Skip to content

Commit 14b04a5

Browse files
Merge pull request #53321 from riswinto/purview-data-security-posture-management-understand
Purview data security posture management understand
2 parents 3dd0cfd + 041e65b commit 14b04a5

20 files changed

Lines changed: 578 additions & 0 deletions

learn-pr/wwl-sci/purview-data-security-investigations-understand/includes/data-security-investigation-understand.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,8 @@ For example, an alert might show a file was downloaded. An activity-based invest
44

55
A data security investigation exists to close that gap.
66

7+
8+
79
## How data security investigations differ from activity-based investigation
810

911
Traditional security investigation often starts with activity. An alert fires, a user performs an action, or a signal indicates something unusual. From there, the investigation focuses on timelines, indicators, and behavior.
Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,15 @@
1+
### YamlMime:ModuleUnit
2+
uid: learn.wwl.purview-data-security-posture-management-understand.data-security-objectives
3+
title: Data security objectives as the organizing model
4+
metadata:
5+
title: Data security objectives as the organizing model
6+
description: "Data security objectives as the organizing model"
7+
ms.date: 02/03/2026
8+
author: wwlpublish
9+
ms.author: riswinto
10+
ms.topic: unit
11+
azureSandbox: false
12+
labModal: false
13+
durationInMinutes: 5
14+
content: |
15+
[!include[](includes/data-security-objectives.md)]
Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,15 @@
1+
### YamlMime:ModuleUnit
2+
uid: learn.wwl.purview-data-security-posture-management-understand.data-security-posture-ai
3+
title: How AI is used inside DSPM
4+
metadata:
5+
title: How AI is used inside DSPM
6+
description: "How AI is used inside DSPM"
7+
ms.date: 02/03/2026
8+
author: wwlpublish
9+
ms.author: riswinto
10+
ms.topic: unit
11+
azureSandbox: false
12+
labModal: false
13+
durationInMinutes: 4
14+
content: |
15+
[!include[](includes/data-security-posture-ai.md)]
Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,15 @@
1+
### YamlMime:ModuleUnit
2+
uid: learn.wwl.purview-data-security-posture-management-understand.data-security-workflow-fit
3+
title: Where DSPM fits in the broader data security workflow
4+
metadata:
5+
title: Where DSPM fits in the broader data security workflow
6+
description: "Where DSPM fits in the broader data security workflow"
7+
ms.date: 02/03/2026
8+
author: wwlpublish
9+
ms.author: riswinto
10+
ms.topic: unit
11+
azureSandbox: false
12+
labModal: false
13+
durationInMinutes: 6
14+
content: |
15+
[!include[](includes/data-security-workflow-fit.md)]
Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,15 @@
1+
### YamlMime:ModuleUnit
2+
uid: learn.wwl.purview-data-security-posture-management-understand.evaluate-risk-posture
3+
title: How DSPM evaluates data risk and posture
4+
metadata:
5+
title: How DSPM evaluates data risk and posture
6+
description: "How DSPM evaluates data risk and posture"
7+
ms.date: 02/03/2026
8+
author: wwlpublish
9+
ms.author: riswinto
10+
ms.topic: unit
11+
azureSandbox: false
12+
labModal: false
13+
durationInMinutes: 5
14+
content: |
15+
[!include[](includes/evaluate-risk-posture.md)]
Lines changed: 67 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,67 @@
1+
Understanding posture tells you _where_ risk exists. The next challenge is deciding what to do about it.
2+
3+
In complex environments, risk signals don't arrive neatly grouped. They come from different tools, cover different workloads, and vary in urgency. Looking at each signal in isolation makes it hard to decide where to start or how to measure progress.
4+
5+
Data security objectives exist to solve that problem.
6+
7+
## Objectives as outcome-driven workflows
8+
9+
In data security posture management (DSPM), objectives are the primary way risk is organized and addressed. An objective represents a specific outcome related to data security, like reducing oversharing, limiting exposure, or strengthening protection for sensitive data.
10+
11+
:::image type="content" source="../media/objectives-as-outcomes.png" border="false" alt-text="Diagram showing objectives progressing through assess, identify, recommend, and validate steps over time." lightbox="../media/objectives-as-outcomes.png":::
12+
13+
Objectives aren’t checklists or static views. They function as workflows that link:
14+
15+
- Assessing current posture
16+
- Identifying gaps or risks
17+
- Recommending actions
18+
- Validating and reporting over time
19+
20+
This structure shifts the focus away from individual settings or alerts and toward measurable improvement.
21+
22+
## How objectives group assessment, action, and reporting
23+
24+
Each objective brings together information that would otherwise be spread across multiple solutions.
25+
26+
Instead of separately reviewing posture insights, policy gaps, and follow-up actions, objectives present these elements in context. You can see:
27+
28+
- why an objective exists
29+
- what signals are contributing to it
30+
- which actions are recommended
31+
