Skip to content

Commit 76d5d19

Browse files
committed
sc-401 intro module
1 parent b3fe669 commit 76d5d19

12 files changed

+232
-7
lines changed
Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,15 @@
1+
### YamlMime:ModuleUnit
2+
uid: learn.wwl.purview-protect-sensitive-data.data-protection-need
3+
title: The growing need for data protection
4+
metadata:
5+
title: The growing need for data protection
6+
description: "The growing need for data protection."
7+
ms.date: 03/10/2025
8+
author: wwlpublish
9+
ms.author: riswinto
10+
ms.topic: unit
11+
azureSandbox: false
12+
labModal: false
13+
durationInMinutes: 5
14+
content: |
15+
[!include[](includes/data-protection-need.md)]

learn-pr/wwl-sci/purview-protect-sensitive-data/includes/data-protection-need.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -8,16 +8,16 @@ Cybersecurity and Infrastructure Security Agency's (CISA) _Insider Threats 101_
88

99
Examples of data security risks include:
1010

11-
- **MOVEit Data Breach:** In June 2023, a vulnerability in the MOVEit file transfer software led to cyberattacks affecting thousands of organizations and nearly 100 million individuals, including major corporations and government agencies. This breach highlighted the risks of unprotected sensitive data. ([Wikipedia](https://en.wikipedia.org/wiki/2023_MOVEit_data_breach))
12-
- **Social Engineering Attacks:** ENISA's report highlights a sharp rise in Business Email Compromise (BEC), where attackers manipulate employees into disclosing sensitive data. Without proper security controls, unauthorized data exposure can lead to fraud, identity theft, and corporate espionage.
13-
- **Data Leaks and Misconfigurations:** Unintentional data exposure remains a major issue, as noted in ENISA's findings. Security misconfigurations and lack of visibility over sensitive data can lead to breaches, making it essential to implement policies that restrict unauthorized access.
11+
- **MOVEit Data Breach**: In June 2023, a vulnerability in the MOVEit file transfer software was exploited in a series of cyberattacks. These attacks affected thousands of organizations and nearly 100 million individuals, including major corporations and government agencies. This breach highlighted the risks of unprotected sensitive data. ([Wikipedia](https://en.wikipedia.org/wiki/2023_MOVEit_data_breach))
12+
- **Social Engineering Attacks**: ENISA's report highlights a sharp rise in Business Email Compromise (BEC), where attackers manipulate employees into disclosing sensitive data. Without proper security controls, unauthorized data exposure can lead to fraud, identity theft, and corporate espionage.
13+
- **Data Leaks and Misconfigurations**: Unintentional data exposure remains a major issue, as noted in ENISA's findings. Security misconfigurations and lack of visibility over sensitive data can lead to breaches, making it essential to implement policies that restrict unauthorized access.
1414

1515
## Risks organizations face
1616

17-
- **External threats:** Cyberattacks, phishing, and data breaches expose sensitive information and can cause financial and reputational damage.
18-
- **Insider risks:** Employees and contractors might unintentionally or maliciously leak data, making access controls and monitoring essential.
19-
- **Compliance challenges:** Regulations like GDPR and HIPAA impose strict requirements for data security and privacy, with severe penalties for noncompliance.
20-
- **AI security risks:** As organizations adopt AI-driven tools, they must ensure that sensitive data isn't used or exposed in ways that could violate security policies. AI-generated content can introduce security gaps if not properly managed.
17+
- **External threats**: Cyberattacks, phishing, and data breaches expose sensitive information and can cause financial and reputational damage.
18+
- **Insider risks**: Employees and contractors might unintentionally or maliciously leak data, making access controls and monitoring essential.
19+
- **Compliance challenges**: Organizations must meet strict data security and privacy requirements set by industry standards, government policies, and regulatory frameworks, with significant consequences for noncompliance.
20+
- **AI security risks**: As organizations adopt AI-driven tools, they must ensure that sensitive data isn't used or exposed in ways that could violate security policies. AI-generated content can introduce security gaps if not properly managed.
2121

2222
## The need for a proactive approach
2323

Lines changed: 41 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,41 @@
1+
As AI adoption grows, organizations must secure the data used in AI-driven environments. Sensitive information can be exposed through AI models, generated content, or interactions with AI tools. A strong security approach ensures that AI enhances business operations without introducing data protection risks.
2+
3+
## Security concerns in AI environments
4+
5+
AI technologies rely on vast amounts of data to function effectively. Without proper security measures, organizations risk exposing sensitive data, generating inappropriate content, or failing to comply with privacy regulations.
6+
7+
### Protect sensitive data from unauthorized AI model training
8+
9+
AI models learn from data, but not all data should be used for training. Sensitive business information, personal data, and regulated data must be protected to prevent misuse.
10+
11+
To safeguard sensitive data, organizations can:
12+
13+
- **Implement Data Loss Prevention (DLP) policies** to prevent unauthorized data from being used in AI tools.
14+
- Use **Microsoft Purview Information Protection** to classify and label sensitive data, ensuring that it isn't inadvertently shared or processed by AI models.
15+
- Enforce **access controls and encryption** to restrict AI systems from accessing confidential information.
16+
17+
### Prevent AI tools from generating inappropriate or risky content
18+
19+
AI-generated content can introduce risks, including bias, misinformation, or unintended data exposure. Organizations need safeguards to monitor and control AI outputs.
20+
21+
Security teams can mitigate these risks by:
22+
23+
- Implement **AI governance policies** to define acceptable AI-generated content.
24+
- Use **content filtering tools** to prevent AI from producing inappropriate or noncompliant outputs.
25+
- Audit AI-generated content to ensure that it aligns with security and compliance standards.
26+
27+
### Ensure compliance with data privacy regulations when using AI
28+
29+
AI services must comply with industry regulations and corporate data protection policies. Improper use of AI can lead to compliance violations and legal consequences.
30+
31+
To maintain compliance:
32+
33+
- Monitor AI data processing activities to ensure regulatory adherence.
34+
- Apply data retention and deletion policies to AI-processed content.
35+
- Use Data Security Posture Management (DSPM) for AI to enforce security policies and manage AI-related risks.
36+
37+
### Implement AI data protection strategies
38+
39+
Organizations can strengthen AI security by integrating Microsoft Purview and Data Security Posture Management (DSPM) for AI to mitigate risks.
40+
41+
By securing AI-generated and AI-processed data, organizations can use AI's capabilities while maintaining data privacy, compliance, and security.
Lines changed: 49 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,49 @@
1+
### YamlMime:Module
2+
uid: learn.wwl.purview-protect-sensitive-data
3+
metadata:
4+
title: Prepare for Microsoft Purview Insider Risk Management
5+
description: "Prepare for Microsoft Purview Insider Risk Management."
6+
ms.date: 1/3/2025
7+
author: wwlpublish
8+
ms.author: riswinto
9+
ms.topic: module
10+
ms.service: purview
11+
hidden: false
12+
title: Prepare for Microsoft Purview Insider Risk Management
13+
summary: Discover strategies for planning and configuring Microsoft Purview Insider Risk Management to meet organizational needs and protect privacy.
14+
abstract: |
15+
After completing this module, you'll be able to:
16+
- Collaborate with stakeholders to prepare for insider risk management.
17+
- Understand what's needed to meet prerequisites for implementation.
18+
- Configure settings to align with compliance and privacy needs.
19+
- Explore how connecting tools and data sources enhances risk management.
20+
prerequisites: |
21+
- Understanding of insider risk concepts.
22+
- Familiarity with organizational compliance and privacy practices.
23+
iconUrl: /training/achievements/generic-badge.svg
24+
levels:
25+
- intermediate
26+
roles:
27+
- auditor
28+
- administrator
29+
- risk-practitioner
30+
