<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>Risk and Compliance topics</title>
    <link>https://techcommunity.microsoft.com/t5/risk-and-compliance/bd-p/risk-and-compliance</link>
    <description>Risk and Compliance topics</description>
    <pubDate>Sat, 25 Apr 2026 07:35:36 GMT</pubDate>
    <dc:creator>risk-and-compliance</dc:creator>
    <dc:date>2026-04-25T07:35:36Z</dc:date>
    <item>
      <title>Organisational vs model-level AI governance — where's the real gap?</title>
      <link>https://techcommunity.microsoft.com/t5/risk-and-compliance/organisational-vs-model-level-ai-governance-where-s-the-real-gap/m-p/4506510#M18</link>
      <description>&lt;P&gt;Most AI governance conversations I'm seeing focus on model-level controls, like bias testing and prompt&lt;/P&gt;&lt;P&gt;injection defence. These matter enormously for individual AI systems.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But I'd argue the bigger gap is one level up: the organisational governance layer. Having the policies,&lt;/P&gt;&lt;P&gt;accountability structures, risk frameworks, and oversight mechanisms to govern AI use at enterprise scale. Who is accountable for&lt;/P&gt;&lt;P&gt;AI-related decisions? Where is sensitive data being processed? What AI tools are actually being used across the business?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Forrester research indicates 60% of organisations still lack a formal AI governance framework. Meanwhile, the EU AI Act reaches&lt;/P&gt;&lt;P&gt;full compliance obligations in August 2026, and ISO/IEC 42001 is gaining traction as the certifiable benchmark for AI management&lt;/P&gt;&lt;P&gt;systems.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Microsoft is building strong technical solutions for the model-level challenge, Purview for data governance, Entra Agent ID, Defender for threat protection, Compliance Manager for regulatory mapping. But in my experience, organisations that jump straight to configuring technical controls without first understanding their organisational maturity end up with tools deployed but governance gaps unchanged.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Are we solving the right problem first?&lt;/P&gt;</description>
      <pubDate>Sat, 28 Mar 2026 18:14:11 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/risk-and-compliance/organisational-vs-model-level-ai-governance-where-s-the-real-gap/m-p/4506510#M18</guid>
      <dc:creator>MarcusHall</dc:creator>
      <dc:date>2026-03-28T18:14:11Z</dc:date>
    </item>
    <item>
      <title>Inbound Screening &amp; PCI-DSS</title>
      <link>https://techcommunity.microsoft.com/t5/risk-and-compliance/inbound-screening-pci-dss/m-p/4455891#M15</link>
      <description>&lt;P&gt;PCI-DSS frowns on having credit card numbers and related information in systems not otherwise in scope. Yet we sometimes have law enforcement asking for us for researching by these very terms; they send these sometimes via E-mail. I wonder therefore whether Exchange can screen using DLP policies, with the intent of adding controls, such as masking or adding "no forwarding, no printing," and so on. Possible? Advisable?&lt;/P&gt;</description>
      <pubDate>Mon, 22 Sep 2025 10:27:38 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/risk-and-compliance/inbound-screening-pci-dss/m-p/4455891#M15</guid>
      <dc:creator>scarbini</dc:creator>
      <dc:date>2025-09-22T10:27:38Z</dc:date>
    </item>
    <item>
      <title>STALE-FORGOTTEN/ABANDONED existing sensitive emails with sensitive information</title>
      <link>https://techcommunity.microsoft.com/t5/risk-and-compliance/stale-forgotten-abandoned-existing-sensitive-emails-with/m-p/4455467#M14</link>
      <description>&lt;P&gt;Hello team,&amp;nbsp;&lt;/P&gt;&lt;P&gt;In my company we have stale emails from 200 which contain sensitive data like: SINs, Driver Licenses, invoices, etc.&lt;BR /&gt;the users reject to delete those emails as they may needs for reference.&lt;BR /&gt;i.e.:&amp;nbsp;&lt;BR /&gt;Use case: HR needs to keep sensitive email as reference if end-user update life insurance beneficiaries, this email must be kept as evidence of the user's request update. this kind of emails can't be removed.&lt;BR /&gt;&lt;BR /&gt;However, this emails without protection in the user's mailbox is only meat for the attackers.&lt;/P&gt;&lt;P&gt;unfortunately, we can`t protect existing emails with auto-labeling.&lt;BR /&gt;&lt;BR /&gt;So, what is the best practice to take backup emails, secure the emails and remove those from un-secure storage like user`s mailbox.&lt;BR /&gt;&lt;BR /&gt;This case apply almost 100% to any organization, this is a problem for everyone.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;------------------------------------------------------------------------------------------------------------------------------------------&lt;BR /&gt;My approach:&lt;BR /&gt;eDiscovery download all sensitive emails discovered.