Protect Your Data
Protect Your Data
Lots of tools
of organizations fear
63% data leak/spillage during
of organizations no longer
88% have confidence to detect and
prevent loss of sensitive data3
What data do I have? How do I protect the data? How can I protect data with How can I retain or delete
people working from home? data?
Where does the data reside? What data is at risk?
How can I protect data when
people collaborate with external
users?
AIP
Scanner
MIP
Data Classification
Service
AZURE
Android
iOS
MacOS
Sensitivity Labels PurView ADLS SQL DB Azure Files
Windows
Public Confidential
Blobs Cosmos DB
General …
HIGHLY
Recommended classification CONFIDENTIAL
Based on the content you’re working on, you can be
prompted with suggested classification CONFIDENTIAL
PERSONAL
Manual reclassification
Users can override a classification and optionally be GENERAL
required to provide a justification
PU BLIC
User-driven classification
Users can choose to apply a sensitivity label to the
email or file they are working on with a single click
User-driven labeling experiences built into Office applications
Built-in
Integrated natively into Office apps; no
plug-ins or add-ons required for latest
Office 365 apps.
Built-in
200+ information types provided out
of the box to get started
Flexible
Use regex, keywords, and exact data
match for data identification
Organized
Based on attributes on documents
Trainable classifiers
Leverage machine learning to automatically classify unique data
Built-in
Resume, source code, offensive
language provided out-of-box
Build-your-own
Train the system to look for specific
types of data
Integrated
Attach to sensitivity and retention
labels with associated policies
Protect your data
Compliance
Meet compliance obligations that
require encrypting data or Recipients can
read protected
encryption key control messages using
consumer
identities
Easily read protected
emails on any device
Sensitivity labels on
groups and sites
The Microsoft approach
to information protection & governance
What data do I have? How do I protect the data? How can I protect data with How can I retain or delete
people working from home? data?
Where does the data reside? What data is at risk?
How can I protect data when
people collaborate with external
users?
The An
unintentional
employee might
insider is The
A negligent
negligentinsider
insider
might
is aware
use TheA malicious insider might
is intent
unintentionally
often unawaresend
of security
classified personal
of the security
web storage
practices
solutions
but on
delete
stealing
filesdata
at the
orlast
destroying
day of
information
protocols to
andanmight
external aschooses
he observes
to circumvent
the protocols
themas work infrastructure.
motivated by their
unintentionally
email recipient.
expose often ifredundant.
they are seen as resignation or might steal
information or foothold to unreasonable. secrets from the company.
attackers.
Insider Threat Incidents
Malicious
Insiders
14%
Stolen
Credentials
25%
Unintentional
and Negligant
Insiders
61%
Mitigation of risk Rule enforcement / User Education Collaborate across security, HR, legal
• Block printing of Word documents with Credit Cards, • Identify departing employees who are taking sensitive documents upon departure
Examples • Audit copying PDF files with label “Confidential” to USB, • Identify creative insider threat by correlating activities (collection>
• Warn w/ Override uploading of Office files with label “Sensitive” to Cloud obfuscation>exfiltration)
• Identify the vigilant insider threat involved in careful low-and-slow leak over days
Microsoft Information Protection
Defender
for Cloud
Apps
AIP
Scanner
MIP
Data Classification
Service
AZURE
Android
iOS
Windows
Public Confidential
Blobs Cosmos DB
General …
AIP
Scanner
MIP
Data Loss
Prevention
AZURE
Cloud Upload Android
App Control iOS
USB Drive MacOS Sensitivity Labels PurView ADLS SQL DB Azure Files
Network Windows
Public Confidential
Print
Blobs Cosmos DB
Clipboard General …
Azure
Exchange SharePoint, Teams Endpoint Non-Microsoft On-prem workloads
Online OneDrive Clouds and file shares
SaaS apps
Guided Unified & flexible Integrated with Unified alerting & Integrated end-user
onboarding policy management MIP Remediation experiences
Unified, flexible policy management & enforcement
* From PET publication “Er jeres forskning i fare?” 2021: Er jeres forskning i fare?
Next steps
1 2 3