- how changes affect posture over time
32+
33+
This grouping reduces the need to manually connect information across tools and makes it easier to understand how individual actions contribute to broader risk reduction.
34+
35+
## Why objectives replace navigating individual solutions
36+
37+
Traditional workflows often require moving between multiple Purview solutions to understand a single risk area. That approach works for targeted tasks, but it doesn’t scale well when risk spans data types, workloads, and usage patterns.
38+
39+
Objectives provide a higher-level entry point by shifting focus:
40+
41+
- From individual tools to outcomes
42+
- From isolated signals to grouped context
43+
- From reactive navigation to prioritized action
44+
45+
The underlying solutions are still used to take action. Objectives change how they're navigated and why they're used.
46+
47+
## Tracking progress and improvement over time
48+
49+
Because objectives are tied to posture, they support tracking progress over time rather than validating one-time changes.
50+
51+
As actions are taken and conditions change, objectives reflect whether risk is decreasing, staying the same, or shifting elsewhere. This makes it easier to evaluate whether effort is leading to meaningful improvement or simply addressing symptoms.
52+
53+
Progress is measured through trends and posture signals, not by checking whether a single recommendation was completed.
54+
55+
## Objectives that address AI-related risk
56+
57+
Some objectives explicitly focus on risks introduced or amplified by AI usage. These might relate to exposure through prompts, oversharing in responses, or movement of sensitive data through AI-driven workflows.
58+
59+
These objectives treat AI activity as part of the broader data security landscape. Signals from AI interactions are evaluated alongside more traditional signals, like access and sharing, rather than being handled in isolation.
60+
61+
## Why AI-related objectives aren't separate from data security
62+
63+
AI-related risk doesn't replace existing data risk. It builds on it.
64+
65+
Sensitive data that's poorly classified, widely accessible, or inconsistently protected becomes more exposed when used in AI interactions. Objectives reflect this reality by connecting AI-related signals to the same posture model used for other data risks.
66+
67+
This approach avoids treating AI as a special case. Instead, it reinforces that strong data security fundamentals are what make AI usage safer and more predictable.
Lines changed: 55 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,55 @@
1+
AI plays a supporting role inside data security posture management (DSPM). It doesn't replace human judgment or take action on its own. Its purpose is to help make sense of complex signals at scale.
2+
3+
This distinction matters. Trust in DSPM depends on understanding where AI assists and where control remains firmly with people and policies.
4+
5+
## Where AI fits in DSPM
6+
7+
DSPM uses AI capabilities like Security Copilot and embedded agents to help analyze information that would otherwise be difficult to interpret manually.
8+
9+
These capabilities operate within DSPM’s posture and objectives, rather than alongside them. They don't introduce new sources of authority or bypass existing controls. Instead, they help surface insights from posture data, objectives, and signals that are already available.
10+
11+
AI is used to support understanding, not to decide outcomes.
12+
13+
## What AI assists with
14+
15+
Within DSPM, AI assists with tasks that benefit from pattern recognition and contextual analysis, including:
16+
17+
- Triage of posture signals and objective-related findings
18+
- Prioritization of risks based on patterns, trends, and scope
19+
- Analysis that explains why certain risks surface and how they relate to posture
20+
21+
These capabilities reduce the time spent interpreting data and connecting signals across tools. They don't change what actions are available or how those actions are taken.
22+
23+
## What AI doesn't do
24+
25+
AI inside DSPM doesn't perform autonomous enforcement.
26+
27+
It doesn't:
28+
29+
- Create or modify policies on its own
30+
- Block access or take corrective action without approval
31+
- Replace investigation or enforcement tools
32+
33+
All actions still occur in the appropriate Microsoft Purview solution and follow existing permission models. AI might suggest or explain, but it doesn't execute.
34+
35+
This boundary is intentional and central to how DSPM is designed.
36+
37+
## Approval, auditing, and transparency
38+
39+
Any AI-assisted insight or recommendation is visible and reviewable.
40+
41+
DSPM maintains transparency around:
42+
43+
- How conclusions are formed
44+
- Which signals contribute to recommendations
45+
- What actions are suggested versus required
46+
47+
Actions taken in response to DSPM insights are still auditable through the underlying tools. This ensures accountability and supports review, validation, and governance processes.
48+
49+
AI assists with clarity, not control.
50+
51+
## Why trust and control matter
52+
53+
