Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Initial Azure Purview Information Protection Overview Page - Ready to qa #52

Open
wants to merge 6 commits into
base: main
Choose a base branch
from

Conversation

elatiro77
Copy link
Contributor

No description provided.

@netlify
Copy link

netlify bot commented Jan 17, 2023

Deploy Preview for confident-wilson-c4de9b ready!

Name Link
🔨 Latest commit 22532da
🔍 Latest deploy log https://app.netlify.com/sites/confident-wilson-c4de9b/deploys/63fe22162858080008201cc8
😎 Deploy Preview https://deploy-preview-52--confident-wilson-c4de9b.netlify.app
📱 Preview on mobile
Toggle QR Code...

QR Code

Use your smartphone camera to open QR code link.

To edit notification comments on pull requests, go to your Netlify site settings.

Copy link
Collaborator

@chrisphilipov chrisphilipov left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Added some comments on the QA


Due to the nature of large organisations, various bits of sensitive data can end up scattered across on-premise servers, employee devices, cloud-native applications, third-party applications and many other resources. An illustrative diagram from Microsoft's [documentation](https://learn.microsoft.com/en-us/microsoft-365/compliance/information-protection?view=o365-worldwide) shows the high-level capabilities offered by Microsoft Purview Information Protection.

![](../images/PurviewOverview.png)
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

a general comment on the images is that they seem fairly small low-res versus the ones that are in the official documentation. Can we make sure that we get a better image if we're using and to ensure we also reference the page from which it comes from. I've tried to do that for the existing images but double check them.


### Sensitivity Labels

New and existing sensitivity labels can be found under the "Information Protection" tab on the compliance portal.
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Can we provide a link to that portal?

![](../images/InformationProtection.png)

The following actions can be achieved by labelling the data:
- Encrypt emails, meeting invites, and documents to prevent unauthorized people from accessing this data
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Do meeting invites also get marked by RMS? From what I'm aware they aren't and I can see a closed Issue discussing this also in 2021 but maybe it has changed MicrosoftDocs/Azure-RMSDocs#1363

The following actions can be achieved by labelling the data:
- Encrypt emails, meeting invites, and documents to prevent unauthorized people from accessing this data
- Mark created content when you use Office apps. This is done by adding watermarks, headers or footers to emails, meeting invites and documents that have a sensitivity label applied.
- Protect content stored in containers such as sites and groups when you enable the feature to use sensitivity labels with Microsoft Teams, Microsoft 365 groups, and SharePoint sites.
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

What do we mean by containers? We should avoid ambiguity even if it might be referred equally as ambiguously in specific parts of the documentation. I think its best we clarify exactly what features in Teams, SharePoint are affected than using containers as a synonym since it might introduce more confusion on what exactly we're talking about

- Mark created content when you use Office apps. This is done by adding watermarks, headers or footers to emails, meeting invites and documents that have a sensitivity label applied.
- Protect content stored in containers such as sites and groups when you enable the feature to use sensitivity labels with Microsoft Teams, Microsoft 365 groups, and SharePoint sites.
- Apply the label automatically to all files and emails, or recommend a label.
- Set the default sharing link type for SharePoint sites and individual documents.
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

From memory this is a native control in SharePoint as a whole so not sure how Purview fits into this one specifically. Maybe worth referencing how it expands on that?

Defines what data type labels will be applied to. As of now, there are three options available for selection:
- Items (includes emails and files)
- Groups & Sites (includes Teams, O365 groups as well as SharePoint sites)
- Schematised data assets (includes files and schematised data access in Data Map)
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

can we clarify what types of files this refers to? Since this might be more related to Azure SQL and the like that are integrated with the broader env


If the user opted for "Groups & Sites" under the scope configuration menu, this configuration will allow the user to define the protection setting for groups and data. This includes the level of access that internal and external users will have for O365 and Microsoft Teams groups, as well as sharing policies of SharePoint sites with external users.

Once a label is configured with the above policies, it must be published. Labels can be published to all or selected users and groups. Furthermore, the following settings are available prior to publication:
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Can we clarify that these are default settings that could be configured prior to publishing a label? Thus enforcing some extra security controls.


## Encryption

Purview Information Protection uses Azure Rights Management (RMS) to encrypt sensitive files and emails. RMS uses Azure AD credentials to validate whether the user has right access permissions to view the document. This applies to both internal and external users.
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

We should probably clarify that we mean it uses Azure AD authentication as part of the process to validate who has permissions to view the document. So effectively you can use a combined approach of Conditional Access policies and labels within Azure RMS to control who can do what.


![](../images/RMS.png)

Azure RMS uses the following cryptographic controls to encrypt the data which can be seen in the [document provided here](https://learn.microsoft.com/en-us/azure/information-protection/how-does-it-work#cryptographic-controls-used-by-azure-rms-algorithms-and-key-lengths):
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Is it possible for us to give a simplified overview or maybe a step diagram of the more in-depth process involved in using Azure RMS as described here (https://learn.microsoft.com/en-us/azure/information-protection/how-does-it-work#walkthrough-of-how-azure-rms-works-first-use-content-protection-content-consumption). If we can make a diagram it would make it a lot easier to understand and will give people a better understanding of how it handles encrypting their data.


![](../images/RMSCrypto.png)

Additionally, Azure RMS supports the following security, compliance, and regulatory requirements:
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Although the regulatory requirements are useful for some contexts can we also expand the section a bit to discuss the available security controls such as double key encryption and the whole difference between Customer and Managed keys for encryption in the service.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants