%3CLINGO-SUB%20id%3D%22lingo-sub-1538487%22%20slang%3D%22en-US%22%3ERe%3A%20Announcing%20public%20preview%20of%20Double%20Key%20Encryption%20for%20Microsoft%20365%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1538487%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F170188%22%20target%3D%22_blank%22%3E%40Benjy%20Levin%3C%2FA%3E%26nbsp%3BIs%20this%20applicable%20to%20only%20documents%20labelled%20using%20%22Data%20Classification%22%20or%20Emails%20as%20well%20%3F%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1543404%22%20slang%3D%22en-US%22%3ERe%3A%20Announcing%20public%20preview%20of%20Double%20Key%20Encryption%20for%20Microsoft%20365%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1543404%22%20slang%3D%22en-US%22%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F665025%22%20target%3D%22_blank%22%3E%40dipendas1979%3C%2FA%3E%3C%2FP%3E%3CP%3EMIP%20and%20OME%20uses%20the%20same%20RMS%20service%20in%20the%20background%20for%20protection%2Fencryption.%20You%20should%20be%20able%20to%20deploy%20the%20Sensitivity%20Label%2C%20that%20uses%20the%20Double%20Key%20Encryption%20(I%20expect%20it's%20an%20RMS%20Template)%20to%20Exchange%20Online.%3CBR%20%2F%3EBut%20keep%20in%20mind%20that%20this%20will%20be%20very%20tricky%20with%20external%20receipients%2C%20as%20you%20will%20need%20to%20authorize%20them%20to%20access%20your%20key%20to%20be%20able%20to%20read%20encrypted%20mails.%20Not%20sure%20you%20want%20that%20though%20%3A)%3C%2Fimg%3E%3C%2FP%3E%3CP%3EFor%20Emails%2C%20I%20think%20it%20is%20better%20to%20stay%20with%20OME%20and%2For%20S%2FMIME%20(for%20internal%20receipients%2C%20which%20actually%20is%20the%20most%20safe%20option%20in%20regards%20to%20third%20party%20access%20to%20encrypted%20mails%20compared%20to%20OME%20%3D%20RMS%20with%20MS%20Managed%20Key)%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1549926%22%20slang%3D%22de-DE%22%3ESubject%3A%20Announcing%20public%20preview%20of%20Double%20Key%20Encryption%20for%20Microsoft%20365%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1549926%22%20slang%3D%22de-DE%22%3E%3CP%3EIs%20this%20an%20development%20based%20on%20%22Customer%20Key%22%3F%20Does%20it%20want%20to%20replace%20%22Customer%20Key%22%3F%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1534451%22%20slang%3D%22en-US%22%3EAnnouncing%20public%20preview%20of%20Double%20Key%20Encryption%20for%20Microsoft%20365%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1534451%22%20slang%3D%22en-US%22%3E%3CP%3EThe%20prevalence%20of%20remote%20work%20in%20today%E2%80%99s%20environment%20relies%20heavily%20on%20the%20sharing%20of%20information%2C%20challenging%20organizations%20to%20drive%20productivity%20while%20maintaining%20data%20privacy%20and%20regulatory%20compliance.%20O%3CSPAN%3Erganizations%20in%20highly%20regulated%20industries%20such%20as%20financial%20services%20and%20healthcare%20face%20additional%20challenges.%20Some%20of%20their%20data%20(e.g.%2C%20trade%20secrets%2C%20patents%2C%20and%20financial%20algorithms)%20needs%20the%20highest%20level%20of%20protection%20and%20controls.%20%3C%2FSPAN%3EFailure%20to%20protect%20this%20mission-critical%20data%20not%20only%20tarnishes%20a%20company%E2%80%99s%20reputation%2C%20but%20can%20lead%20to%20a%20loss%20of%20customer%20trust%20and%20cost%20millions%20of%20dollars.%20It%20is%20more%20important%20than%20ever%20to%20maintain%20control%20of%20your%20highly%20sensitive%20data%20and%20prevent%20third-party%20access%20to%20it.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%3EMicrosoft%20365%20provides%20built-in%20data%20protection%20by%20encrypting%20customer%20data%2C%20both%20at%20rest%20and%20in%20transit.%20For%20added%20protection%2C%20we%20encrypt%20customer%20data%20at%20the%20application%20layer%20and%20provide%20flexible%20key%20management%20solutions.%20Customers%20can%20further%20protect%20their%20data%20based%20on%20content%20using%20%3C%2FSPAN%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Flearn%2Fmodules%2Fm365-compliance-information-protect-information%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3EMicrosoft%20Information%20Protection%E2%80%99s%3C%2FA%3E%3CSPAN%3E%20classification%20and%20labeling%20capabilities.%20Adding%20to%20our%20data%20protection%20solutions%2C%20%3C%2FSPAN%3Ewe%20are%20pleased%20to%20announce%20%3CSTRONG%3Ethe%20public%20preview%20of%20Double%20Key%20Encryption%20for%20Microsoft%20365.%20%3C%2FSTRONG%3EDouble%20Key%20Encryption%20helps%20organizations%20protect%20their%20mission-critical%20data%20-%20a%20small%20volume%20of%20their%20overall%20data.