rule (7.3) again with the Generative AI category and the “Gen AI Sanctioned AI” CCI tag. For this rule, a DLP profile is attached to detect source code, with the action set to Block.
  • The fourth rule (7.4) has the “Generative AI” category and CCI tag, with the action set to Allow. This ensures that all sanctioned Generative AI applications are permitted.
  • Finally, the last rule is solely categorized as “Generative AI” with the action set to Block. This rule will capture and block all non-sanctioned AI traffic.

 

Terms and Conditions

  • All documented information undergoes testing and verification to ensure accuracy.
  • In the future, it is possible that the application's functionality may be altered by the vendor. If any such changes are brought to our attention, we will promptly update the documentation to reflect them.

 

Notes

  • This article is authored by Netskope Global Technical Success (GTS).
  • For any further inquiries related to this article, please contact Netskope GTS by submitting a support case with 'Case Type – How To Questions'.