Understanding DLP in a multi-layered approach to Information Protection (3 of 3)

Published May 23 2021 10:53 AM 65 Views
Microsoft

Microsoft’s Approach to data protection

GeoClark_0-1621792108967.png

 

Microsoft’s information protection solution(s) are a layered approach to platform data security.  This infographic explains the protection solutions in O365 from the design of libraries and SharePoint groups, Classification and Labeling, Encryption and DLP. I explicitly call this out as I often respond to requests from clients that want to discuss DLP from a task-oriented viewpoint. Often these requests come from organizations that may have skipped the foundational design of data protection and have allowed data to proliferate in their environment largely unchecked and are now seeking to use a technology like DLP to throw a net over the problem.

 

This is Part 3 of a multi-part article around Data Protection.

Microsoft’s Data protection solution solutions leverages two primary concepts in its approach

  • MIP/AIP – Protect the data no matter where it is
  • DLP – Define a service edge and control the data that can pass through it

It can be difficult when a client tries to piece meal in our solutions and couple them with their other solutions to fill a gap or address a specific task as they might a niche point solutions, or try to map it to a use case we would not support (forward proxy discussion from part 2) or they expect it to fulfill all of their requirements again from a task oriented view point when our solution is a platform and not a point solution.  The easiest tool to understand the platform statement is MCAS.  Microsoft Cloud App Security has no access control.  The industry definition of this space is Cloud Access Security Broker, and our tool is named ’App’ Security with purpose.  Our access controls exist in Azure AD which MCAS leverages, it would not make sense to replicate the access control capability in MCAS. The capability sought probably does exist just in another place that makes sense in a holistic conversation about data protection, but not a tactical conversation around filling a gap.

 

DLP in Microsoft’s Information Protection

M365 offers DLP in the following locations:

  • O365 (Email, SharePoint Online, OneDrive for Business)
  • Teams
  • MCAS (O365 and 3rd party SaaS such as Salesforce and ServiceNow)
  • Endpoint (Windows 10)

GeoClark_1-1621792109009.png

 

Data Protection in Microsoft starts with the definition of Sensitive Information Types (SITs).  These are the patterns and rules that define what sensitive data is for your organization.  Many customers struggle with this initial step to get the definitions tuned in a way that minimizes false positives.  DLP can require tuning and that should be the expectation.  Microsoft has tools to assist such as Trainable classifiers which is ML training against known positive datasets to create the classifier, Exact Data Match and SharePoint Syntex and expanded use cases outside of M365 with Azure Purview that leverages the same backend.

This effort can be a large undertaking as depending on which department you speak with what is considered sensitive critical data can vary.  Microsoft provides general recommendations of 3 types of data to support this internal conversation.

GeoClark_2-1621792109023.png

 

 

The fact is there IS some data in your organization that is more important than others and it will require involvement of leadership to effectively define.  A quote around data protection I like to use to illustrate the importance of this definition and the knee jerk response to just try to protect everything is “if you protect paperclips and diamonds with an equal amount of vigor, you will soon find yourself with fewer diamonds and more paperclips”.  Again, not an easy button but an important and worthwhile exercise regardless.

Once the SITs are created you can see by the MIP diagram the type can be used across all the locations where Microsoft offers DLP in O365. Create the definition once and use it across the M365 estate.

 

Define the Business ask in the terms of available service edge/control plane

Access to data should be assessed in the terms of edges and control planes.  Scenarios will generally not be a DLP only protection model and in the cases where it is, the supported scenarios will be reduced. The image below is an examination of a business use case for access to Teams and file downloads.  We worked on this to help the client understand the variations of control planes in response to the general ask of the business for remote access, without a clear definition of the access modalities that would be used.

GeoClark_0-1621792290457.png

 

 

The organization used this to tailor the supported access use cases presented to the business and as supporting information to answer the ‘why’ as needed.

An organization can look at the matrix above in two ways complexity, or options.  The modern enterprise which includes remote work, SaaS application, personal devices, B2B and guest users creates this web of access modalities, and it is the responsibility of the business to clearly understand what its true requirements are and then it is incumbent on IT to determine how to meet them and enable the business.