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%3EHighly%20regulated%20industries%20%3C%2FSPAN%3Eare%20increasingly%20focused%20on%20enhancing%20their%20data%20protection%20and%20privacy%20programs%20due%20to%20the%20rising%20threat%20of%20data%20breaches%20and%20identity%20theft%3CA%20href%3D%22%23_ftn1%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%20name%3D%22_ftnref1%22%3E%3CSPAN%3E%5B1%5D%3C%2FSPAN%3E%3C%2FA%3E.%20In%202019%2C%20more%20than%2060%20percent%20of%20all%20leaked%20records%20exposed%20were%20those%20of%20financial%20services%20organizations%3CA%20href%3D%22%23_ftn2%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%20name%3D%22_ftnref2%22%3E%3CSPAN%3E%5B2%5D%3C%2FSPAN%3E%3C%2FA%3E%2C%20and%20healthcare%20organizations%20saw%20a%2037%20percent%20increase%20in%20data%20breaches%3CA%20href%3D%22%23_ftn3%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%20name%3D%22_ftnref3%22%3E%3CSPAN%3E%5B3%5D%3C%2FSPAN%3E%3C%2FA%3E.%20%3CSPAN%3EWith%20%3C%2FSPAN%3EMicrosoft%20Information%20Protection%3CSPAN%3E%2C%20we%20provide%20customers%20with%20a%20broad%20set%20of%20capabilities%20that%20helps%20them%20meet%20most%20of%20their%20data%20protection%20needs%3C%2FSPAN%3E%20for%20organization-wide%20data.%20With%20Double%20Key%20Encryption%20for%20Microsoft%20365%2C%20we%20now%20enhance%20the%20depth%20of%20protection%20for%20highly%20sensitive%20data%20to%20meet%20specialized%20requirements.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EDouble%20Key%20Encryption%20enables%20you%20to%20protect%20your%20highly%20sensitive%20data%20while%20keeping%20full%20control%20of%20your%20encryption%20key.%20It%20uses%20two%20keys%20to%20protect%20your%20data%E2%80%94one%20key%20in%20your%20control%2C%20and%20a%20second%20key%20is%20stored%20securely%20in%20Microsoft%20Azure.%20Viewing%20data%20protected%20with%20Double%20Key%20Encryption%20requires%20access%20to%20both%20keys.%20Since%20Microsoft%20can%20access%20only%20one%20of%20these%20keys%2C%20your%20protected%20data%20remains%20inaccessible%20to%20Microsoft%2C%20ensuring%20that%20you%20have%20full%20control%20over%20its%20privacy%20and%20security.%26nbsp%3B%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EWith%20Double%20Key%20Encryption%2C%20you%20can%3A%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3EMaintain%20full%20control%20of%20your%20key%3C%2FLI%3E%0A%3CLI%3EEnjoy%20a%20consistent%20labeling%20experience%3C%2FLI%3E%0A%3CLI%3ESimplify%20deployment%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EMaintain%20full%20control%20of%20your%20key%20%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3EYou%20can%20host%20the%20Double%20Key%20Encryption%20service%20used%20to%20request%20your%20key%2C%20in%20a%20location%20of%20your%20choice%20(on-premises%20key%20management%20server%20or%20in%20the%20cloud)%20and%20maintain%20it%20as%20you%20would%20any%20other%20application.%20Double%20Key%20Encryption%20puts%20you%20in%20control%20by%20providing%20you%20the%20ability%20to%20add%20necessary%20access%20controls%20to%20the%20Double%20Key%20Encryption%20service%2C%20and%20the%20flexibility%20to%20store%20the%20encrypted%20data%20on-premises%20or%20in%20the%20cloud.%20You%20can%20move%20your%20highly%20sensitive%20data%20to%20the%20cloud%20and%20be%20confident%20about%20preventing%20third-party%20access%20as%20you%20maintain%20full%20control%20of%20your%20key.%20Double%20Key%20Encryption%20allows%20you%20to%20store%20your%20data%20and%20key%20in%20the%20same%20location%20and%20help%20meet%20regulatory%20requirements%20across%20several%20regulations%20and%20standards%20such%20as%20the%20General%20Data%20Protection%20Regulation%20(GDPR)%2C%20the%20Health%20Insurance%20Portability%20and%20Accountability%20Act%20(HIPAA)%2C%20the%20Gramm-Leach-Bliley%20Act%20(GLBA)%2C%20Russia%E2%80%99s%20data%20localization%20law%20%E2%80%93%20Federal%20Law%20No.%20242-FZ%2C%20Australia%E2%80%99s%20Federal%20Privacy%20Act%201988%2C%20and%20New%20Zealand%E2%80%99s%20Privacy%20Act%201993.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EEnjoy%20a%20consistent%20labeling%20experience%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3EStoring%20your%20highly%20sensitive%20data%20in%20an%20on-premises%20infrastructure%20typically%20results%20not%20only%20in%20high%20costs%2C%20but%20an%20inconsistent%20user%20experience%20across%20different%20systems.%20Double%20Key%20Encryption%20uses%20the%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Finformation-protection%2Frms-client%2Faip-clientv2%23%3A~%3Atext%3DThe%2520Azure%2520Information%2520Protection%2520unified%2520labeling%2520client%2520for%2Clabels%2520to%2520classify%2520and%2520protect%2520documents%2520and%2520emails.%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3EAzure%20Information%20Protection%20unified%20labeling%20client%3C%2FA%3E%20to%20provide%20a%20consistent%20labeling%20experience%20across%20your%20data%20estate.