{"id":9160,"date":"2023-07-17T07:59:57","date_gmt":"2023-07-17T14:59:57","guid":{"rendered":"https:\/\/www.microsoft.com\/insidetrack\/blog\/?p=9160"},"modified":"2023-07-17T08:18:15","modified_gmt":"2023-07-17T15:18:15","slug":"microsoft-creates-self-service-sensitivity-labels-in-microsoft-365","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/insidetrack\/blog\/microsoft-creates-self-service-sensitivity-labels-in-microsoft-365\/","title":{"rendered":"Microsoft creates self-service sensitivity labels in Microsoft 365"},"content":{"rendered":"

\"MicrosoftEmpowering self-service is important to us at Microsoft. Every employee should be able to create the resources they need without engaging IT to do it for them. To support this level of freedom, we rely on a strong governance strategy to identify and protect valuable content. By ensuring accountability, our employees are able to create the containers and content they need to stay productive.<\/p>\n

With sensitivity labels, Microsoft Digital Employee Experience (MDEE), the organization that supports, protects, and empowers the company, can now proactively enforce policies to keep shared workspaces safe. Microsoft 365 groups, SharePoint sites, Teams, Viva Engage communities, and any container used throughout Microsoft now utilize sensitivity labels to identify and proactively protect valuable information. In doing so, Microsoft can strengthen self-service without exposing sensitive information.<\/p>\n

What sensitivity labels mean for Microsoft<\/h2>\n

Regardless of the technology behind it, labels represent a visual cue to people interacting with a shared workspace or document. Labels can inform an enterprise\u2019s governance practices, letting the organization describe the landscape to properly manage it and enact the right policies.<\/p>\n

At Microsoft, labels enable our employees to identify different degrees of value. Based on the label, we can apply the right amount of protection.<\/p>\n

Previously, when a Microsoft employee created a new group a Microsoft Azure Active Directory (AAD) label would help classify it, denoting who should have access to the shared workspace according to Microsoft\u2019s policies. On its own, an AAD label doesn\u2019t do anything; it\u2019s simply a string of descriptive text incapable of enforcement. Custom scripts run by administrators would apply policy rules based on these AAD labels. As a consequence of the gap between classification and enforcement, users could accidentally ignore the policies, creating circumstances where the group is out of compliance. Once the non-compliant container is recognized and remediated by the custom solutions, the user might be surprised or disrupted by enforcement actions taken to protect and secure the workspace.<\/p>\n

In moving to sensitivity labels, we in MDEE are able to further empower users with compliant self-service right out of the box. Enforcement happens through sensitivity labels, so users are never disrupted or required to take additional compliance actions; they have a clear understanding of classification from the start, creating a better user experience while protecting the enterprise. The migration allows the organization to retire several custom solutions that are no longer necessary. Sensitivity labels have also enabled us to unify content and container classifications, creating consistent taxonomy and the opportunity for centralized administration.<\/p>\n

Labels define the culture<\/h3>\n

Applying labels to a workspace not only informs the organization as to what a site or container is, but drives a culture of good governance. To have a successful implementation of sensitivity labels, MDEE built strong, meaningful, and self-explanatory labels. Alignment with partners at Microsoft Digital Security and Resilience (DSR) meant labels could communicate the level of sensitivity in the workplace or document without a technical explanation.<\/p>\n

At Microsoft, we use four labels for container and file classification:<\/p>\n