How to implement Azure SQL Data DiscoveryĬustomer Security Stakeholders ( Learn more):ĭP-2: Monitor anomalies and threats targeting sensitive data CIS Controls v8 ID(s). Tag sensitive information using Azure Information Protection.Label your sensitive data using Microsoft Purview.Use tools to discover, classify and label the in- scope sensitive data.Īzure Guidance: Use tools such as Microsoft Purview, Azure Information Protection and Azure SQL Data Discovery and Classification to centrally scan, classify and label the sensitive data that reside in the Azure, on-premises, Microsoft 365, and other locations. Security Principle: Establish and maintain an inventory of the sensitive data, based on the defined sensitive data scope. Data Protection covers control of data protection at rest, in transit, and via authorized access mechanisms, including discover, classify, protect, and monitor sensitive data assets using access control, encryption, key and certificate management in Azure.ĭP-1: Discover, classify, and label sensitive data CIS Controls v8 ID(s)
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |