SlideShare a Scribd company logo
Secure Collaboration: Start
classifying, labeling, and protecting
your (most valuable) data
Bram de Jager
Lead Architect - delaware
SPSNL17 - Secure Collaboration: Start classifying, labeling, and protecting your (most valuable) data - Bram de Jager
Challenges with the complex environment
Employees
Business partners
Customers
Apps
Devices
Data
Users
Data leaks
Lost device
Compromised identity
Stolen credentials
The problem is ubiquitous
Intellectual Property theft has
increased
56% rise data theft
Accidental or malicious breaches due
to lack of internal controls
88% of organizations are Losing control of
data
80% of employees admit to
use non-approved SaaS app 91% of breaches could have
been avoided
Organizations no longer confident in
their ability to detect and prevent threats
Saving files to non-approved cloud
storage apps is common
Unregulated,
unknown
Managed mobile
environment
How much control do you have?
On-premises
Perimeter
protection
Identity, device
management protection
Hybrid data = new normal
It is harder to protect
The evolution of Azure RMS
DOCUMENT
TRACKING
DOCUMENT
REVOCATION
Monitor &
respond
LABELINGCLASSIFICATION
Classification
& labeling
ENCRYPTION
Protect
ACCESS
CONTROL
POLICY
ENFORCEMENT
Azure Information
Protection DOCUMENT
TRACKING
DOCUMENT
REVOCATION
Monitor &
respond
LABELINGCLASSIFICATION
Classification
& labeling
ENCRYPTION
Protect
ACCESS
CONTROL
POLICY
ENFORCEMENT
Full Data
Lifecycle
Classify Data – Begin the Journey
SECRET
CONFIDENTIAL
INTERNAL
PUBLIC
IT admin sets policies,
templates, and rules
PERSONAL
Classify data based on sensitivity
Start with the data that is most
sensitive
IT can set automatic rules; users can
complement it
Associate actions such as visual
markings and protection
How Classification Works
Reclassification
You can override a
classification and
optionally be required
to provide a justification
Automatic
Policies can be set by IT
Admins for automatically
applying classification and
protection to data
Recommended
Based on the content you’re
working on, you can be
prompted with suggested
classification
User set
Users can choose to apply a
sensitivity label to the email
or file they are working on
with a single click
Apply labels based on classification
%##&$^#*!~@&
FINANCE
CONFIDENTIAL
%$^#*@&
Persistent labels that travel with the document
Labels are metadata written to documents
Labels are in clear text so that other
systems such as a DLP engine can read it
and a hash of policies, rules, and user
information
Protect data against unauthorized use
VIEW EDIT COPY PASTE
Email
attachment
FILE
Protect data needing protection by:
Encrypting data
Including authentication requirement and a
definition of use rights (permissions) to the data
Providing protection that is persistent and travels
with the data
Personal apps
Corporate apps
Demo
Set an information protection platform for your business - in minutes
Demo – scenarios
Manual and default labels
Label action: content marking & RMS protection
Conditions: Automatic & recommended
Setting your information protection policy in minutes (administration
experience)
Using variables in visual markings
• ${Item.Label} for the selected label. For example: Internal
• ${Item.Name} for the file name or email subject. For example: JulySales.docx
• ${Item.Location} for the path and file name for documents, and the email
subject for emails. For example: Sales2016Q3JulyReport.docx
• ${User.Name} for the owner of the document or email, by the Windows
signed in user name. For example: rsimone
• ${User.PrincipalName} for the owner of the document or email, by the Azure
Information Protection client signed in email address (UPN). For example:
rsimone@vanarsdelltd.com
• ${Event.DateTime} for the date and time when the selected label was set. For
example: 8/16/2016 1:30 PM
Azure Information Protection and SharePoint
SharePoint supports Information Rights Management, based on Azure RMS
Not “integrated” with Azure Information Protection (yet?)
Automation based on AIP SDK would be a option to auto apply labels
based on context
Align Data Loss Prevention with Azure Information Protection
Wrap-up
Azure Information Protection Premium P1/P2
Feature Azure Information
Protection Premium
P1 (EMS E3)
Azure Information
Protection Premium
P2 (EMS E5)
Manual labeling (user driven) Yes Yes
View labels and watermarks in Office Yes Yes
Apply content marking and RMS protection in Office Yes Yes
Automatic and recommended labeling (conditions) Yes
Classification, labeling and protection with MCAS Yes
HYOK (Hold your own key – multi RMS server support) Yes
Key takeaways
Azure Information Protection is about securing your data
Helps your organization to understand and really use business information
protection based on data classification
Think about compliancy for the General Data Protection Regulation (GDPR),
which is active as off May 25th 2018
Thank you!
@bramdejager
bram.dejager@delaware.pro
bramdejager.wordpress.com
Thanks for attending
SPSNL17 - Secure Collaboration: Start classifying, labeling, and protecting your (most valuable) data - Bram de Jager

