{"id":97860,"date":"2021-09-28T09:00:27","date_gmt":"2021-09-28T16:00:27","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/?p=97860"},"modified":"2023-05-15T22:57:51","modified_gmt":"2023-05-16T05:57:51","slug":"a-simpler-more-integrated-approach-to-data-governance","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/09\/28\/a-simpler-more-integrated-approach-to-data-governance\/","title":{"rendered":"A simpler, more integrated approach to data governance"},"content":{"rendered":"

It\u2019s no secret that the volume of data created by organizations and people multiplies daily. And, in the digital\u2014and hybrid work\u2014world we live in, that data is spread across more tools, platforms, devices, and clouds than ever before, creating regulatory challenges and security risks.<\/p>\n

Organizations must understand what data they have and where it lives, how it is used, and critically, how it\u2019s all governed.\u00a0How an organization stores its data and how long it is kept is not just a regulatory compliance issue, but also a security issue.<\/p>\n

Today, I\u2019m excited to share the general availability of Microsoft Azure Purview<\/a>, giving organizations that holistic understanding of their data that is so critically important. Azure Purview addresses the need for full visibility across all the places where your data lives, making it easier to manage, glean insights, and govern.<\/p>\n

Whether your data is housed on-premises in services like Microsoft SQL Server and Oracle, \u00a0different clouds like Amazon Web Services (AWS) S3, or software as a service (SaaS) applications like Salesforce, with Azure Purview you can easily create a unified map of your data assets and their relationships with automated data discovery and sensitive data classification, get insight into the location and movement of data across your hybrid landscape, and empower data consumers to find valuable data through a data catalog.<\/p>\n

For more details about Azure Purview, check out the Azure Purview blog<\/a> today.<\/p>\n

Simplifying data protection and governance management<\/h2>\n

Managing an organization\u2019s data from a protection and governance perspective can be simplified with Azure Purview and Microsoft Information Protection<\/a> (MIP). MIP is a built-in, intelligent, unified, and extensible solution to protect sensitive data in documents and emails across your organization. MIP provides a unified set of capabilities to know and protect your data and prevent data loss across Microsoft 365 apps (like Word, PowerPoint, Excel, and Outlook), services (like Microsoft Teams, SharePoint, Exchange, and Microsoft Power BI), on-premises locations (like SharePoint Server and on-premises files shares), devices, and third-party apps and services (like Box and Dropbox).<\/p>\n

Azure Purview integrates with MIP so that you can apply the same sensitivity labels defined in the Microsoft 365 Compliance Center to data assets in Azure Purview. This helps you have a comprehensive view of your data across your entire estate so you know where your sensitive data lies and can govern it accordingly.<\/p>\n

This integration also lets you write your policies once in MIP and apply them to Azure Purview. It lets you streamline and integrate governance and protection. Azure Purview and MIP share this capability. So, if you are already using MIP to apply sensitivity labels to data related to General Data Protection Regulation (GDPR), that label now applies to data governed in Azure Purview. From emails to databases, MIP and Azure Purview give you a simplified, integrated approach to governance.<\/p>\n

The journey to simplifying the complexity of data governance<\/h2>\n

For organizations to overcome the uncertainty of the safety of their data today\u2014not to mention the complexity of data regulations\u2014organizations must have a birds-eye view of all their data. Taking an integrated and more simplified approach to data governance will not only help you to better understand and analyze your data but also reduce your attack surface. In our environment today, this is a must.<\/p>\n

To learn more about Microsoft Security solutions,\u00a0visit our\u00a0website<\/a>.\u00a0Bookmark the\u00a0Security blog<\/a>\u00a0to keep up with our expert coverage on security matters. Also, follow us at\u00a0@MSFTSecurity<\/a>\u00a0for the latest news and updates on cybersecurity.<\/p>\n","protected":false},"excerpt":{"rendered":"

