Blog Post

Azure Storage Blog
5 MIN READ

Microsoft Purview Protection Policies for Azure Data Lake & Blob Storage Available in All Regions

Ayushjuyal's avatar
Ayushjuyal
Icon for Microsoft rankMicrosoft
Feb 21, 2025

Organizations today face a critical challenge: ensuring consistent and automated data governance across rapidly expanding data estates. Driven by the growth of AI and the increasing reliance on vast data volumes for model training, Chief Data Officers (CDOs) and Chief Information Security Officers (CISOs) must prevent unintentional exposure of sensitive data (PII, credit card information) while adhering to data and legal regulations.  

Many organizations rely on Azure Blob Storage and ADLS for storing vast amounts of data, offering scalable, secure, and highly available cloud storage solutions. While solutions like RBAC (role-based access control), ABAC (attribute-based access control), and ACLs (Access Control Lists) offer secure ways to manage data access, they can operate on metadata such as file paths, tags, or container names. These mechanisms are effective for implementing restrictive data governance by controlling who can access specific files or containers. However, there are scenarios were implementing automatic access controls based on the sensitivity of the content itself is necessary. For example, identifying and protecting sensitive information like credit card numbers within a blob requires more granular control. Ensuring that sensitive content is restricted to specific roles and applications across the organization is crucial, especially as enterprises focus on building new applications and infusing AI into current solutions. This is where integrated solutions like Microsoft Information Protection (MIP) come into play. 

Microsoft Information Protection (MIP) protection policies provide a solution by enabling organizations to scan and label data based on the content stored in the blob. This allows for applying access controls directly related to the data asset content across storage accounts. By eliminating the need for in-house scanning and labeling, MIP streamlines compliance and helps in applying consistent data governance using a centralized solution.

 

The Solution: Microsoft Purview Information Protection (MIP) Protection Policies for Governance & Compliance

Microsoft Purview Information Protection (MIP) provides an efficient and centralized approach to data protection by automatically restricting access to storage data assets based on sensitivity labels discovered through automated scanning and leveraging Protection policies (learn more). This feature builds upon Microsoft Purview's existing capability (learn more) to scan and label sensitive data assets, ensuring robust data protection.

This not only enhances data governance but also ensures that data is managed in a way that protects sensitive information, reducing the risk of unauthorized access and maintaining the security and trust of customers.

 

Enhancing Data Governance with MIP Protection policies:

Contoso, a multinational corporation, handles large volumes of data stored in Azure Storage (Blob/ADLS). Different users, such as financial auditors, legal advisors, compliance officers, and data analysts, need access to different blobs in the Storage account. These blobs are updated daily with new content, and there can be sensitive data across these blobs. Given the diverse nature of the stored data, Contoso needed an access control method that could restrict access based on data asset sensitivity. For instance, data analysts access the blob named "logs" where log files are uploaded. If these files contain PII or financial data, which should only be accessed by financial officers, the access permissions need to be dynamically updated based on the changing sensitivity of the stored data.

MIP protection policies can address this challenge efficiently by automatically limiting access to data based on sensitivity labels found through automated scanning.

Key Benefits:

  • Auto-labelling: Automatically apply sensitivity labels to Azure Storage based on detection of sensitive information types.
  • Automated Protection: Automatically restrict access to data with specific sensitivity labels, ensuring consistent data protection. Storage Data Owners can selectively enable specific storage accounts for policy enforcement, providing flexibility and control.  Like a protection policy that restricted access to data labeled as "Highly Confidential" to only specific groups or users. For instance, blobs labeled with "logs" were accessible only to data analysts. With MIP, the labels are updated based on content changes, and the protection policy can deny access if the content if any “Highly Confidential” data is identified.
  • Enterprise-level Control: Information Protection policies are applied to blobs and resource sets, ensuring that only authorized Azure Entra ID users or M365 user groups can access sensitive data. Unauthorized users will be prevented from reading the blob or resource set.
  • Centralized Policy Management: Create, manage, and enforce protection policies across Azure Storage from a single, unified interface in Microsoft Purview. Enterprise admins have granular control over which storage accounts enforce protection coverage based on the account’s sensitivity label.

By using Microsoft Purview Information Protection (MIP) Protection Policies, Contoso was able to achieve secure and consistent data governance, and centralized policy management, effectively addressing their data security challenges

 

Prerequisites

Microsoft 365 E5 licenses and setup of pay as you go billing model.

 

Getting Started

The public preview of Protection Policies supports the following Azure Storage services:

  • Azure Blob Storage
  • Azure Data Lake Storage

To enable Protection Policies for your Azure Storage accounts:

  1. Navigate to the Microsoft Purview portal> Information Protection card > Policies.
  2. Configure or use an existing sensitivity label in Microsoft Purview Information Protection that’s scoped to “Files & other data assets”
  3. Create an auto-labelling to apply a specific sensitivity label to scoped assets in Azure Storage based on Microsoft out-of-the-box sensitive info types detected. Run scans on assets for auto-labelling to apply.
  4. Create a protection policy and associate it with your desired sensitivity labels.
  5. Apply the policy to your Azure Blob Storage or ADLS Gen2 accounts.

 

A diagram to depict overall process of creating protection policies

Limitations

During the public preview, please note the following limitations:

  • Currently a maximum of 10 storage accounts are supported in one protection policy, and they must be selected under Edit for them to be enabled.
  • Changing pattern rules will re-apply labels on all storage accounts. During the public preview, there might be delays in label synchronization, which could prevent MIP policies from functioning effectively.
  • If customer storage account enables CMK, the storage account MIP policy will not work.

 

Next Steps

With the Public Preview, MIP Protection policies is now available in all regions, and any storage account registered on the Microsoft Purview Data Map can create and apply protection policies to implement consistent data governance strategies across their data in Azure Storage.

We encourage you to try out this feature and provide feedback. Your input is crucial in shaping this feature as we work towards general availability.

Updated Feb 22, 2025
Version 2.0
No CommentsBe the first to comment