It is understandable that organizations would seek to simplify this question by attempting to preserve the 4-walls security model through forward proxies and Software Defined perimeters but in affect what that design is a reduction of complexity through the minimization of options.

The big picture

Hopefully, this discussion has provided a good overview of the Microsoft Information Protection platform in M365 and where DLP fits into a data security model.  The modern enterprise has expanding the traditional workforce and resource delivery outside of the ‘4-walls’ of an on premises data center and effective data security is a layered approach of which DLP is one component and will include tools in M365, Azure, 3rd party Cloud and network providers and even as part of the code within your applications.

 

If you have questions on M365 DLP capabilities, please contact your Microsoft or CSP account team for more detailed information.

 

%3CLINGO-SUB%20id%3D%22lingo-sub-2379270%22%20slang%3D%22en-US%22%3EUnderstanding%20DLP%20in%20a%20multi-layered%20approach%20to%20Information%20Protection%20(3%20of%203)%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2379270%22%20slang%3D%22en-US%22%3E%3CP%3E%3CSTRONG%3EMicrosoft%E2%80%99s%20Approach%20to%20data%20protection%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22GeoClark_0-1621792108967.png%22%20style%3D%22width%3A%20400px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F282987iB8EB269B94803349%2Fimage-size%2Fmedium%3Fv%3Dv2%26amp%3Bpx%3D400%22%20role%3D%22button%22%20title%3D%22GeoClark_0-1621792108967.png%22%20alt%3D%22GeoClark_0-1621792108967.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EMicrosoft%E2%80%99s%20information%20protection%20solution(s)%20are%20a%20layered%20approach%20to%20platform%20data%20security.%26nbsp%3B%20This%20infographic%20explains%20the%20protection%20solutions%20in%20O365%20from%20the%20design%20of%20libraries%20and%20SharePoint%20groups%2C%20Classification%20and%20Labeling%2C%20Encryption%20and%20DLP.%20I%20explicitly%20call%20this%20out%20as%20I%20often%20respond%20to%20requests%20from%20clients%20that%20want%20to%20discuss%20DLP%20%3CEM%3Efrom%20a%20task-oriented%20viewpoint%3C%2FEM%3E.%20Often%20these%20requests%20come%20from%20organizations%20that%20may%20have%20skipped%20the%20foundational%20design%20of%20data%20protection%20and%20have%20allowed%20data%20to%20proliferate%20in%20their%20environment%20largely%20unchecked%20and%20are%20now%20seeking%20to%20use%20a%20technology%20like%20DLP%20to%20throw%20a%20net%20over%20the%20problem.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThis%20is%20Part%203%20of%20a%20multi-part%20article%20around%20Data%20Protection.%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fblogs%2Fblogworkflowpage%2Fblog-id%2FManufacturing%2Farticle-id%2F1%3FprePageCrumb%3DBlogUserContributedArticlesPage%22%20target%3D%22_self%22%3EDLP%20defined%20and%20the%20pursuit%20of%20data%20protection%20as%20an%20%E2%80%98Edge%20solution%E2%80%99%3C%2FA%3E%3C%2FLI%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fblogs%2Fblogworkflowpage%2Fblog-id%2FManufacturing%2Farticle-id%2F2%22%20target%3D%22_self%22%3EDefining%20the%20edge%20of%20an%20Enterprise%20and%20control%20planes%3C%2FA%3E%3C%2FLI%3E%0A%3CLI%3E%3CSTRONG%3EDLP%20in%20Microsoft%20Information%20Protection%20(MIP)%3C%2FSTRONG%3E%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3EMicrosoft%E2%80%99s%20Data%20protection%20solution%20solutions%20leverages%20two%20primary%20concepts%20in%20its%20approach%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3EMIP%2FAIP%20%E2%80%93%20%3CSTRONG%3E%3CEM%3EProtect%20the%20data%20no%20matter%20where%20it%20is%3C%2FEM%3E%3C%2FSTRONG%3E%3C%2FLI%3E%0A%3CLI%3EDLP%20%E2%80%93%20%3CSTRONG%3E%3CEM%3EDefine%20a%20service%20edge%20and%20control%20the%20data%20that%20can%20pass%20through%20it%3C%2FEM%3E%3C%2FSTRONG%3E%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3EIt%20can%20be%20difficult%20when%20a%20client%20tries%20to%20piece%20meal%20in%20our%20solutions%20and%20couple%20them%20with%20their%20other%20solutions%20to%20fill%20a%20gap%20or%20address%20a%20specific%20task%20as%20they%20might%20a%20niche%20point%20solutions%2C%20or%20try%20to%20map%20it%20to%20a%20use%20case%20we%20would%20not%20support%20(forward%20proxy%20discussion%20from%20part%202)%20or%20they%20expect%20it%20to%20fulfill%20all%20of%20their%20requirements%20again%20%3CEM%3Efrom%20a%20task%20oriented%20view%20point%3C%2FEM%3E%20when%20our%20%3CEM%3Esolution%20is%20a%20platform%3C%2FEM%3E%20and%20not%20a%20point%20solution.%26nbsp%3B%20The%20easiest%20tool%20to%20understand%20the%20platform%20statement%20is%20MCAS.%26nbsp%3B%20Microsoft%20Cloud%20App%20Security%20has%20no%20access%20control.%26nbsp%3B%20The%20industry%20definition%20of%20this%20space%20is%20Cloud%20Access%20Security%20Broker%2C%20and%20our%20tool%20is%20named%20%E2%80%99App%E2%80%99%20Security%20with%20purpose.%26nbsp%3B%20Our%20access%20controls%20exist%20in%20Azure%20AD%20which%20MCAS%20leverages%2C%20it%20would%20not%20make%20sense%20to%20replicate%20the%20access%20control%20capability%20in%20MCAS.%20The%20capability%20sought%20probably%20does%20exist%20just%20in%20another%20place%20that%20makes%20sense%20in%20a%20holistic%20conversation%20about%20data%20protection%2C%20but%20not%20a%20tactical%20conversation%20around%20filling%20a%20gap.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EDLP%20in%20Microsoft%E2%80%99s%20Information%20Protection%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3EM365%20offers%20DLP%20in%20the%20following%20locations%3A%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3EO365%20(Email%2C%20SharePoint%20Online%2C%20OneDrive%20for%20Business)%3C%2FLI%3E%0A%3CLI%3ETeams%3C%2FLI%3E%0A%3CLI%3EMCAS%20(O365%20and%203%3CSUP%3Erd%3C%2FSUP%3E%20party%20SaaS%20such%20as%20Salesforce%20and%20ServiceNow)%3C%2FLI%3E%0A%3CLI%3EEndpoint%20(Windows%2010)%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22GeoClark_1-1621792109009.png%22%20style%3D%22width%3A%20400px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F282989i91011058CE44E512%2Fimage-size%2Fmedium%3Fv%3Dv2%26amp%3Bpx%3D400%22%20role%3D%22button%22%20title%3D%22GeoClark_1-1621792109009.png%22%20alt%3D%22GeoClark_1-1621792109009.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EData%20Protection%20in%20Microsoft%20starts%20with%20the%20definition%20of%20Sensitive%20Information%20Types%20(SITs).%20%26nbsp%3BThese%20are%20the%20patterns%20and%20rules%20that%20define%20what%20sensitive%20data%20is%20for%20your%20organization.%20%26nbsp%3BMany%20customers%20struggle%20with%20this%20initial%20step%20to%20get%20the%20definitions%20tuned%20in%20a%20way%20that%20minimizes%20false%20positives.%26nbsp%3B%20DLP%20can%20require%20tuning%20and%20that%20should%20be%20the%20expectation.