{"id":11169,"date":"2016-04-21T15:14:04","date_gmt":"2016-04-21T22:14:04","guid":{"rendered":"https:\/\/www.microsoft.com\/insidetrack\/blog\/?p=11169"},"modified":"2023-06-16T15:58:47","modified_gmt":"2023-06-16T22:58:47","slug":"monitoring-and-protecting-sensitive-data-in-office-365","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/insidetrack\/blog\/monitoring-and-protecting-sensitive-data-in-office-365\/","title":{"rendered":"Monitoring and protecting sensitive data in Office 365"},"content":{"rendered":"
This content has been archived, and while it was correct at time of publication, it may no longer be accurate or reflect the current situation at Microsoft.<\/p>\n<\/div>\n<\/div>\n
Microsoft IT created a solution to manage the risk of sharing sensitive data, while still promoting collaboration in Office 365. Power BI dashboards give insight into how Microsoft corporate users share information. This solution detects sensitive data sharing and helps Microsoft IT proactively manage and respond to information security risks.<\/p>\n
With Office 365, Microsoft corporate users can access and share data from anywhere, on any device, and be more productive by using all of its collaboration features. On the other hand, it\u2019s easier to inadvertently share sensitive information with others both inside and outside of the company.<\/p>\n
To manage security risk, Microsoft IT created a solution that uses the Office 365 Management Activity API and the data loss prevention (DLP) features of Office 365. The solution gathers data about sharing from Microsoft Exchange Online, SharePoint Online, OneDrive for Business, and Azure Active Directory. It also includes a custom governance solution to help protect data. Microsoft Power BI dashboards visualize the data to show how Microsoft corporate users share information.<\/p>\n
The dashboards help answer four business questions that have direct business impact on risk, and the answers help leadership make decisions that reduce risk. Microsoft IT uses an agile process to answer these questions:<\/p>\n
Microsoft IT tests hypotheses about how various policies and programs might improve users\u2019 sharing behavior and then check the dashboards to see if the behavior has changed. Besides dashboards, the solution improves sharing behavior by giving users visual cues about appropriate sharing. The solution automatically sends email to users who violate security policies by sharing too much, asking them to change their behavior. This helps manage and respond to information security risks.<\/p>\n
To protect valuable intellectual property, Microsoft has corporate policies for handling and sharing data. Using business rules based on these policies, the solution detects and reports when users share documents and if the sharing is in or out of compliance with the rules. For example, Microsoft data handling policy states that sensitive business information must be encrypted both at rest and in flight. And, when shared externally, users are accountable for who they share it with.<\/p>\n
The solution audits the following types of sharing:<\/p>\n
Regulated information<\/strong>. Regulated information includes government identification numbers such as social security numbers and passport numbers, financial data such as credit card numbers and financial records, or medical information. Regulated information must always be protected by encryption.<\/p>\n Business information<\/strong>. At Microsoft, sensitive business information is called High Business Impact (HBI) data. Users can store HBI data on SharePoint Online and OneDrive for Business if they comply with Microsoft policies for HBI data storage and transmission; however, to share HBI content externally, users must get a policy exception from the Microsoft IT security and privacy team.<\/p>\n Low Business Impact (LBI) and Medium Business Impact (MBI) data is permitted on SharePoint Online and OneDrive for Business with no special approval. Users must review all classifications to understand how to classify, protect, and handle data that they create, and ensure that it is properly categorized for use at Microsoft.<\/p>\n Inappropriate sharing occurs when users make information accessible to others in a way that violates information security policies. There\u2019s rarely malicious intent behind inappropriate data sharing. Rather, the main reasons for it are:<\/p>\n Users often don\u2019t grasp the implications of sharing information with many people. While some users\u00a0do <\/i>understand appropriate sharing, there are people who share all information indiscriminately.<\/p>\n Some common inappropriate sharing scenarios are:<\/p>\n Organizations subscribing to Office 365 can use DLP to detect regulated and sensitive information that users share. In addition, Office 365 provides audit data for all file-related events, such as open, upload, download, and delete. Organizations can access audit data through the Office 365 Security and Compliance Center and use search and PowerShell cmdlets to get different views. They can also use Office 365 APIs in custom solutions.<\/p>\n Microsoft IT wanted to do advanced analytics and statistical analysis on this raw data and give the results in a Microsoft Power BI dashboard. A custom solution was built to automatically detect, analyze, and report on sharing behavior. The solution uses the following types of information:<\/p>\n The main components of the technical solution are:<\/p>\n The following diagram shows the relationship between the different components of the solution. Arrows represent data flowing through the system.<\/p>\n To get audit data, the solution subscribes to the Office 365 Management Activity API webhook notification service. When new audit data is available, the webhook sends a notification to a webhook endpoint that hosts a custom API created by Microsoft IT. The API downloads the new audit data for Exchange Online, SharePoint Online, OneDrive for Business, and Azure Active Directory. The raw data goes to the webhook endpoint and then into Azure Blob Storage.