More Related Content

PPTX
SPSNL17 - Securing Office 365 and Microsoft Azure like a rock star (or groupi...
PDF
From classification to protection of your data, secure your business with azu...
PDF
Protect your data in / with the Cloud
PDF
Secure Your Cloud Environment with Azure Active Directory (AD)
PPTX
Protect Identities and Access to resources with Azure Active Directory
PPTX
NIC 2017 Did you like Azure RMS? You will like Azure Information Protection e...
PPTX
Azure information protection
PPTX
Securing your Azure Identity Infrastructure
SPSNL17 - Securing Office 365 and Microsoft Azure like a rock star (or groupi...
From classification to protection of your data, secure your business with azu...
Protect your data in / with the Cloud
Secure Your Cloud Environment with Azure Active Directory (AD)
Protect Identities and Access to resources with Azure Active Directory
NIC 2017 Did you like Azure RMS? You will like Azure Information Protection e...
Azure information protection
Securing your Azure Identity Infrastructure

What's hot (19)

PDF
Modern Workplace Deep Dive infographic
PDF
Microsoft Cloud App Security CASB
PPTX
Azure security and Compliance
PPTX
Azure AD - Password attacks - logging and protections
PPTX
Make your Azure PaaS Deployment More Safe
PDF
Azure Information Protection
PPTX
Azure Global Bootcamp 2017 Azure AD Deployment
PPTX
Azure multi factor authentication - Global Azure bootcamp 2018 security
PPTX
Windows Advance Threats - BSides Amman 2019
PPTX
Cloud Reference Architecture - Part 1 Foundation
PDF
Microsoft Azure Rights Management
PPTX
Cloud App Security
PDF
SCOM 2007 & Audit Collection Services
PDF
SCU Berlín | Cloud identity for maximum productivity
PPTX
Rencore Webinar: Securing Office 365 and Microsoft Azure like a Rockstar
PPTX
EMS Diagram Click Through Web
PPTX
4 Modern Security - Integrated SecOps and incident response with MTP
PPTX
Secure hybrid workload with azure
PDF
O365Con18 - Exploring Conditional Access to content stored in Office 365 - Pa...
Modern Workplace Deep Dive infographic
Microsoft Cloud App Security CASB
Azure security and Compliance
Azure AD - Password attacks - logging and protections
Make your Azure PaaS Deployment More Safe
Azure Information Protection
Azure Global Bootcamp 2017 Azure AD Deployment
Azure multi factor authentication - Global Azure bootcamp 2018 security
Windows Advance Threats - BSides Amman 2019
Cloud Reference Architecture - Part 1 Foundation
Microsoft Azure Rights Management
Cloud App Security
SCOM 2007 & Audit Collection Services
SCU Berlín | Cloud identity for maximum productivity
Rencore Webinar: Securing Office 365 and Microsoft Azure like a Rockstar
EMS Diagram Click Through Web
4 Modern Security - Integrated SecOps and incident response with MTP
Secure hybrid workload with azure
O365Con18 - Exploring Conditional Access to content stored in Office 365 - Pa...
Ad