As environments grow more complex, especially with increased AI usage, the volume of signals can overwhelm traditional workflows. AI helps manage that complexity, but only when its role is clearly defined.
54+
55+
DSPM uses AI to support informed decision-making while preserving control, approval, and accountability. This balance allows AI to accelerate understanding without changing who owns risk decisions or how they're enforced.
Lines changed: 73 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,73 @@
1+
Data security posture management (DSPM) isn't designed to replace existing security tools. It helps decide how and when those tools should be used.
2+
3+
Throughout the data security lifecycle, different solutions serve different purposes. DSPM sits upstream of that work. It helps identify where risk is concentrated so follow-up actions are intentional, not reactive.
4+
5+
## DSPM and data loss prevention
6+
7+
Data loss prevention (DLP) is where controls are defined and enforced. Policies determine what actions are allowed, blocked, or audited.
8+
9+
DSPM doesn’t create or enforce DLP policies. Instead, it helps surface where sensitive data is most exposed, where protections are inconsistent, or where existing controls might not be sufficient. These insights can inform decisions about creating new policies, refining scope, or adjusting actions.
10+
11+
In practice:
12+
13+
- DSPM helps identify where DLP effort will have the most effect
14+
- DLP enforces controls based on those decisions
15+
16+
## DSPM and Insider Risk Management
17+
18+
Insider Risk Management focuses on detecting and analyzing risky patterns of behavior.
19+
20+
DSPM complements this by highlighting data-related conditions that might increase insider risk, like broad access to sensitive information or repeated exposure across workloads. When posture insights suggest elevated risk, Insider Risk Management provides the tools to investigate behavior in more detail.
21+
22+
In practice:
23+
24+
- DSPM highlights conditions that increase risk
25+
- Insider Risk Management supports behavioral analysis
26+
27+
## DSPM and Audit
28+
29+
Audit provides the evidence layer for data activity. It records what happened, when it happened, and who was involved.
30+
31+
DSPM relies on audit signals to understand how data is being used over time. When posture insights raise questions, audit data supports validation and follow-up by providing the underlying activity context.
32+
33+
In practice:
34+
35+
- DSPM helps decide what to look for
36+
- Audit shows what actually occurred
37+
38+
## DSPM and data security investigations
39+
40+
Data security investigations bring together evidence, context, and analysis when a deeper review is needed.
41+
42+
DSPM doesn’t replace investigations or manage cases. It helps justify when an investigation is warranted by identifying patterns, trends, or exposure that go beyond isolated events.
43+
44+
When posture insights indicate sustained or elevated risk, investigations provide the structured environment to examine data, activity, and outcomes more closely.
45+
46+
In practice:
47+
48+
- DSPM helps justify when an investigation is needed
49+
- Investigations provide structured, case-based analysis
50+
51+
## When DSPM insights justify deeper investigation
52+
53+
Not every posture finding requires immediate action. Some indicate emerging risk, others reflect known conditions that are already being addressed.
54+
55+
DSPM helps differentiate between:
56+
57+
- Isolated findings and broader patterns
58+
- Temporary conditions and sustained exposure
59+
- Low-priority gaps and high-risk areas
60+
61+
This context helps determine when to adjust controls, when to monitor trends, and when to escalate into investigation or enforcement workflows.
62+
63+
## Why DSPM is a starting point, not an end state
64+
65+
DSPM is designed to guide action, not complete it.
66+
67+
:::image type="content" source="../media/data-security-posture-lifecycle.png" border="false" alt-text="Diagram showing posture insights leading to protections, activity review, and outcome validation that refine posture over time." lightbox="../media/data-security-posture-lifecycle.png":::
68+
69+
It brings visibility, prioritization, and context together so decisions about data security are informed and focused. The actual work of enforcing policies, investigating activity, and validating outcomes still happens in the appropriate tools.
70+
71+
By starting with posture, data security work becomes more intentional. Effort is directed where it matters most. Actions across DLP, Insider Risk Management, audit, and investigations stay aligned to real risk.
72+
73+
This is how DSPM closes the loop.
Lines changed: 60 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,60 @@
1+
Understanding what data security posture management (DSPM) is responsible for is only part of the picture. Risk evaluation depends on how posture is assessed across the environment and how that assessment changes over time.
2+
3+
DSPM doesn't rely on point-in-time checks or one-off scans. It builds its view of risk through continuous discovery and assessment, using signals that already exist across Microsoft Purview.