<\/p>\n To acquire DLP data, the solution uses the Get-DlpDetailReport PowerShell cmdlet to move raw data to a staging database. To prepare it for further processing, the data goes to Data Factory, where it\u2019s extracted, transformed, and then loaded into HDInsight. HDInsight performs computations that aggregate the data into useful chunks, such as average number of DLP incidents. The solution then moves the data back into Data Factory, which then loads it into Blob Storage. Power BI uses the data in Blob Storage to generate reports, data graphics, and dashboards.<\/p>\n AutoSites reports on the number of sites that are misclassified, for example, when a site is classified as LBI or MBI, but has HBI information posted on it. AutoSites also reports on sites that have no classification at all.<\/p>\n The solution detects SharePoint site classification and correlates that information with DLP data and Machine Learning results to yield compliance information.<\/p>\n DLP in Office 365 notifies users when information they\u2019re working with is regulated. If a user attempts to share regulated information, sharing is blocked unless the user has a policy override.<\/p>\n Microsoft R Server allows Microsoft IT to perform advanced statistical analysis on the data to identify opportunities for further improvements in compliance.<\/p>\n Power BI dashboards answer four business questions about how information is shared at Microsoft, as described earlier. They give the security and privacy team and business leaders a view of how information is shared and how many users are out of compliance with corporate information security policies. The dashboards let the security and privacy team respond to risks in a timely manner and check the effectiveness of risk reduction programs.<\/p>\n They are most interested in how users share HBI information. The solution detects HBI information and aggregates this data into the dashboards, as follows:<\/p>\n Microsoft IT works closely with attorneys and privacy experts to make sure that the solution is ethical and that a balance is maintained between individual privacy and the organzation\u2019s needs for information security. Only authorized users can view the dashboards. Management and security team members get different views according to the type of information they need. Authorized dashboard users are:<\/p>\n Leadership looks at aggregated numbers and trends in the dashboards to see how well policies are working and the impact of policy changes. To learn when and where sensitive information is shared inappropriately, dashboard data is evaluated, such as:<\/p>\n They get some of this data from this summary dashboard:<\/p>\n This data shows that most sharing is appropriate. Less than 10 percent of SharePoint sites have externally shared content, even though many more are set up for it.<\/p>\n Another dashboard shows file operations.<\/p>\n The security team is most interested in HBI sharing and if the sharing is appropriate. Authorized users can drill down into the dashboards to get more detailed information, such as the groups sharing the most HBI information.<\/p>\n The following dashboard shows that few external users have access to HBI as compared to LBI and MBI.<\/p>\n While there are about 80,000 external users, most of the information shared with them is LBI. This means that employees are collaborating outside the company, which is desirable, but mostly with information that isn\u2019t highly sensitive.<\/p>\n The security team is more interested in sharing on SharePoint Online versus OneDrive for Business. Because the scope of sharing is broader on SharePoint sites, which often host group projects with multiple users, it\u2019s easier to inadvertently share too much. The security team prefers sharing on OneDrive for Business because users explicitly share a single document. The following figure shows that most sharing is, in fact, on OneDrive for Business.<\/p>\n The team also wants to know who does the most sharing. The next dashboard shows the distribution of sharing.<\/p>\n A DLP dashboard gives summary data and details about instances where regulated data is shared.<\/p>\n This dashboard reports the number of documents found daily that contain regulated data. Other DLP dashboards give the number of OneDrive for Business and SharePoint instances by user category\u2014employee, intern, or vendor\u2014and also file type.<\/p>\n The dashboards reveal that most users at Microsoft share HBI appropriately, in keeping with company policies. Even so, the less HBI shared, the lower the risk of sharing too much. The following dashboard shows sharing trends since 2014, when the solution was implemented.<\/p>\n At Microsoft, we expect employees to use good judgment and common sense\u2014and we want them to collaborate. Instead of shutting off their ability to share information, we believe it\u2019s more effective to teach them to avoid sharing too much. As an extra security step, if necessary, DLP may also prevent sharing of regulated and\/or sensitive business information.<\/p>\n The Microsoft IT solution influences and modifies users\u2019 sharing behavior in these ways:<\/p>\n AutoSites requires site owners to classify SharePoint sites according to the type of information that may be posted on it: LBI, MBI, or HBI. When creating a new site, the site owner picks the type. This applies the appropriate security settings to the site and labels it according to its classification. The levels of information are clearly defined in the user interface, as shown here.<\/p>\n When a site is created, it\u2019s labeled based on what the information type that the site owner specified: LBI, MBI, or HBI. This tells SharePoint Online users what type of information they should post. Users are expected to honor the classification and post only the type specified. If HBI information that is posted on a site labeled LBI or MBI or on a site that hasn\u2019t been labeled, AutoSites detects the classification and includes this information in a dashboard report.