Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 16

AZURE

INFORMATION
PROTECTION
• CURRENT DATA COMPLEXITY
• WHAT IS AIP
• CLASSIFICATIONS IN AIP

Agenda • HOW LABELS PERSIST WITH THE DOCUMENT


• ADMINISTRATION OF LABELS
• LABEL IN ACTION
• CHANGING LABEL
• MONITOR INFORMATION PROTECTION EVENTS
• MONITOR DOCUMENT SHARING & ACCESS
• FULL DATA LIFECYCLE
• QUESTIONS
Azure Information Protection (AIP) is a cloud-based solution that
helps an organization to classify and optionally, protect its documents
and emails by applying labels.
CLASSIFICATIONS IN AIP
Automatic classification
• Policies can be set by IT Admins for automatically
applying classification and protection to data
Recommended classification
• Based on the content you’re working on, you can
be prompted with suggested classification
Manual reclassification
• You can override a classification and optionally
be required to provide a justification
User-specified classification
• Users can choose to apply a sensitivity label to
the email or file they are working on with a single
click
HOW LABELS PERSIST
WITH THE DOCUMENT
•Document labeling – what is it?
• Metadata written into document files
• Travels with the document as it moves
• In clear text so that other systems such as a DLP
engine can read it
• Used for the purpose of apply a protection action or
data governance action – determined by policy
• Can be customized per the organization’s needs
Administration of labels
Label in action
Changing label
Visibility
• Policy violations
MONITOR • Document access &
INFORMATION sharing
PROTECTION • App usage
• Anomalous activity
EVENTS FOR • End-user overrides
GREATER • False positive
CONTROL Take Action
• Tune & revise policies
• Revoke access
• Quarantine file
• Quarantine user
• Integrate into workflows
& SIEM
Know when policy is
MONITOR violated
• Incident report emails alert
DLP AND you in real time when
content violates policy
DATA See the effectiveness of

GOVERNAN your policies


• in reports help you see
CE EVENTS historical information and
tune policies
Integrates with other
systems
• Leverage the Activity
Management API to pull
information into SIEM
and workflow tools
MONITOR DOCUMENT
SHARING & ACCESS
Distribution visibility
• Analyze the flow of personal and sensitive
data and detect risky behaviors.
Access logging
• Track who is accessing documents and from
where.
Access revocation
• Prevent data leakage or misuse by changing
or revoking document access remotely.
Full data
lifecycle
Subscription
Questions
Thank you

You might also like