{"id":9160,"date":"2023-07-17T07:59:57","date_gmt":"2023-07-17T14:59:57","guid":{"rendered":"https:\/\/www.microsoft.com\/insidetrack\/blog\/?p=9160"},"modified":"2023-07-17T08:18:15","modified_gmt":"2023-07-17T15:18:15","slug":"microsoft-creates-self-service-sensitivity-labels-in-microsoft-365","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/insidetrack\/blog\/microsoft-creates-self-service-sensitivity-labels-in-microsoft-365\/","title":{"rendered":"Microsoft creates self-service sensitivity labels in Microsoft 365"},"content":{"rendered":"
Empowering self-service is important to us at Microsoft. Every employee should be able to create the resources they need without engaging IT to do it for them. To support this level of freedom, we rely on a strong governance strategy to identify and protect valuable content. By ensuring accountability, our employees are able to create the containers and content they need to stay productive.<\/p>\n
With sensitivity labels, Microsoft Digital Employee Experience (MDEE), the organization that supports, protects, and empowers the company, can now proactively enforce policies to keep shared workspaces safe. Microsoft 365 groups, SharePoint sites, Teams, Viva Engage communities, and any container used throughout Microsoft now utilize sensitivity labels to identify and proactively protect valuable information. In doing so, Microsoft can strengthen self-service without exposing sensitive information.<\/p>\n
Regardless of the technology behind it, labels represent a visual cue to people interacting with a shared workspace or document. Labels can inform an enterprise\u2019s governance practices, letting the organization describe the landscape to properly manage it and enact the right policies.<\/p>\n
At Microsoft, labels enable our employees to identify different degrees of value. Based on the label, we can apply the right amount of protection.<\/p>\n
Previously, when a Microsoft employee created a new group a Microsoft Azure Active Directory (AAD) label would help classify it, denoting who should have access to the shared workspace according to Microsoft\u2019s policies. On its own, an AAD label doesn\u2019t do anything; it\u2019s simply a string of descriptive text incapable of enforcement. Custom scripts run by administrators would apply policy rules based on these AAD labels. As a consequence of the gap between classification and enforcement, users could accidentally ignore the policies, creating circumstances where the group is out of compliance. Once the non-compliant container is recognized and remediated by the custom solutions, the user might be surprised or disrupted by enforcement actions taken to protect and secure the workspace.<\/p>\n
In moving to sensitivity labels, we in MDEE are able to further empower users with compliant self-service right out of the box. Enforcement happens through sensitivity labels, so users are never disrupted or required to take additional compliance actions; they have a clear understanding of classification from the start, creating a better user experience while protecting the enterprise. The migration allows the organization to retire several custom solutions that are no longer necessary. Sensitivity labels have also enabled us to unify content and container classifications, creating consistent taxonomy and the opportunity for centralized administration.<\/p>\n
Applying labels to a workspace not only informs the organization as to what a site or container is, but drives a culture of good governance. To have a successful implementation of sensitivity labels, MDEE built strong, meaningful, and self-explanatory labels. Alignment with partners at Microsoft Digital Security and Resilience (DSR) meant labels could communicate the level of sensitivity in the workplace or document without a technical explanation.<\/p>\n
At Microsoft, we use four labels for container and file classification:<\/p>\n
These definitions inform policies from a technological side, and once taxonomy was established, we were able to enforce consistent security policies across the company. From a user\u2019s perspective, understanding these terms is easier to comprehend than the underlying rules and settings behind the classifications. Labels are intended to support security without creating an extra burden for users. It\u2019s not always easy for users to understand the details of security, but they do understand constructs like \u201cGeneral,\u201d \u201cConfidential,\u201d and \u201cHighly Confidential.\u201d<\/p>\n
Aligning on label taxonomy also secured buy-in for company defaults. For some companies, governance policies are open by default, whereas Microsoft is closed.<\/p>\n
With the new sensitivity labels, container classification communicates four things:<\/p>\n
Prior to sensitivity labels, AAD tagged containers at a tenant level with document labeling being handled by security and compliance, or Microsoft Purview Information Protection. As a consequence, the two artifacts lived in two separate locations, requiring administrators to visit different sites for managing governance.<\/p>\n
The two locations also meant container labels worked a little differently than document labels. Where tenant-level AAD labels for a container would display an entire list of classifications, document labels only showed classifications that were appropriate to the user. Once unified, sensitivity labels for containers only populate appropriate classifications, limiting the list to valid labels for the users and groups.<\/p>\n
Shifting labels from AAD to Microsoft Purview Information Protection, where data-loss prevention and retention takes place, unified labels across the company, reduced the workload for administrators, and allowed Microsoft to take another step forward in readying the environment.<\/p>\n
By using terms for labels that mean something to people, label definition becomes intuitive and reinforces a culture of accountability. Establishing this level of awareness creates corporate buy-in. Getting the company to stand behind these specific label classifications not only supports a consistent experience, but informs corporate strategy decisions around privacy and sharing.<\/p>\n
Rationalizing a hierarchy of policies establishes where you are today and where you\u2019ll be tomorrow. Currently, there\u2019s no concept of inheritance between a container and its content. Labeling a workspace highly confidential does not pass that trait on to documents stored inside. In the future, however, unified taxonomy and centralized administration creates the opportunity for an efficient connection between the workspace\u2019s label and the classification of documents within.<\/p>\n
For some organizations, those coming from a green state with no existing AAD classifications in place, sensitivity labels can be easily onboarded, and offer a chance to introduce a strong culture of governance.<\/p>\n
But for companies like us at Microsoft, where existing AAD labels and custom governance solutions were already established, moving to sensitivity labels required preparation and alignment across the company before migration could occur.<\/p>\n
Onboarding sensitivity labels gave us an opportunity to create consistent classification language for containers. This entailed conversations about balancing employee experience and enablement with security and legal implications. Agreeing on taxonomy and selecting terms with meaning allowed us to protect the enterprise while empowering self-service.<\/p>\n