%20Admins%20and%20users%20with%20required%20permissions%20can%20create%20labels%20with%20Double%20Key%20Encryption%20in%20the%20Microsoft%20365%20compliance%20center%2C%20just%20like%20they%20can%20for%20any%20other%20sensitivity%20label%20type.%20Once%20the%20label%20is%20created%2C%20admins%20can%20assign%20policies%20to%20the%20labels%20in%20the%20Microsoft%20365%20compliance%20center.%20Users%20can%20protect%20their%20data%20by%20selecting%20the%20Double%20Key%20Encrypted%20label%20in%20the%20Sensitivity%20ribbon%20in%20Microsoft%20Office%2C%20providing%20a%20consistent%20experience.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-center%22%20image-alt%3D%22DKE%20pic%201.png%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F206598i75A68E312F294EAA%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20title%3D%22DKE%20pic%201.png%22%20alt%3D%22DKE%20pic%201.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3CEM%3EFigure%201%3A%20Creating%20a%20label%20with%20Double%20Key%20Encryption%20in%20the%20Microsoft%20365%20compliance%20center%3C%2FEM%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-center%22%20image-alt%3D%22DKE%20pic%203.png%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F206757i18F7EFA8BF7696D5%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20title%3D%22DKE%20pic%203.png%22%20alt%3D%22DKE%20pic%203.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3CEM%3EFigure%202%3A%20Labeling%3C%2FEM%3E%3CEM%3E%20with%20Double%20Key%20Encryption%20in%20Word%3C%2FEM%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3ESimplify%20deployment%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3EOrganizations%20often%20store%20their%20mission-critical%20data%20on-premises%20to%20maintain%20control%20and%20prevent%20unauthorized%20access.%20Implementing%20on-premises%20data%20storage%20and%20protection%20solutions%20warrants%20heavy%20investments%20in%20talent%20and%20resources%20to%20deploy%2C%20integrate%2C%20and%20maintain%20the%20complicated%20infrastructure.%20We%20are%20simplifying%20the%20deployment%20process%20for%20the%20Double%20Key%20Encryption%20service%20by%20providing%20implementation%20code%20with%20detailed%20instructions.%20You%20can%20access%20the%20code%20and%20instructions%20by%20cloning%20the%20Double%20Key%20Encryption%20repository%20from%20GitHub%20and%20update%20it%20with%20your%20tenant%20or%20on-premises%20Active%20Directory%20and%20public%20and%20private%20keys.%20Once%20your%20Double%20Key%20Encryption%20service%20is%20deployed%20and%20verified%2C%20you%20will%20be%20ready%20to%20create%20labels%20and%20protect%20your%20mission-critical%20data.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EGet%20started%20today%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3EDouble%20Key%20Encryption%20is%20available%20as%20part%20of%20the%20Microsoft%20365%20E5%20and%20Office%20365%20E5%20suite.%20If%20you%20don%E2%80%99t%20have%20a%20Microsoft%20365%20E5%20license%2C%20you%20can%20sign%20up%20for%20a%20%3CA%20href%3D%22http%3A%2F%2Faka.ms%2FM365E5ComplianceTrial%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3Etrial%3C%2FA%3E.%20To%20get%20started%20with%20Double%20Key%20Encryption%2C%20navigate%20to%20GitHub%20to%20clone%20%3CA%20href%3D%22https%3A%2F%2Faka.ms%2FDKErepo%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ethis%3C%2FA%3E%20repository%20and%20set%20up%20the%20Double%20Key%20Encryption%20service.%20To%20learn%20more%2C%20see%20%3CA%20href%3D%22https%3A%2F%2Faka.ms%2FDKEpreviewdocs%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ethis%3C%2FA%3E%20documentation%20on%20Double%20Key%20Encryption.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CA%20href%3D%22%23_ftnref1%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%20name%3D%22_ftn1%22%3E%3CSPAN%3E%5B1%5D%3C%2FSPAN%3E%3C%2FA%3E%20Cap%20Gemini%3A%20Data%20privacy%20in%20financial%20services%20industry%3C%2FP%3E%0A%3CP%3E%3CA%20href%3D%22%23_ftnref2%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%20name%3D%22_ftn2%22%3E%3CSPAN%3E%5B2%5D%3C%2FSPAN%3E%3C%2FA%3E%20Infosecurity%20Magazine%3A%20Financial%20services%20breaches%3C%2FP%3E%0A%3CP%3E%3CA%20href%3D%22%23_ftnref3%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%20name%3D%22_ftn3%22%3E%3CSPAN%3E%5B3%5D%3C%2FSPAN%3E%3C%2FA%3E%20Infosecurity%20Magazine%3A%20Healthcare%20data%20breaches%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-TEASER%20id%3D%22lingo-teaser-1534451%22%20slang%3D%22en-US%22%3E%3CP%3EEnhanced%20protection%20for%20highly%20sensitive%20data%20to%20meet%20specialized%20requirements%3C%2FP%3E%3C%2FLINGO-TEASER%3E%3CLINGO-LABS%20id%3D%22lingo-labs-1534451%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3EInformation%20Protection%20%26amp%3B%20Governance%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E
Microsoft

The prevalence of remote work in today’s environment relies heavily on the sharing of information, challenging organizations to drive productivity while maintaining data privacy and regulatory compliance. Organizations in highly regulated industries such as financial services and healthcare face additional challenges. Some of their data (e.g., trade secrets, patents, and financial algorithms) needs the highest level of protection and controls. Failure to protect this mission-critical data not only tarnishes a company’s reputation, but can lead to a loss of customer trust and cost millions of dollars. It is more important than ever to maintain control of your highly sensitive data and prevent third-party access to it.

 

Microsoft 365 provides built-in data protection by encrypting customer data, both at rest and in transit. For added protection, we encrypt customer data at the application layer and provide flexible key management solutions. Customers can further protect their data based on content using Microsoft Information Protection’s classification and labeling capabilities. Adding to our data protection solutions, we are pleased to announce the public preview of Double Key Encryption for Microsoft 365. Double Key Encryption helps organizations protect their mission-critical data - a small volume of their overall data.

 

Highly regulated industries are increasingly focused on enhancing their data protection and privacy programs due to the rising threat of data breaches and identity theft[1]. In 2019, more than 60 percent of all leaked records exposed were those of financial services organizations[2], and healthcare organizations saw a 37 percent increase in data breaches[3]. With Microsoft Information Protection, we provide customers with a broad set of capabilities that helps them meet most of their data protection needs for organization-wide data. With Double Key Encryption for Microsoft 365, we now enhance the depth of protection for highly sensitive data to meet specialized requirements.