Similar to SPSNL17 - Secure Collaboration: Start classifying, labeling, and protecting your (most valuable) data - Bram de Jager (20)

PPTX
Secure Collaboration: Start classifying, labeling, and protecting your (most ...
PDF
O365Con18 - Classify, Label and Protect your Data with Azure Information Prot...
PDF
SPUnite17 Secure Collaboration with AIP
PDF
Emma Aubert | Information Protection
PDF
One name unify them all
PPTX
[IGNITE2018] [BRK2495] What’s new in Microsoft Information Protection solutio...
PDF
Microsoft 365 Enterprise Security with E5 Overview
PDF
Azure Information Protection for Data Protection with Microsoft AIP tool
PPTX
Primend praktiline konverents - Office 365 turvalisus
PDF
ECS19 - Bram De Jager - Design a secure collaboration solution with Azure In...
PDF
MSFT Cloud Architecture Information Protection
PPTX
Microsoft Information Protection: Your Security and Compliance Framework
PDF
Techorama - Shadow IT with Cloud Apps
PPTX
Labelling in Microsoft 365 - Retention & Sensitivity
PPT
HMSC_AD Event V3
PPSX
Value Microsoft 365 E5 English
PDF
Identity and Data protection with Enterprise Mobility Security in ottica GDPR
PPTX
Softchoice & Microsoft: Public Cloud Security Webinar
PDF
Get Ahead of Cyber Attacks with Microsoft Enterprise Mobility + Security
PPTX
Proteccion de datos contra pérdida de los mismos con MS365
Secure Collaboration: Start classifying, labeling, and protecting your (most ...
O365Con18 - Classify, Label and Protect your Data with Azure Information Prot...
SPUnite17 Secure Collaboration with AIP
Emma Aubert | Information Protection
One name unify them all
[IGNITE2018] [BRK2495] What’s new in Microsoft Information Protection solutio...
Microsoft 365 Enterprise Security with E5 Overview
Azure Information Protection for Data Protection with Microsoft AIP tool
Primend praktiline konverents - Office 365 turvalisus
ECS19 - Bram De Jager - Design a secure collaboration solution with Azure In...
MSFT Cloud Architecture Information Protection
Microsoft Information Protection: Your Security and Compliance Framework
Techorama - Shadow IT with Cloud Apps
Labelling in Microsoft 365 - Retention & Sensitivity
HMSC_AD Event V3
Value Microsoft 365 E5 English
Identity and Data protection with Enterprise Mobility Security in ottica GDPR
Softchoice & Microsoft: Public Cloud Security Webinar
Get Ahead of Cyber Attacks with Microsoft Enterprise Mobility + Security
Proteccion de datos contra pérdida de los mismos con MS365
Ad

More from DIWUG (12)

PPTX
SPSNL17 - Integratie van Microsoft Teams met het Bot Framework - Michael Homp...
PPTX
SPSNL17 - Be more effective with the PnP Provisioning Engine - Erwin van Hunen
PDF
SPSNL17 - Content publishing and communication strategies for Office 365 and ...
PPTX
SPSNL17 - How to solve Azure AD Connect sync issues - Arjan Cornelissen
PPTX
SPSNL17 - Introductie HoloLens - Augmented Reality in 2017 - Michiel Hamers
PDF
SPSNL17 - Adoption, I love it when a plan comes together - Katharina Schroeder
PPTX
SPSNL17 - Getting notified by SharePoint with the webhook functionality - Eli...
PPTX
SPSNL17 - Implementing SharePoint hybrid search, start to finish - Thomas Voc...
PPTX
SPSNL17 - Getting started with SharePoint development for the reluctant IT Pr...
PDF
SPSNL17 - Delivering the promise of Software as a Service with Hybrid solutio...
PPTX
SPSNL17 - Deep-dive building SharePoint Framework solutions - Albert-Jan Scho...
PPTX
SPSNL17 - The business & end-user guide into the new and modern SharePoint! -...
SPSNL17 - Integratie van Microsoft Teams met het Bot Framework - Michael Homp...
SPSNL17 - Be more effective with the PnP Provisioning Engine - Erwin van Hunen
SPSNL17 - Content publishing and communication strategies for Office 365 and ...
SPSNL17 - How to solve Azure AD Connect sync issues - Arjan Cornelissen
SPSNL17 - Introductie HoloLens - Augmented Reality in 2017 - Michiel Hamers
SPSNL17 - Adoption, I love it when a plan comes together - Katharina Schroeder
SPSNL17 - Getting notified by SharePoint with the webhook functionality - Eli...
SPSNL17 - Implementing SharePoint hybrid search, start to finish - Thomas Voc...
SPSNL17 - Getting started with SharePoint development for the reluctant IT Pr...
SPSNL17 - Delivering the promise of Software as a Service with Hybrid solutio...
SPSNL17 - Deep-dive building SharePoint Framework solutions - Albert-Jan Scho...
SPSNL17 - The business & end-user guide into the new and modern SharePoint! -...

