Microsoft Purview Information Protection program approach for Australian Government compliance with PSPF
This article is provided as part of the Australian Government Information Protection Guide and is intended to help organizations to navigate the range of scenarios and configuration options explored in the guide. The approach detailed in this article includes multiple incremental project stages intended to help organizations to rapidly improve their Protective Security Policy Framework (PSPF) maturity as they move through program stages.
The approach listed here also includes data security controls that are key to adherence with the Information Security Manual (ISM).
Stage 1: Microsoft Purview foundations
Desired outcomes - Microsoft Purview foundations
The purpose of stage one is to establish set of initial Microsoft Purview configurations that allow your organization to meet PSPF Policy 8 Core requirements, by allowing users to assess and mark sensitive or security classified information. Stage one also implements a base set of operational controls that protects information based on sensitivity.
Recommended inclusions | Sections |
---|---|
Establishment of a label taxonomy which aligns to PSPF Policy 8, including all sensitivity labels that users need to apply to items. | Sensitivity label taxonomy |
Sensitivity label configuration and deployment of labeling capabilities to users. | Sensitivity label configuration Sensitivity label policies |
Establishment of marking methods, including DLP policies that apply x-protective-marking x-headers and subject markings to email. | Email marking strategies |
Implementation of an initial set of DLP policies to monitor or control the flow of security classified information (including nonpermitted classifications). | Preventing inappropriate distribution of security classified information Preventing data spill via receipt of inappropriate classifications |
Implementation of templated DLP policies aligning with Australian data types to help identify and protect sensitive information regardless of the applied sensitivity label. | Utilizing DLP policy templates for controlling email of sensitive information |
Implementation of Sensitive Information Types (SITs) to assist with the identification of information based on applied protective markings. | Example SIT syntax to detect protective markings |
Implementation of auto-labeling configuration to identify protective markings applied to legacy items and recommend an appropriate label to the user. | Recommendations based on external agency markings Recommendations based on historical markings |
Implementation of auto-labeling policies to automatically apply sensitivity labels to items received from external entities where applied protective markings align with sensitivity label. This ensures that DLP and other label-based protections apply to received items and not just those generated internally. | Labeling of email during transport |
Stage 2: Know and protect information
Desired outcomes - Know and protect information
Implementation of capabilities to better identify sensitive information and ensure that relevant protections are applied.
Recommended inclusions | Sections |
---|---|
Implementation of label groups and sites configuration to allow for controls to be applied to SharePoint sites and Teams. | Sensitivity label groups & sites configuration |
Implementation of label meeting and calendar item configuration to extend PSPF concepts and data security controls through calendars. | Sensitivity labeling for calendar items and Teams meetings |
Identification of organizations key information assets and establishment of methods for its identification. These methods are likely to require the use of advanced classifiers, including custom sensitive information types, trainable classifiers, exact data match and/or document fingerprinting. | Custom Sensitive Information Types Exact data match sensitive information types Document fingerprinting Trainable Classifiers |
Implementation or enhancement of DLP policies to prevent the loss of identified sensitive information via advanced classification techniques. | Controlling email of custom SITs via DLP Limiting external chat containing sensitive content Controlling sharing of sensitive information through DLP |
Implementation of auto-labeling policies to recommend labels based on the detection of sensitive information. | Recommending labels based on sensitive content detection ecommendations based on external agency markings |
Potential implementation of extra sensitivity labels, along with required auto-labeling configurations, to allow for classifications applied by other jurisdictions to be maintained without reclassification. | Labels for organizations with differing label taxonomies |
Stage 3: Advanced controls and legacy locations
Desired outcomes - Advanced controls and legacy locations
Advanced controls to help ensure compliance and to further prevent the loss of sensitive or security classified information. This stage could also include the extension of controls to legacy items and locations.
Recommended inclusions | Sections |
---|---|
The labeling of sites, Teams, and groups that were in place before sensitivity label deployment. | SharePoint location and item sensitivity Teams location and item sensitivity |
The labeling of pre-existing items to bring them within the scope of label-based controls. | Labeling existing items at rest Automated labeling for non-Microcoft 365 locations |
Processes and strategies to act on potentially malicious activities surrounding labeled or otherwise sensitive items (for example, insider risk management, communication compliance, data out-of-place alerting). | Data out of place alerting Monitoring sensitive information with insider risk management Controlling sensitive information with Adaptive Protection Monitoring external chat via Communication Compliance |
Implementation of label-based Azure Rights Management encryption and strategies to ensure highly sensitive information is protected without impact to other services. | Sensitivity label encryption |
Extension of DLP policies and approaches to endpoints and cloud services (via EndPoint DLP and Defender for Cloud Apps). | Preventing the upload of security classified items to unmanaged locations Prevent download or printing of security classified items |