&lt;BR /&gt;Apply label using AIP UL client to the download *.msg which put the files *.pfile&lt;BR /&gt;&lt;BR /&gt;Create folder in HR user's OneDrive which the email will be removed.&lt;BR /&gt;If the user needs to search for any email's metadata, he can search directly, or if they need to search using email's content, he manually should remove sensitivity label to all items inside the folder.&lt;BR /&gt;&lt;BR /&gt;After the search content in *.msg, the user should apply protection again.&lt;BR /&gt;&lt;BR /&gt;Fallback: If the user forget protect the sensitive emails, the idea is to run schedule script to check for *msg, if found, it will apply label using PS.&lt;BR /&gt;&lt;BR /&gt;I want to check any other approach best practice is recommended?&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Backup &amp;amp; Setup&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Global Admin (GA) prepares local backup: export saved as native *.msg files.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;STRONG&gt;Create &amp;amp; Secure the Evidence Folder&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;GA connects to user’s OneDrive.&lt;/LI&gt;&lt;LI&gt;GA creates folder: ArchivedSensitiveEmails.&lt;/LI&gt;&lt;LI&gt;GA applies retention label&amp;nbsp;(Record) to folder → prevents rename/move&lt;/LI&gt;&lt;LI&gt;GA breaks inheritance&amp;nbsp;→ only the OneDrive owner (Edit)&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;STRONG&gt;Upload &amp;amp; Protect&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;GA uploads the backup emails&amp;nbsp;(*.msg) into the new folder.&lt;/LI&gt;&lt;LI&gt;GA applies sensitivity label (Viewer-only)&amp;nbsp;→ user can open but not print/copy/forward.&lt;/LI&gt;&lt;LI&gt;Now all items are protected as *.msg.pfile.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;STRONG&gt;User Workflow (On-Demand Search)&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;User may remove protection&amp;nbsp;on a file/folder to perform keyword search on native .msg.&lt;/LI&gt;&lt;LI&gt;User is required to reapply protection&amp;nbsp;after finishing the search (via Purview client).&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;STRONG&gt;Automatic Weekly Enforcement&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Scheduled PowerShell job runs weekly&amp;nbsp;across all OneDrives.&lt;/LI&gt;&lt;LI&gt;Script scans ArchivedSensitiveEmails&amp;nbsp;folder&amp;nbsp;for unprotected .msg.&lt;/LI&gt;&lt;LI&gt;If found → automatically applies encryption&amp;nbsp;using the GA’s published sensitivity label.&lt;/LI&gt;&lt;LI&gt;Access rights: only the OneDrive owner (Viewer) — optional HR group can also be added.&lt;/LI&gt;&lt;LI&gt;Script deletes original .msg&amp;nbsp;after creating .msg.pfile&amp;nbsp;to enforce security.&lt;/LI&gt;&lt;LI&gt;CSV log maintained for audit of actions (protected, skipped, errors).&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;img /&gt;&lt;img /&gt;&lt;img /&gt;&lt;P&gt;&lt;BR /&gt;------------------------------------------------------------------------------------------------------------------------------------------&lt;BR /&gt;So, what is the best practice or recommendation from Microsoft to protect the existing sensitive emails?&lt;/P&gt;</description>
      <pubDate>Fri, 19 Sep 2025 16:03:45 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/risk-and-compliance/stale-forgotten-abandoned-existing-sensitive-emails-with/m-p/4455467#M14</guid>
      <dc:creator>sergioandreslq</dc:creator>
      <dc:date>2025-09-19T16:03:45Z</dc:date>
    </item>
    <item>
      <title>Deep Dive: Insider Risk Management in Microsoft Purview</title>
      <link>https://techcommunity.microsoft.com/t5/risk-and-compliance/deep-dive-insider-risk-management-in-microsoft-purview/m-p/4448101#M11</link>
      <description>&lt;P&gt;Hi everyone&amp;nbsp;&lt;/P&gt;&lt;P&gt;I recently explored the &lt;STRONG&gt;Insider Risk Management (IRM) workflow in Microsoft Purview&lt;/STRONG&gt; and how it connects across governance, compliance, and security. This end-to-end process helps organizations detect risky activities, triage alerts, investigate incidents, and take corrective action.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Key Phases in the IRM Workflow:&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;STRONG&gt;Policy:&lt;/STRONG&gt; Define rules to detect both accidental (data spillage) and malicious risks (IP theft, fraud, insider trading).&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;Alerts:&lt;/STRONG&gt; Generate alerts when policies are violated.&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;Triage:&lt;/STRONG&gt; Prioritize and classify alerts by severity.&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;Investigate:&lt;/STRONG&gt; Use dashboards, Content Explorer, and Activity Explorer to dig into context.