 

Double Key Encryption enables you to protect your highly sensitive data while keeping full control of your encryption key. It uses two keys to protect your data—one key in your control, and a second key is stored securely in Microsoft Azure. Viewing data protected with Double Key Encryption requires access to both keys. Since Microsoft can access only one of these keys, your protected data remains inaccessible to Microsoft, ensuring that you have full control over its privacy and security.  

 

With Double Key Encryption, you can:

  • Maintain full control of your key
  • Enjoy a consistent labeling experience
  • Simplify deployment

 

Maintain full control of your key

You can host the Double Key Encryption service used to request your key, in a location of your choice (on-premises key management server or in the cloud) and maintain it as you would any other application. Double Key Encryption puts you in control by providing you the ability to add necessary access controls to the Double Key Encryption service, and the flexibility to store the encrypted data on-premises or in the cloud. You can move your highly sensitive data to the cloud and be confident about preventing third-party access as you maintain full control of your key. Double Key Encryption allows you to store your data and key in the same location and help meet regulatory requirements across several regulations and standards such as the General Data Protection Regulation (GDPR), the Health Insurance Portability and Accountability Act (HIPAA), the Gramm-Leach-Bliley Act (GLBA), Russia’s data localization law – Federal Law No. 242-FZ, Australia’s Federal Privacy Act 1988, and New Zealand’s Privacy Act 1993.

 

Enjoy a consistent labeling experience

Storing your highly sensitive data in an on-premises infrastructure typically results not only in high costs, but an inconsistent user experience across different systems. Double Key Encryption uses the Azure Information Protection unified labeling client to provide a consistent labeling experience across your data estate. Admins and users with required permissions can create labels with Double Key Encryption in the Microsoft 365 compliance center, just like they can for any other sensitivity label type. Once the label is created, admins can assign policies to the labels in the Microsoft 365 compliance center. Users can protect their data by selecting the Double Key Encrypted label in the Sensitivity ribbon in Microsoft Office, providing a consistent experience.

 

DKE pic 1.png

 Figure 1: Creating a label with Double Key Encryption in the Microsoft 365 compliance center

 

DKE pic 3.png

 Figure 2: Labeling with Double Key Encryption in Word

 

Simplify deployment

Organizations often store their mission-critical data on-premises to maintain control and prevent unauthorized access. Implementing on-premises data storage and protection solutions warrants heavy investments in talent and resources to deploy, integrate, and maintain the complicated infrastructure. We are simplifying the deployment process for the Double Key Encryption service by providing implementation code with detailed instructions. You can access the code and instructions by cloning the Double Key Encryption repository from GitHub and update it with your tenant or on-premises Active Directory and public and private keys. Once your Double Key Encryption service is deployed and verified, you will be ready to create labels and protect your mission-critical data.

 

Get started today

Double Key Encryption is available as part of the Microsoft 365 E5 and Office 365 E5 suite. If you don’t have a Microsoft 365 E5 license, you can sign up for a trial. To get started with Double Key Encryption, navigate to GitHub to clone this repository and set up the Double Key Encryption service. To learn more, see this documentation on Double Key Encryption.

 

[1] Cap Gemini: Data privacy in financial services industry

[2] Infosecurity Magazine: Financial services breaches

[3] Infosecurity Magazine: Healthcare data breaches

 

3 Comments
Occasional Contributor

@Benjy Levin Is this applicable to only documents labelled using "Data Classification" or Emails as well ? 

Regular Visitor

 

@dipendas1979

MIP and OME uses the same RMS service in the background for protection/encryption. You should be able to deploy the Sensitivity Label, that uses the Double Key Encryption (I expect it's an RMS Template) to Exchange Online.
But keep in mind that this will be very tricky with external receipients, as you will need to authorize them to access your key to be able to read encrypted mails. Not sure you want that though :)

For Emails, I think it is better to stay with OME and/or S/MIME (for internal receipients, which actually is the most safe option in regards to third party access to encrypted mails compared to OME = RMS with MS Managed Key)

Occasional Visitor

Is this an development based on "Customer Key"? Will it replace "Customer Key"?