products:
31+
- microsoft-purview
32+
- m365
33+
subjects:
34+
- information-protection-governance
35+
- security
36+
units:
37+
- learn.wwl.purview-protect-sensitive-data.introduction
38+
- learn.wwl.purview-protect-sensitive-data.data-protection-need
39+
- learn.wwl.purview-protect-sensitive-data.manage-sensitive-data-challenge
40+
- learn.wwl.purview-protect-sensitive-data.protect-data-zero-trust-world
41+
- learn.wwl.purview-protect-sensitive-data.understand-classification-protection
42+
- learn.wwl.purview-protect-sensitive-data.prevent-data-leaks-insider-threats
43+
- learn.wwl.purview-protect-sensitive-data.manage-respond-alerts-threats
44+
- learn.wwl.purview-protect-sensitive-data.protect-ai-data
45+
- learn.wwl.purview-protect-sensitive-data.knowledge-check
46+
- learn.wwl.purview-protect-sensitive-data.summary
47+
48+
badge:
49+
uid: learn.wwl.purview-protect-sensitive-data.badge
Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,15 @@
1+
### YamlMime:ModuleUnit
2+
uid: learn.wwl.purview-protect-sensitive-data.introduction
3+
title: Introduction
4+
metadata:
5+
title: Introduction
6+
description: "Introduction"
7+
ms.date: 03/10/2025
8+
author: wwlpublish
9+
ms.author: riswinto
10+
ms.topic: unit
11+
azureSandbox: false
12+
labModal: false
13+
durationInMinutes: 1
14+
content: |
15+
[!include[](includes/introduction.md)]
Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,15 @@
1+
### YamlMime:ModuleUnit
2+
uid: learn.wwl.purview-protect-sensitive-data.manage-respond-alerts-threats
3+
title: Manage security alerts and respond to threats
4+
metadata:
5+
title: Manage security alerts and respond to threats
6+
description: "Manage security alerts and respond to threats."
7+
ms.date: 03/10/2025
8+
author: wwlpublish
9+
ms.author: riswinto
10+
ms.topic: unit
11+
azureSandbox: false
12+
labModal: false
13+
durationInMinutes: 5
14+
content: |
15+
[!include[](includes/manage-respond-alerts-threats.md)]
Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,15 @@
1+
### YamlMime:ModuleUnit
2+
uid: learn.wwl.purview-protect-sensitive-data.manage-sensitive-data-challenge
3+
title: The challenges of managing sensitive data
4+
metadata:
5+
title: The challenges of managing sensitive data
6+
description: "The challenges of managing sensitive data."
7+
ms.date: 03/10/2025
8+
author: wwlpublish
9+
ms.author: riswinto
10+
ms.topic: unit
11+
azureSandbox: false
12+
labModal: false
13+
durationInMinutes: 4
14+
content: |
15+
[!include[](includes/manage-sensitive-data-challenge.md)]
Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,15 @@
1+
### YamlMime:ModuleUnit
2+
uid: learn.wwl.purview-protect-sensitive-data.prevent-data-leaks-insider-threats
3+
title: Prevent data leaks and insider threats
4+
metadata:
5+
title: Prevent data leaks and insider threats
6+
description: "Prevent data leaks and insider threats."
7+
ms.date: 03/10/2025
8+
author: wwlpublish
9+
ms.author: riswinto
10+
ms.topic: unit
11+
azureSandbox: false
12+
labModal: false
13+
durationInMinutes: 4
14+
content: |
15+
[!include[](includes/prevent-data-leaks-insider-threats.md)]
Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,15 @@
1+
### YamlMime:ModuleUnit
2+
uid: learn.wwl.purview-protect-sensitive-data.protect-ai-data
3+
title: Protect AI-generated and AI-processed data
4+
metadata:
5+
title: Protect AI-generated and AI-processed data
6+
description: "Protect AI-generated and AI-processed data."
7+
ms.date: 03/10/2025
8+
author: wwlpublish
9+
ms.author: riswinto
10+
ms.topic: unit
11+
azureSandbox: false
12+
labModal: false
13+
durationInMinutes: 4
14+
content: |
15+
[!include[](includes/protect-ai-data.md)]
Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,15 @@
1+
### YamlMime:ModuleUnit
2+
uid: learn.wwl.purview-protect-sensitive-data.protect-data-zero-trust-world
3+
title: Protect data in a Zero Trust world
4+
metadata:
5+
title: Protect data in a Zero Trust world
6+
description: "Protect data in a Zero Trust world."
7+
ms.date: 03/10/2025
8+
author: wwlpublish
9+
ms.author: riswinto
10+
ms.topic: unit
11+
azureSandbox: false
12+
labModal: false
13+
durationInMinutes: 3
14+
content: |
15+
[!include[](includes/protect-data-zero-trust-world.md)]

0 commit comments

Comments
 (0)