Recently uploaded (20)

PPTX
L1 - Introduction to python Backend.pptx
PDF
wealthsignaloriginal-com-DS-text-... (1).pdf
PPTX
Transform Your Business with a Software ERP System
PDF
Design an Analysis of Algorithms II-SECS-1021-03
PPTX
ai tools demonstartion for schools and inter college
PDF
Which alternative to Crystal Reports is best for small or large businesses.pdf
PDF
System and Network Administration Chapter 2
PPTX
Introduction to Artificial Intelligence
PDF
Digital Systems & Binary Numbers (comprehensive )
PDF
Understanding Forklifts - TECH EHS Solution
PDF
Digital Strategies for Manufacturing Companies
PPTX
Oracle E-Business Suite: A Comprehensive Guide for Modern Enterprises
PDF
medical staffing services at VALiNTRY
PDF
Adobe Illustrator 28.6 Crack My Vision of Vector Design
PDF
Design an Analysis of Algorithms I-SECS-1021-03
PDF
Claude Code: Everyone is a 10x Developer - A Comprehensive AI-Powered CLI Tool
PPTX
Reimagine Home Health with the Power of Agentic AI​
PDF
PTS Company Brochure 2025 (1).pdf.......
PDF
Upgrade and Innovation Strategies for SAP ERP Customers
PDF
Internet Downloader Manager (IDM) Crack 6.42 Build 42 Updates Latest 2025
L1 - Introduction to python Backend.pptx
wealthsignaloriginal-com-DS-text-... (1).pdf
Transform Your Business with a Software ERP System
Design an Analysis of Algorithms II-SECS-1021-03
ai tools demonstartion for schools and inter college
Which alternative to Crystal Reports is best for small or large businesses.pdf
System and Network Administration Chapter 2
Introduction to Artificial Intelligence
Digital Systems & Binary Numbers (comprehensive )
Understanding Forklifts - TECH EHS Solution
Digital Strategies for Manufacturing Companies
Oracle E-Business Suite: A Comprehensive Guide for Modern Enterprises
medical staffing services at VALiNTRY
Adobe Illustrator 28.6 Crack My Vision of Vector Design
Design an Analysis of Algorithms I-SECS-1021-03
Claude Code: Everyone is a 10x Developer - A Comprehensive AI-Powered CLI Tool
Reimagine Home Health with the Power of Agentic AI​
PTS Company Brochure 2025 (1).pdf.......
Upgrade and Innovation Strategies for SAP ERP Customers
Internet Downloader Manager (IDM) Crack 6.42 Build 42 Updates Latest 2025

SPSNL17 - Secure Collaboration: Start classifying, labeling, and protecting your (most valuable) data - Bram de Jager

  • 1. Secure Collaboration: Start classifying, labeling, and protecting your (most valuable) data Bram de Jager Lead Architect - delaware
  • 3. Challenges with the complex environment Employees Business partners Customers Apps Devices Data Users Data leaks Lost device Compromised identity Stolen credentials
  • 4. The problem is ubiquitous Intellectual Property theft has increased 56% rise data theft Accidental or malicious breaches due to lack of internal controls 88% of organizations are Losing control of data 80% of employees admit to use non-approved SaaS app 91% of breaches could have been avoided Organizations no longer confident in their ability to detect and prevent threats Saving files to non-approved cloud storage apps is common
  • 5. Unregulated, unknown Managed mobile environment How much control do you have? On-premises Perimeter protection Identity, device management protection Hybrid data = new normal It is harder to protect
  • 6. The evolution of Azure RMS DOCUMENT TRACKING DOCUMENT REVOCATION Monitor & respond LABELINGCLASSIFICATION Classification & labeling ENCRYPTION Protect ACCESS CONTROL POLICY ENFORCEMENT
  • 7. Azure Information Protection DOCUMENT TRACKING DOCUMENT REVOCATION Monitor & respond LABELINGCLASSIFICATION Classification & labeling ENCRYPTION Protect ACCESS CONTROL POLICY ENFORCEMENT Full Data Lifecycle
  • 8. Classify Data – Begin the Journey SECRET CONFIDENTIAL INTERNAL PUBLIC IT admin sets policies, templates, and rules PERSONAL Classify data based on sensitivity Start with the data that is most sensitive IT can set automatic rules; users can complement it Associate actions such as visual markings and protection
  • 9. How Classification Works Reclassification You can override a classification and optionally be required to provide a justification Automatic Policies can be set by IT Admins for automatically applying classification and protection to data Recommended Based on the content you’re working on, you can be prompted with suggested classification User set Users can choose to apply a sensitivity label to the email or file they are working on with a single click
  • 10. Apply labels based on classification %##&$^#*!~@& FINANCE CONFIDENTIAL %$^#*@& Persistent labels that travel with the document Labels are metadata written to documents Labels are in clear text so that other systems such as a DLP engine can read it and a hash of policies, rules, and user information
  • 11. Protect data against unauthorized use VIEW EDIT COPY PASTE Email attachment FILE Protect data needing protection by: Encrypting data Including authentication requirement and a definition of use rights (permissions) to the data Providing protection that is persistent and travels with the data Personal apps Corporate apps
  • 12. Demo Set an information protection platform for your business - in minutes
  • 13. Demo – scenarios Manual and default labels Label action: content marking & RMS protection Conditions: Automatic & recommended Setting your information protection policy in minutes (administration experience)
  • 14. Using variables in visual markings • ${Item.Label} for the selected label. For example: Internal • ${Item.Name} for the file name or email subject. For example: JulySales.docx • ${Item.Location} for the path and file name for documents, and the email subject for emails. For example: Sales2016Q3JulyReport.docx • ${User.Name} for the owner of the document or email, by the Windows signed in user name. For example: rsimone • ${User.PrincipalName} for the owner of the document or email, by the Azure Information Protection client signed in email address (UPN). For example: rsimone@vanarsdelltd.com • ${Event.DateTime} for the date and time when the selected label was set. For example: 8/16/2016 1:30 PM
  • 15. Azure Information Protection and SharePoint SharePoint supports Information Rights Management, based on Azure RMS Not “integrated” with Azure Information Protection (yet?) Automation based on AIP SDK would be a option to auto apply labels based on context Align Data Loss Prevention with Azure Information Protection
  • 17. Azure Information Protection Premium P1/P2 Feature Azure Information Protection Premium P1 (EMS E3) Azure Information Protection Premium P2 (EMS E5) Manual labeling (user driven) Yes Yes View labels and watermarks in Office Yes Yes Apply content marking and RMS protection in Office Yes Yes Automatic and recommended labeling (conditions) Yes Classification, labeling and protection with MCAS Yes HYOK (Hold your own key – multi RMS server support) Yes
  • 18. Key takeaways Azure Information Protection is about securing your data Helps your organization to understand and really use business information protection based on data classification Think about compliancy for the General Data Protection Regulation (GDPR), which is active as off May 25th 2018