Today, I\u2019m excited to share the general availability of Microsoft Azure Purview, giving organizations that holistic understanding of their data that is so critically important. Azure Purview addresses the need for full visibility across all the places where your data lives, making it easier to manage, glean insights, and govern. <\/p>\n","protected":false},"author":106,"featured_media":97872,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"ms_queue_id":[],"ep_exclude_from_search":false,"_classifai_error":"","_classifai_text_to_speech_error":"","footnotes":""},"content-type":[3662],"topic":[3669],"products":[3710],"threat-intelligence":[],"tags":[],"coauthors":[2291],"class_list":["post-97860","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","content-type-news","topic-data-protection","products-microsoft-purview"],"yoast_head":"\nA simpler, more integrated approach to data governance | Microsoft Security Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/09\/28\/a-simpler-more-integrated-approach-to-data-governance\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"A simpler, more integrated approach to data governance | Microsoft Security Blog\" \/>\n<meta property=\"og:description\" content=\"Today, I\u2019m excited to share the general availability of Microsoft Azure Purview, giving organizations that holistic understanding of their data that is so critically important. Azure Purview addresses the need for full visibility across all the places where your data lives, making it easier to manage, glean insights, and govern.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/09\/28\/a-simpler-more-integrated-approach-to-data-governance\/\" \/>\n<meta property=\"og:site_name\" content=\"Microsoft Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2021-09-28T16:00:27+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-05-16T05:57:51+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2021\/09\/SUR22_Go3_Contextual_888_RGB.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"900\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Alym Rayani\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Alym Rayani\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/09\/28\/a-simpler-more-integrated-approach-to-data-governance\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/09\/28\/a-simpler-more-integrated-approach-to-data-governance\/\"},\"author\":[{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/alym-rayani\/\",\"@type\":\"Person\",\"@name\":\"Alym Rayani\"}],\"headline\":\"A simpler, more integrated approach to data governance\",\"datePublished\":\"2021-09-28T16:00:27+00:00\",\"dateModified\":\"2023-05-16T05:57:51+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/09\/28\/a-simpler-more-integrated-approach-to-data-governance\/\"},\"wordCount\":594,\"publisher\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/09\/28\/a-simpler-more-integrated-approach-to-data-governance\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2021\/09\/SUR22_Go3_Contextual_888_RGB.png\",\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/09\/28\/a-simpler-more-integrated-approach-to-data-governance\/\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/09\/28\/a-simpler-more-integrated-approach-to-data-governance\/\",\"name\":\"A simpler, more integrated approach to data governance | Microsoft Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/09\/28\/a-simpler-more-integrated-approach-to-data-governance\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/09\/28\/a-simpler-more-integrated-approach-to-data-governance\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2021\/09\/SUR22_Go3_Contextual_888_RGB.png\",\"datePublished\":\"2021-09-28T16:00:27+00:00\",\"dateModified\":\"2023-05-16T05:57:51+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/09\/28\/a-simpler-more-integrated-approach-to-data-governance\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/09\/28\/a-simpler-more-integrated-approach-to-data-governance\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/09\/28\/a-simpler-more-integrated-approach-to-data-governance\/#primaryimage\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2021\/09\/SUR22_Go3_Contextual_888_RGB.png\",\"contentUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2021\/09\/SUR22_Go3_Contextual_888_RGB.png\",\"width\":1200,\"height\":900,\"caption\":\"Adult female wearing Microsoft Modern USB-C Headset sitting at a desk while working on a Surface Go 3 with Surface Go Typecover in laptop mode with Microsoft Edge displayed. Microsoft Word is being presented on the large monitor.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/09\/28\/a-simpler-more-integrated-approach-to-data-governance\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"A simpler, more integrated approach to data governance\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\",\"name\":\"Microsoft Security Blog\",\"description\":\"Expert coverage of cybersecurity topics\",\"publisher\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization\",\"name\":\"Microsoft Security Blog\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png\",\"contentUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png\",\"width\":512,\"height\":512,\"caption\":\"Microsoft Security Blog\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"A simpler, more integrated approach to data governance | Microsoft Security Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/09\/28\/a-simpler-more-integrated-approach-to-data-governance\/","og_locale":"en_US","og_type":"article","og_title":"A simpler, more integrated approach to data governance | Microsoft Security Blog","og_description":"Today, I\u2019m excited to share the general availability of Microsoft Azure Purview, giving organizations that holistic understanding of their data that is so critically important. Azure Purview addresses the need for full visibility across all the places where your data lives, making it easier to manage, glean insights, and govern.","og_url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/09\/28\/a-simpler-more-integrated-approach-to-data-governance\/","og_site_name":"Microsoft Security Blog","article_published_time":"2021-09-28T16:00:27+00:00","article_modified_time":"2023-05-16T05:57:51+00:00","og_image":[{"width":1200,"height":900,"url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2021\/09\/SUR22_Go3_Contextual_888_RGB.png","type":"image\/png"}],"author":"Alym Rayani","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Alym Rayani","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/09\/28\/a-simpler-more-integrated-approach-to-data-governance\/#article","isPartOf":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/09\/28\/a-simpler-more-integrated-approach-to-data-governance\/"},"author":[{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/alym-rayani\/","@type":"Person","@name":"Alym Rayani"}],"headline":"A simpler, more integrated approach to data governance","datePublished":"2021-09-28T16:00:27+00:00","dateModified":"2023-05-16T05:57:51+00:00","mainEntityOfPage":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/09\/28\/a-simpler-more-integrated-approach-to-data-governance\/"},"wordCount":594,"publisher":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/09\/28\/a-simpler-more-integrated-approach-to-data-governance\/#primaryimage"},"thumbnailUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2021\/09\/SUR22_Go3_Contextual_888_RGB.png","inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/09\/28\/a-simpler-more-integrated-approach-to-data-governance\/","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/09\/28\/a-simpler-more-integrated-approach-to-data-governance\/","name":"A simpler, more integrated approach to data governance | Microsoft Security Blog","isPartOf":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/09\/28\/a-simpler-more-integrated-approach-to-data-governance\/#primaryimage"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/09\/28\/a-simpler-more-integrated-approach-to-data-governance\/#primaryimage"},"thumbnailUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2021\/09\/SUR22_Go3_Contextual_888_RGB.png","datePublished":"2021-09-28T16:00:27+00:00","dateModified":"2023-05-16T05:57:51+00:00","breadcrumb":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/09\/28\/a-simpler-more-integrated-approach-to-data-governance\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/09\/28\/a-simpler-more-integrated-approach-to-data-governance\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/09\/28\/a-simpler-more-integrated-approach-to-data-governance\/#primaryimage","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2021\/09\/SUR22_Go3_Contextual_888_RGB.png","contentUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2021\/09\/SUR22_Go3_Contextual_888_RGB.png","width":1200,"height":900,"caption":"Adult female wearing Microsoft Modern USB-C Headset sitting at a desk while working on a Surface Go 3 with Surface Go Typecover in laptop mode with Microsoft Edge displayed. Microsoft Word is being presented on the large monitor."},{"@type":"BreadcrumbList","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/09\/28\/a-simpler-more-integrated-approach-to-data-governance\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/"},{"@type":"ListItem","position":2,"name":"A simpler, more integrated approach to data governance"}]},{"@type":"WebSite","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/","name":"Microsoft Security Blog","description":"Expert coverage of cybersecurity topics","publisher":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization","name":"Microsoft Security Blog","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png","contentUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png","width":512,"height":512,"caption":"Microsoft Security Blog"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/"}}]}},"msxcm_display_generated_audio":false,"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Microsoft Security Blog","distributor_original_site_url":"https:\/\/www.microsoft.com\/en-us\/security\/blog","push-errors":false,"_links":{"self":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts\/97860","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/users\/106"}],"replies":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/comments?post=97860"}],"version-history":[{"count":0,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts\/97860\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/media\/97872"}],"wp:attachment":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/media?parent=97860"}],"wp:term":[{"taxonomy":"content-type","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/content-type?post=97860"},{"taxonomy":"topic","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/topic?post=97860"},{"taxonomy":"products","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/products?post=97860"},{"taxonomy":"threat-intelligence","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/threat-intelligence?post=97860"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/tags?post=97860"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/coauthors?post=97860"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}