%20%26nbsp%3BMicrosoft%20has%20tools%20to%20assist%20such%20as%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fmicrosoft-365%2Fcompliance%2Fclassifier-learn-about%3Fview%3Do365-worldwide%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3ETrainable%20classifiers%3C%2FA%3E%20which%20is%20ML%20training%20against%20known%20positive%20datasets%20to%20create%20the%20classifier%2C%20%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fsecurity-compliance-and-identity%2Fnew-exact-data-match-edm-classification-helps-you-better-detect%2Fba-p%2F793526%22%20target%3D%22_blank%22%3EExact%20Data%20Match%3C%2FA%3E%20and%20%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fen-us%2Fmicrosoft-365%2Fenterprise%2Fsharepoint-syntex-overview%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3ESharePoint%20Syntex%3C%2FA%3E%20and%20expanded%20use%20cases%20outside%20of%20M365%20with%20%3CA%20href%3D%22https%3A%2F%2Fazure.microsoft.com%2Fen-us%2Fservices%2Fpurview%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EAzure%20Purview%3C%2FA%3E%20that%20leverages%20the%20same%20backend.%3C%2FP%3E%0A%3CP%3EThis%20effort%20can%20be%20a%20large%20undertaking%20as%20depending%20on%20which%20department%20you%20speak%20with%20what%20is%20considered%20sensitive%20critical%20data%20can%20vary.%26nbsp%3B%20Microsoft%20provides%20general%20recommendations%20of%203%20types%20of%20data%20to%20support%20this%20internal%20conversation.%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22GeoClark_2-1621792109023.png%22%20style%3D%22width%3A%20400px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F282988i6AA3FABA7A9BB322%2Fimage-size%2Fmedium%3Fv%3Dv2%26amp%3Bpx%3D400%22%20role%3D%22button%22%20title%3D%22GeoClark_2-1621792109023.png%22%20alt%3D%22GeoClark_2-1621792109023.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThe%20fact%20is%20there%20%3CSTRONG%3E%3CEM%3EIS%3C%2FEM%3E%3C%2FSTRONG%3E%20some%20data%20in%20your%20organization%20that%20is%20more%20important%20than%20others%20and%20it%20will%20require%20involvement%20of%20leadership%20to%20effectively%20define.%26nbsp%3B%20A%20quote%20around%20data%20protection%20I%20like%20to%20use%20to%20illustrate%20the%20importance%20of%20this%20definition%20and%20the%20knee%20jerk%20response%20to%20just%20try%20to%20protect%20everything%20is%20%E2%80%9Cif%20you%20protect%20paperclips%20and%20diamonds%20with%20an%20equal%20amount%20of%20vigor%2C%20you%20will%20soon%20find%20yourself%20with%20fewer%20diamonds%20and%20more%20paperclips%E2%80%9D.%26nbsp%3B%20Again%2C%20not%20an%20easy%20button%20but%20an%20important%20and%20worthwhile%20exercise%20regardless.%3C%2FP%3E%0A%3CP%3EOnce%20the%20SITs%20are%20created%20you%20can%20see%20by%20the%20MIP%20diagram%20the%20type%20can%20be%20used%20across%20all%20the%20locations%20where%20Microsoft%20offers%20DLP%20in%20O365.%20Create%20the%20definition%20once%20and%20use%20it%20across%20the%20M365%20estate.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EDefine%20the%20Business%20ask%20in%20the%20terms%20of%20available%20service%20edge%2Fcontrol%20plane%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3EAccess%20to%20data%20should%20be%20assessed%20in%20the%20terms%20of%20edges%20and%20control%20planes.%20%26nbsp%3BScenarios%20will%20generally%20not%20be%20a%20DLP%20only%20protection%20model%20and%20in%20the%20cases%20where%20it%20is%2C%20the%20supported%20scenarios%20will%20be%20reduced.%20The%20image%20below%20is%20an%20examination%20of%20a%20business%20use%20case%20for%20access%20to%20Teams%20and%20file%20downloads.%26nbsp%3B%20We%20worked%20on%20this%20to%20help%20the%20client%20understand%20the%20variations%20of%20control%20planes%20in%20response%20to%20the%20general%20ask%20of%20the%20business%20for%20remote%20access%2C%20without%20a%20clear%20definition%20of%20the%20access%20modalities%20that%20would%20be%20used.%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22GeoClark_0-1621792290457.png%22%20style%3D%22width%3A%20400px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F282992iAD59BDAB7686B1FB%2Fimage-size%2Fmedium%3Fv%3Dv2%26amp%3Bpx%3D400%22%20role%3D%22button%22%20title%3D%22GeoClark_0-1621792290457.png%22%20alt%3D%22GeoClark_0-1621792290457.