Information Protection Part 1

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or

Already have an account? Sign In »

Time
6 hours 59 minutes
Difficulty
Intermediate
CEU/CPE
7
Video Transcription
00:01
>> Welcome back cyberians to
00:01
the MS365 Security Administration course.
00:01
I'm your instructor Jim Daniels.
00:01
In this video, we're going to start
00:01
Module 4, MS365 Information Protection.
00:01
As you can see the lesson and
00:01
this particular part is
00:01
all about the information protection.
00:01
In this lesson, we're going to learn how
00:01
Microsoft technologies can help protect sensitive data.
00:01
We're going to learn about the MS365
00:01
information protection lifecycle,
00:01
as well as labeling persistence.
00:01
The information protection lifecycle and
00:01
the MS365 goes as follows; file is created,
00:01
it's edited, it's collaborated on,
00:01
maybe it get's opened up on a mobile device,
00:01
and it gets sent to other sharing services.
00:01
We want to protect
00:01
the information throughout all of these.
00:01
We want to protect it when it's created,
00:01
when it's edited,
00:01
other people come in,
00:01
even when it leaves
00:01
our environment or ethically leaves our environment.
00:01
We want to apply
00:01
intelligent protection for all of those scenarios.
00:01
We've seen this little overlap
00:01
and circle graph before when we talked
00:01
about network security and how it evolves out in IoT,
00:01
well this is the same thing.
00:01
However, this is about content and data.
00:01
On-premises, you have
00:01
ultimate protection of your own data.
00:01
You can actually go and touch the server,
00:01
touch the mass unit that it resides
00:01
on, configure active directory.
00:01
You've total control, that is
00:01
the equivalent of you having a remote.
00:01
After on-premises, it
00:01
expands into the managed mobile environment.
00:01
Maybe we are using Intune policies,
00:01
conditional access, we have
00:01
various identity device management protection applied.
00:01
After that is unregulated,
00:01
is unknown, is the new normal.
00:01
Shadow IT, there's
00:01
new apps being created on a daily basis.
00:01
We have to have protection to where it
00:01
extends out past our managed mobile environment.
00:01
Enter data classification.
00:01
When you classify data,
00:01
it makes it easy to apply
00:01
policies to base on those classifications.
00:01
A general rule of thumb
00:01
for planning data classification,
00:01
is to start with the most sensitive data.
00:01
That's why it needs protected
00:01
and that's why it needs to be labeled first and foremost.
00:01
You create automatic rules,
00:01
and you should associate
00:01
visual markings and protection actions.
00:01
If you have something rolled out organization-wide,
00:01
see how below,
00:01
red is confidential,
00:01
blue is public. You've seen this before.
00:01
Smokey the Bear, fire danger, Us Homeland Security.
00:01
As the colors get warmer,
00:01
is more confidential and more restricted.
00:01
As it gets cooler,
00:01
they are internal or is public.
00:01
The visual markings are key for your end-users.
00:01
User experience for data classification is,
00:01
you can have automatic to where
00:01
the policies are set by IT.
00:01
If a user types in something that triggers
00:01
the automatic protection policy, is labeled that way.
00:01
Reclassification, users can't override
00:01
the classification and be required for justification.
00:01
You can have automatic,
00:01
but you also can have or our users can
00:01
manually override
00:01
that automatic classification and provide justification.
00:01
Recommended, this is where
00:01
it intelligently looks what's in the document,
00:01
and it will recommend one that
00:01
complies with your policies or user set.
00:01
User has to apply to
00:01
sensitivity and classification labels themselves.
00:01
There is no right or wrong answer.
00:01
My organization is a combination of all of them.
00:01
It really depends on your user set,
00:01
how sensitive and valuable
00:01
the information is you're trying to
00:01
classify and protect and your culture.
00:01
Again, we talked about each organization's culture,
00:01
especially in security and what they expect
00:01
their end-users to do is totally different.
00:01
It varies across the board.
00:01
By using metadata,
00:01
labels are clear texts that can
00:01
be read by other DLP engines.
00:01
Labels stay with the document regardless of location,
00:01
to where before we mentioned to
00:01
where you had your on-premise,
00:01
you had your manage but then you had unregulated unknown.
00:01
The label stays with the content.
00:01
It stays with the document.
00:01
No matter whether that document goes on a G Drive,
00:01
it goes on a thumb drive,
00:01
it goes wherever, it stays with it.
00:01
Is persistence.
00:01
In this example, we have Bob.
00:01
Bob was super persistent.
00:01
The whole premise of the movie What About Bob,
00:01
it was just a measure in
00:01
the persistence that Bob had with Dr. Leo Marvin.
00:01
Regardless of where Dr. Marvin went
00:01
Bob was there, he was persistent.
00:01
The same applies to labels within MS365.
00:01
They are persistent. They travel with the document.
00:01
Quiz. When planning for data classification,
00:01
what should you start with
00:01
: Automatic rules and enforcement,
00:01
public data, sensitive data,
00:01
tool tips and override justification methods?
00:01
Which of those four areas should you first start
00:01
with when planning data classification?
00:01
Survey says C, sensitive data.
00:01
Remember, start with sensitive data
00:01
when you plan so that
00:01
way you start with the most restrictive and you ease up.
00:01
To recap today's lesson,
00:01
planning for data classification
00:01
always start with the most sensitive data.
00:01
Persistent labels utilize metadata,
00:01
which is clear text and can be read by
00:01
other DLP engines for
00:01
a unified and consistent experience.
00:01
Thank you for joining me for this lesson.
00:01
I hope to see you for the next one, take care.
Up Next