4+
5+
## Continuous discovery and assessment
6+
7+
Data environments don't stay still. Files are created, shared, moved, and reused. Access changes. New apps appear. AI accelerates all of this.
8+
9+
DSPM continuously assesses where sensitive data exists and how it’s being used. Instead of asking whether a scan ran or a policy fired, DSPM looks at what the environment looks like _now_ and how that picture changes over time.
10+
11+
This ongoing assessment is what allows DSPM to surface trends and shifts in exposure, not just isolated findings. Posture reflects patterns and conditions over time, not individual events or momentary findings.
12+
13+
## What "posture" represents in DSPM
14+
15+
In DSPM, posture represents the overall state of data risk and protection across the organization.
16+
17+
Posture isn't a compliance score and it's not a single metric. It's a composite view built from:
18+
19+
- The presence and location of sensitive data
20+
- How broadly that data is accessible
21+
- How it's being used
22+
- Whether protections like labels and policies are applied consistently
23+
24+
This view helps you understand readiness and exposure at a higher level. Instead of reacting to individual events, posture supports decisions about where to focus effort and which risks deserve attention first.
25+
26+
## Metrics, trends, and prioritization
27+
28+
Because DSPM evaluates posture over time, it can surface metrics and trends that aren't visible when working inside individual tools.
29+
30+
These insights help answer questions like:
31+
32+
- Is exposure increasing or decreasing?
33+
- Are protections improving in high-risk areas?
34+
- Where are gaps persisting despite existing controls?
35+
36+
DSPM uses these signals to prioritize recommendations and actions. The goal isn't to surface everything that could be improved. The goal is to highlight what matters most based on current risk and potential exposure.
37+
38+
## Coverage gaps and prerequisites
39+
40+
What DSPM can evaluate depends on what's configured in the environment.
41+
42+
If auditing isn't enabled, certain activity signals won't be available. If devices aren't onboarded or policies aren't deployed, coverage will be incomplete. DSPM reflects these gaps clearly so it's apparent where visibility is limited.
43+
44+
This transparency is important. Posture insights are only as complete as the data behind them. DSPM doesn't hide missing coverage or infer what it can't see.
45+
46+
## AI interactions as a signal source
47+
48+
AI interactions introduce a different type of signal into posture evaluation.
49+
50+
Prompts and responses represent data in use, not data sitting at rest. Sensitive information might be shared, summarized, or transformed without creating a traditional file or triggering a familiar workflow. DSPM treats these interactions as signals that contribute to overall posture, not as a separate category of risk.
51+
52+
By including AI activity alongside more traditional signals, DSPM provides a clearer view of how sensitive data is actually being used across the environment.
53+
54+
## Why data in use matters for posture
55+
56+
Focusing only on data at rest leaves gaps in modern environments.
57+
58+
Risk increasingly comes from how data is accessed, shared, and reused, especially through AI-driven experiences. Posture evaluation needs to account for this active use of data, not just where it's stored or how it's labeled.
59+
60+
DSPM incorporates data in use into its posture model to support reasoning about exposure in environments where data is constantly moving and being acted on.
Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,15 @@
1+
Data security work often starts in the middle. Teams respond to alerts, investigate activity, and adjust policies based on what surfaces in individual tools. What's harder to answer is a more basic question: **where is the organization most exposed right now, and why**.
2+
3+
When sensitive data is spread across workloads, widely accessible, or actively used through AI-driven experiences, isolated signals don't provide enough context to guide decisions. Without a clear view of posture, teams might spend effort in the wrong places or react to symptoms instead of underlying risk.
4+
5+
Data security posture management exists to solve this problem. It helps teams understand where sensitive data exists, how it’s being used, and how consistently it's protected. This context helps direct effort intentionally before configuring controls or launching investigations.
6+
7+
## Learning objectives
8+
9+
By the end of this module, you'll be able to:
10+
11+
- Explain what data security posture management is and the problem it addresses
12+
- Describe how posture is evaluated over time
13+
- Explain how data security objectives organize risk into outcomes
14+
- Describe the role of AI in data security posture management
15+
- Explain how data security posture management fits with data loss prevention (DLP), Insider Risk Management, audit, and investigations

0 commit comments

Comments
 (0)