&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;Action:&lt;/STRONG&gt; Take remediation steps such as user training, legal escalation, or SIEM integration.&lt;/LI&gt;&lt;/UL&gt;&lt;img /&gt;&lt;P&gt;Key takeaways from my lab:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Transparency is essential (balancing privacy vs. protection).&lt;/LI&gt;&lt;LI&gt;Integration across Microsoft 365 apps makes IRM policies actionable.&lt;/LI&gt;&lt;LI&gt;Defender + Purview together unify detection + governance for insider risk.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;This was part of my ongoing &lt;STRONG&gt;security lab series.&lt;/STRONG&gt;&lt;BR /&gt;Curious to hear from the community — how are you applying Insider Risk Management in your environments or labs?&lt;/P&gt;</description>
      <pubDate>Tue, 26 Aug 2025 02:12:45 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/risk-and-compliance/deep-dive-insider-risk-management-in-microsoft-purview/m-p/4448101#M11</guid>
      <dc:creator>Perparim_Abdullahu</dc:creator>
      <dc:date>2025-08-26T02:12:45Z</dc:date>
    </item>
    <item>
      <title>eDiscovery is NOT working correctly with KeyQL Sensitive Type</title>
      <link>https://techcommunity.microsoft.com/t5/risk-and-compliance/ediscovery-is-not-working-correctly-with-keyql-sensitive-type/m-p/4421494#M7</link>
      <description>&lt;P&gt;Hello team,&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;I am running in eDiscovery using KeyQL or Query builder data at REST in EXO (Stale emails) that contain sensitive Info like: Canada Social Insurance number.&lt;BR /&gt;&lt;BR /&gt;The query run correctly, however, the output statistics pull out other type of sensitive Info, this means that the eDiscovery is not discovering what is was requested in the KeyQL query.&lt;BR /&gt;&lt;BR /&gt;Canada Social Insurance Number&amp;nbsp; &amp;nbsp;a2f29c85-ecb8-4514-a610-364790c0773e&lt;BR /&gt;&lt;BR /&gt;KeyQL Query: (SensitiveType:a2f29c85-ecb8-4514-a610-364790c0773e|1..|85..100) AND Date&amp;gt;2025-01-01&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;img /&gt;&lt;P&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Please see the output of the Query:&lt;/P&gt;&lt;img /&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;img /&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;img /&gt;&lt;P&gt;In addition with this problem, Why we can't delete the stale emails using as condition the "Sensitive info", so, If I need to delete the emails before 2020 with "Canada Social Insurance number", how can I do it?&lt;BR /&gt;It will be almost impossible if the cybersecurity team needs to do with the end-user email by email?&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;img /&gt;&lt;P&gt;&lt;BR /&gt;Best regards,&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 06 Jun 2025 18:51:47 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/risk-and-compliance/ediscovery-is-not-working-correctly-with-keyql-sensitive-type/m-p/4421494#M7</guid>
      <dc:creator>sergioandreslq</dc:creator>
      <dc:date>2025-06-06T18:51:47Z</dc:date>
    </item>
    <item>
      <title>Microsoft Risky Business or Community?</title>
      <link>https://techcommunity.microsoft.com/t5/risk-and-compliance/microsoft-risky-business-or-community/m-p/4412675#M5</link>
      <description>&lt;P&gt;Verifying every access measure....&lt;/P&gt;&lt;P&gt;Zero Trust Architecture&amp;nbsp;&lt;/P&gt;&lt;P&gt;Identity &amp;amp; Access Management - How does Zero Trust enhance identity protection through tools like Microsoft Entra ID (formerly Azure AD)?&lt;/P&gt;&lt;P&gt;Threat Detection &amp;amp; Response - How does Zero Trust integrate with Microsoft Defender and Sentinel to provide real-time threat detection and response?&lt;/P&gt;&lt;P&gt;This is to implement every access measure that I have permission to provide.&lt;/P&gt;</description>
      <pubDate>Sun, 11 May 2025 21:53:55 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/risk-and-compliance/microsoft-risky-business-or-community/m-p/4412675#M5</guid>
      <dc:creator>ALeCroy0720</dc:creator>
      <dc:date>2025-05-11T21:53:55Z</dc:date>
    </item>
    <item>
      <title>Insights</title>
      <link>https://techcommunity.microsoft.com/t5/risk-and-compliance/insights/m-p/4392425#M2</link>
      <description>&lt;P&gt;"Hey everyone, I’d love to get your insights on managing risks and compliance effectively. What do you see as the key steps in ensuring a strong risk management and compliance framework? How do you approach identifying, assessing, and mitigating risks in your areas?"&lt;/P&gt;</description>
      <pubDate>Wed, 12 Mar 2025 13:41:25 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/risk-and-compliance/insights/m-p/4392425#M2</guid>
      <dc:creator>MarcP61</dc:creator>
      <dc:date>2025-03-12T13:41:25Z</dc:date>
    </item>
  </channel>
</rss>