<\/p>\n A user who shares files inappropriately automatically receives a signal that helps teach them the desired behavior. A signal can be a Policy Tip or an email message. And, if necessary, the sensitive content is blocked.<\/p>\n DLP includes policies for sharing regulated information that administrators can use out of the box and customize for their specific company needs and region. Information covered under these policies includes credit card and social security numbers and their international equivalents. DLP displays Policy Tips in the user interface that inform users about potential policy violations. At Microsoft, Policy Tips display when the content of an Exchange Online email or a file that\u2019s been uploaded to a SharePoint site or OneDrive for Business doesn\u2019t comply with Microsoft sharing policies.<\/p>\n In addition, when a user posts a file on a SharePoint site or OneDrive for Business that contains regulated information, DLP displays an icon in line with the file that indicates the file contains regulated information. DLP also blocks other users from viewing or accessing the file unless the administrator has configured a policy override for the site. Microsoft IT has a business process for users to request this override.<\/p>\n Both DLP and AutoSites send email messages to users who share too much, as follows:<\/p>\n Rather than pointing out that users are doing something wrong, the AutoSites messages are positive. If a user doesn\u2019t change the sharing behavior on SharePoint or OneDrive for Business, AutoSites automatically delivers another message. If the user and the site owner still haven\u2019t corrected the issue after receiving three email messages, the site is locked down. If the site remains out of compliance, it is removed.<\/p>\n Training programs educate users about information security policies and how to handle sensitive business information. All employees receive formal security training and have access to reference information about information security policies. Microsoft IT also works with particular groups that share a lot of HBI information to make sure they\u2019re trained on how to handle it properly. One important thing the security team has learned is that all users are not alike when it comes to sharing information. There are the two extremes\u2014inappropriate sharing or not sharing at all. Then, there are the people who fall in the middle. This means that not all approaches and training programs will fit all users. Therefore, the information that the auditing and DLP solution provides about groups of users who share inappropriately makes it possible to tailor future training programs to just these people.<\/p>\n This section describes how the auditing and DLP solution is reducing information security risks at Microsoft.<\/p>\n Information security managers, service managers, and Microsoft IT take dashboard data to product teams. The data influences changes to services and features that improve information security. For example, a SharePoint Online service process was changed to require users to obtain permission before sharing HBI information externally. This process tells users about their responsibility to handle HBI information appropriately. It acts as an extra reminder that they\u2019re accountable for their actions.<\/p>\n Dashboard data is shared with service owners and works with them to reduce inappropriate sharing. So far, the number of HBI documents being shared has been reduced by about a third. In most cases, the issue was corrected when users got the required policy exception to post HBI information.<\/p>\n Decisions about securing information are no longer made based on guesses and gut feelings, but are informed by concrete data in reports.<\/p>\n When a strategy is implemented, its relative success or failure can be seen in the audit data. The strategy can be honed and audit results checked to see if the change was effective. This creates an ongoing process of improvement because the impacts of decisions are measurable.<\/p>\n Some users share too much\u2014others don\u2019t. Some are in the middle. Microsoft IT needed to account for the whole gamut of attitudes and behavior. They plan to target training to the users who need it the most.<\/p>\n DLP and auditing activities can have privacy implications around the world. Notice and consent are fundamental privacy principles that apply here, but before implementing these security controls be sure to check with your legal advisor and works councils in the European Union.<\/p>\n","protected":false},"excerpt":{"rendered":" This content has been archived, and while it was correct at time of publication, it may no longer be accurate or reflect the current situation at Microsoft. Microsoft IT created a solution to manage the risk of sharing sensitive data, while still promoting collaboration in Office 365. Power BI dashboards give insight into how Microsoft […]<\/p>\n","protected":false},"author":146,"featured_media":11171,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"_hide_featured_on_single":false,"_show_featured_caption_on_single":false,"footnotes":""},"categories":[1],"tags":[],"coauthors":[674],"class_list":["post-11169","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","m-blog-post"],"yoast_head":"\nHow users share too much<\/h3>\n
\n
\n
Detecting inappropriate sharing<\/h3>\n
\n
Technical solution components<\/h4>\n
\n
How the solution works<\/h2>\n
Reporting<\/h2>\n
\n
\n
Evaluating dashboard data<\/h3>\n
\n
Healthy collaboration\u2014with controls<\/h2>\n
Site classification and labeling<\/h3>\n
Signaling<\/h3>\n
Policy Tips<\/h4>\n
Email messages<\/h4>\n
\n
Training programs<\/h3>\n
How the solution reduces risk<\/h2>\n
Product design is improved<\/h3>\n
Fewer HBI documents are being shared<\/h3>\n
Executives can make informed decisions about security policy<\/h3>\n
Data security strategies are tuned based on actual data<\/h3>\n
Best practices<\/h2>\n
Account for diverse attitudes on information sharing<\/h3>\n
Verify regional privacy regulations<\/h3>\n