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThe%20organization%20used%20this%20to%20tailor%20the%20supported%20access%20use%20cases%20presented%20to%20the%20business%20and%20as%20supporting%20information%20to%20answer%20the%20%E2%80%98why%E2%80%99%20as%20needed.%3C%2FP%3E%0A%3CP%3EAn%20organization%20can%20look%20at%20the%20matrix%20above%20in%20two%20ways%20complexity%2C%20or%20options.%20%26nbsp%3BThe%20modern%20enterprise%20which%20includes%20remote%20work%2C%20SaaS%20application%2C%20personal%20devices%2C%20B2B%20and%20guest%20users%20creates%20this%20web%20of%20access%20modalities%2C%20and%20it%20is%20the%20responsibility%20of%20the%20business%20to%20clearly%20understand%20what%20its%20true%20%3CU%3Erequirements%3C%2FU%3E%20are%20and%20then%20it%20is%20incumbent%20on%20IT%20to%20determine%20how%20to%20meet%20them%20and%20enable%20the%20business.%3C%2FP%3E%0A%3CP%3EIt%20is%20understandable%20that%20organizations%20would%20seek%20to%20simplify%20this%20question%20by%20attempting%20to%20preserve%20the%204-walls%20security%20model%20through%20forward%20proxies%20and%20Software%20Defined%20perimeters%20but%20in%20affect%20what%20that%20design%20is%20a%20reduction%20of%20complexity%20through%20the%20minimization%20of%20options.%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EThe%20big%20picture%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3EHopefully%2C%20this%20discussion%20has%20provided%20a%20good%20overview%20of%20the%20Microsoft%20Information%20Protection%20platform%20in%20M365%20and%20where%20DLP%20fits%20into%20a%20data%20security%20model.%20%26nbsp%3BThe%20modern%20enterprise%20has%20expanding%20the%20traditional%20workforce%20and%20resource%20delivery%20outside%20of%20the%20%E2%80%984-walls%E2%80%99%20of%20an%20on%20premises%20data%20center%20and%20effective%20data%20security%20is%20a%20layered%20approach%20of%20which%20DLP%20is%20one%20component%20and%20will%20include%20tools%20in%20M365%2C%20Azure%2C%203%3CSUP%3Erd%3C%2FSUP%3E%20party%20Cloud%20and%20network%20providers%20and%20even%20as%20part%20of%20the%20code%20within%20your%20applications.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CEM%3EIf%20you%20have%20questions%20on%20M365%20DLP%20capabilities%2C%20please%20contact%20your%20Microsoft%20or%20CSP%20account%20team%20for%20more%20detailed%20information.%3C%2FEM%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-TEASER%20id%3D%22lingo-teaser-2379270%22%20slang%3D%22en-US%22%3E%3CP%3EMicrosoft%E2%80%99s%20information%20protection%20solution(s)%20are%20a%20layered%20approach%20to%20platform%20data%20security.%26nbsp%3B%20This%20infographic%20explains%20the%20protection%20solutions%20in%20O365%20from%20the%20design%20of%20libraries%20and%20SharePoint%20groups%2C%20Classification%20and%20Labeling%2C%20Encryption%20and%20DLP.%20I%20explicitly%20call%20this%20out%20as%20I%20often%20respond%20to%20requests%20from%20clients%20that%20want%20to%20discuss%20DLP%20%3CEM%3Efrom%20a%20task-oriented%20viewpoint%3C%2FEM%3E.%20Often%20these%20requests%20come%20from%20organizations%20that%20may%20have%20skipped%20the%20foundational%20design%20of%20data%20protection%20and%20have%20allowed%20data%20to%20proliferate%20in%20their%20environment%20largely%20unchecked%20and%20are%20now%20seeking%20to%20use%20a%20technology%20like%20DLP%20to%20throw%20a%20net%20over%20the%20problem.%3C%2FP%3E%3C%2FLINGO-TEASER%3E
Co-Authors
Version history
Last update:
‎Aug 26 2021 06:33 AM
Updated by: