Skip to content

Commit 73759e6

Browse files
committed
understand dspm module
1 parent 416d67f commit 73759e6

14 files changed

Lines changed: 297 additions & 0 deletions
Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,2 @@
1+
Data security objectives as the organizing model
2+
5
Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,2 @@
1+
How AI is used inside DSPM
2+
4
Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,2 @@
1+
How DSPM evaluates data risk and posture
2+
5
Lines changed: 65 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,65 @@
1+
Understanding posture tells you _where_ risk exists. The next challenge is deciding what to do about it.
2+
3+
In complex environments, risk signals don't arrive neatly grouped. They come from different tools, cover different workloads, and vary in urgency. Looking at each signal in isolation makes it hard to decide where to start or how to measure progress.
4+
5+
Data security objectives exist to solve that problem.
6+
7+
## Objectives as outcome-driven workflows
8+
9+
In data security posture management (DSPM), objectives are the primary way risk is organized and addressed. An objective represents a specific outcome related to data security, like reducing oversharing, limiting exposure, or strengthening protection for sensitive data.
10+
11+
Objectives aren't checklists or static views. They function as workflows that connect:
12+
13+
- Assessing current posture
14+
- Identifying gaps or risks
15+
- Recommending actions
16+
- Validating and reporting over time
17+
18+
This structure shifts the focus away from individual settings or alerts and toward measurable improvement.
19+
20+
## How objectives group assessment, action, and reporting
21+
22+
Each objective brings together information that would otherwise be spread across multiple solutions.
23+
24+
Instead of separately reviewing posture insights, policy gaps, and follow-up actions, objectives present these elements in context. You can see:
25+
26+
- why an objective exists
27+
- what signals are contributing to it
28+
- which actions are recommended
29+
- how changes affect posture over time
30+
31+
This grouping reduces the need to manually connect information across tools and makes it easier to understand how individual actions contribute to broader risk reduction.
32+
33+
## Why objectives replace navigating individual solutions
34+
35+
Traditional workflows often require moving between multiple Purview solutions to understand a single risk area. That approach works for targeted tasks, but it doesn’t scale well when risk spans data types, workloads, and usage patterns.
36+
37+
Objectives provide a higher-level entry point by shifting focus:
38+
39+
- From individual tools to outcomes
40+
- From isolated signals to grouped context
41+
- From reactive navigation to prioritized action
42+
43+
The underlying solutions are still used to take action. Objectives change how they're navigated and why they're used.
44+
45+
## Tracking progress and improvement over time
46+
47+
Because objectives are tied to posture, they support tracking progress over time rather than validating one-time changes.
48+
49+
As actions are taken and conditions change, objectives reflect whether risk is decreasing, staying the same, or shifting elsewhere. This makes it easier to evaluate whether effort is leading to meaningful improvement or simply addressing symptoms.
50+
51+
Progress is measured through trends and posture signals, not by checking whether a single recommendation was completed.
52+
53+
## Objectives that address AI-related risk
54+
55+
Some objectives explicitly focus on risks introduced or amplified by AI usage. These might relate to exposure through prompts, oversharing in responses, or movement of sensitive data through AI-driven workflows.
56+
57+
These objectives treat AI activity as part of the broader data security landscape. Signals from AI interactions are evaluated alongside more traditional signals, like access and sharing, rather than being handled in isolation.
58+
59+
## Why AI-related objectives aren't separate from data security
60+
61+
AI-related risk doesn't replace existing data risk. It builds on it.
62+
63+
Sensitive data that's poorly classified, widely accessible, or inconsistently protected becomes more exposed when used in AI interactions. Objectives reflect this reality by connecting AI-related signals to the same posture model used for other data risks.
64+
65+
This approach avoids treating AI as a special case. Instead, it reinforces that strong data security fundamentals are what make AI usage safer and more predictable.
Lines changed: 55 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,55 @@
1+
AI plays a supporting role inside data security posture management (DSPM). It doesn't replace human judgment or take action on its own. Its purpose is to help make sense of complex signals at scale.
2+
3+
This distinction matters. Trust in DSPM depends on understanding where AI assists and where control remains firmly with people and policies.
4+
5+
## Where AI fits in DSPM
6+
7+
DSPM uses AI capabilities like Security Copilot and embedded agents to help analyze information that would otherwise be difficult to interpret manually.
8+
9+
These capabilities operate within the context DSPM already provides. They don't introduce new sources of authority or bypass existing controls. Instead, they help surface insights from posture data, objectives, and signals that are already available.
10+
11+
AI is used to support understanding, not to decide outcomes.
12+
13+
## What AI assists with
14+
15+
Within DSPM, AI assists with tasks that benefit from pattern recognition and contextual analysis, including:
16+
17+
- Triage of posture signals and objective-related findings
18+
- Prioritization of risks based on patterns, trends, and scope
19+
- Analysis that explains why certain risks surface and how they relate to posture
20+
21+
These capabilities help reduce the time spent interpreting data and connecting signals across tools. They don't change what actions are available or how those actions are taken.
22+
23+
## What AI doesn't do
24+
25+
AI inside DSPM doesn't perform autonomous enforcement.
26+
27+
It doesn't:
28+
29+
- Create or modify policies on its own
30+
- Block access or take corrective action without approval
31+
- Replace investigation or enforcement tools
32+
33+
All actions still occur in the appropriate Microsoft Purview solution and follow existing permission models. AI might suggest or explain, but it doesn't execute.
34+
35+
This boundary is intentional and central to how DSPM is designed.
36+
37+
## Approval, auditing, and transparency
38+
39+
Any AI-assisted insight or recommendation is visible and reviewable.
40+
41+
DSPM maintains transparency around:
42+
43+
- How conclusions are formed
44+
- Which signals contribute to recommendations
45+
- What actions are suggested versus required
46+
47+
Actions taken in response to DSPM insights are still auditable through the underlying tools. This ensures accountability and supports review, validation, and governance processes.
48+
49+
AI assists with clarity, not control.
50+
51+
## Why trust and control matter
52+
53+
As environments grow more complex, especially with increased AI usage, the volume of signals can overwhelm traditional workflows. AI helps manage that complexity, but only when its role is clearly defined.
54+
55+
DSPM uses AI to support informed decision-making while preserving control, approval, and accountability. This balance allows AI to accelerate understanding without changing who owns risk decisions or how they're enforced.
Lines changed: 60 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,60 @@
1+
Understanding what data security posture management (DSPM) is responsible for is only part of the picture. Risk evaluation depends on how posture is assessed across the environment and how that assessment changes over time.
2+
3+
DSPM doesn't rely on point-in-time checks or one-off scans. It builds its view of risk through continuous discovery and assessment, using signals that already exist across Microsoft Purview.
4+
5+
## Continuous discovery and assessment
6+
7+
Data environments don't stay still. Files are created, shared, moved, and reused. Access changes. New apps appear. AI accelerates all of this.
8+
9+
DSPM accounts for this by continuously assessing where sensitive data exists and how it's being used. Instead of asking whether a scan ran or a policy fired, DSPM looks at what the environment looks like _now_ and how that picture changes over time.
10+
11+
This ongoing assessment is what allows DSPM to surface trends and shifts in exposure, not just isolated findings. Posture reflects patterns and conditions over time, not individual events or momentary findings.
12+
13+
## What "posture" represents in DSPM
14+
15+
In DSPM, posture represents the overall state of data risk and protection across the organization.
16+
17+
Posture isn't a compliance score and it's not a single metric. It's a composite view built from:
18+
19+
- The presence and location of sensitive data
20+
- How broadly that data is accessible
21+
- How it's being used
22+
- Whether protections like labels and policies are applied consistently
23+
24+
This view helps you understand readiness and exposure at a higher level. Instead of reacting to individual events, posture supports decisions about where to focus effort and which risks deserve attention first.
25+
26+
## Metrics, trends, and prioritization
27+
28+
Because DSPM evaluates posture over time, it can surface metrics and trends that aren't visible when working inside individual tools.
29+
30+
These insights help answer questions like:
31+
32+
- Is exposure increasing or decreasing?
33+
- Are protections improving in high-risk areas?
34+
- Where are gaps persisting despite existing controls?
35+
36+
DSPM uses these signals to prioritize recommendations and actions. The goal isn't to surface everything that could be improved. The goal is to highlight what matters most based on current risk and potential exposure.
37+
38+
## Coverage gaps and prerequisites
39+
40+
What DSPM can evaluate depends on what's configured in the environment.
41+
42+
If auditing isn't enabled, certain activity signals won't be available. If devices aren't onboarded or policies aren't deployed, coverage will be incomplete. DSPM reflects these gaps clearly so it's apparent where visibility is limited.
43+
44+
This transparency is important. Posture insights are only as complete as the data behind them. DSPM doesn't hide missing coverage or infer what it can't see.
45+
46+
## AI interactions as a signal source
47+
48+
AI interactions introduce a different type of signal into posture evaluation.
49+
50+
Prompts and responses represent data in use, not data sitting at rest. Sensitive information might be shared, summarized, or transformed without creating a traditional file or triggering a familiar workflow. DSPM treats these interactions as signals that contribute to overall posture, not as a separate category of risk.
51+
52+
By including AI activity alongside more traditional signals, DSPM provides a clearer view of how sensitive data is actually being used across the environment.
53+
54+
## Why data in use matters for posture
55+
56+
Focusing only on data at rest leaves gaps in modern environments.
57+
58+
Risk increasingly comes from how data is accessed, shared, and reused, especially through AI-driven experiences. Posture evaluation needs to account for this active use of data, not just where it's stored or how it's labeled.
59+
60+
DSPM incorporates data in use into its posture model to support reasoning about exposure in environments where data is constantly moving and being acted on.

learn-pr/wwl-sci/purview-data-security-posture-management-understand/includes/introduction.md

Whitespace-only changes.

learn-pr/wwl-sci/purview-data-security-posture-management-understand/includes/summary.md

Whitespace-only changes.
Lines changed: 56 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,56 @@
1+
In many environments, data security work is driven by individual tools. Data loss prevention (DLP) policies are configured, alerts are reviewed, users are investigated, and sensitivity labels are applied. Each task is valid on its own.
2+
3+
The challenge is that these tasks don't always answer a more basic question: _where is the organization most exposed right now, and why?_
4+
5+
Data security posture management (DSPM) exists to answer that question. It focuses on understanding risk before it turns into an incident. Instead of starting with alerts or investigations, it starts with visibility and context.
6+
7+
## From tool-centric work to data-centric thinking
8+
9+
Tool-centric security focuses on what each solution can do. Data-centric security focuses on the data itself.
10+
11+
Instead of asking whether a policy exists or whether an alert fired, posture management looks at conditions that increase risk. That includes where sensitive data lives, how widely it's shared, how it's being used, and whether protections are applied consistently. The goal isn't to replace day-to-day security work. The goal is to help you decide where that work matters most.
12+
13+
Microsoft Purview Data Security Posture Management, or DSPM, applies this model to data across the organization.
14+
15+
## The four questions DSPM is designed to answer
16+
17+
At its core, DSPM is built around four questions that need to be answered to support informed decisions:
18+
19+
- _What data exists_
20+
- _Where it resides_
21+
- _Who can access it_
22+
- _How it's protected_
23+
24+
These questions sound simple, but answering them consistently across workloads, users, and AI interactions is hard. Data moves. Access changes. New tools and apps appear. AI accelerates all of this.
25+
26+
DSPM brings these questions together in one place so you can reason about exposure and risk across the environment, not just inside a single tool.
27+
28+
## How DSPM builds its view of posture
29+
30+
DSPM doesn't inspect data or user behavior on its own. It aggregates signals from other Microsoft Purview solutions that already do that work.
31+
32+
Those signals come from areas like:
33+
34+
- **Data Loss Prevention**, which detects risky data handling
35+
- **Information Protection**, which shows how data is classified and labeled
36+
- **Insider Risk Management**, which highlights risky patterns and behaviors
37+
- **Audit and activity data**, which provide evidence of how data is used
38+
- **Investigation tools**, which add context when deeper review is needed
39+
40+
DSPM brings these signals together to show patterns, trends, and gaps. This is what "posture" represents in practice. It's a way to understand overall exposure and readiness, not a single event or misconfiguration.
41+
42+
## What DSPM does and doesn't do
43+
44+
DSPM informs and guides. It doesn't enforce policies, block actions, or replace investigation tools.
45+
46+
When DSPM highlights a risk, the response still happens in the appropriate solution. A DLP policy is created or adjusted in DLP. A case is investigated using audit or investigation tools. DSPM helps determine _what_ to address and _why_, but it doesn't take control away from the underlying tools.
47+
48+
Keeping this boundary clear is important. DSPM is a starting point for action, not the place where all actions happen.
49+
50+
## How AI changes data security posture
51+
52+
AI changes how data moves through an organization. Prompts, responses, summaries, and agent workflows create new paths for sensitive information to be shared, reused, or exposed. This activity is often distributed across users, apps, and services, which makes risk harder to see when you look at tools in isolation.
53+
54+
In these environments, posture matters more than individual alerts. You need to understand patterns like oversharing, repeated exposure, or gaps in protection before those patterns lead to incidents. DSPM treats AI interactions as another signal source, not a separate problem to solve in isolation.
55+
56+
By focusing on posture, DSPM helps organizations stay ahead of risk in environments where data is constantly in use, not just sitting at rest.
Lines changed: 53 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,53 @@
1+
### YamlMime:Module
2+
uid: learn.wwl.purview-data-security-posture-management-understand
3+
metadata:
4+
title: Understand Data Security Investigations
5+
description: Understand Data Security Investigations.
6+
ms.date: 01/15/2026
7+
author: wwlpublish
8+
ms.author: riswinto
9+
ms.topic: module
10+
ai-usage: ai-assisted
11+
ms.service: purview
12+
title: Understand Data Security Investigations
13+
summary: |
14+
Data security investigations help organizations understand data risk beyond activity alone. This module focuses on the concepts that define data security investigations, how they differ from alerts and audit, and when deeper, data-focused investigation adds value to security decisions.
15+
abstract: |
16+
In this module you learn to:
17+
- Explain what a data security investigation is and what it's designed to address
18+
- Describe why data security investigations are needed alongside alerts, cases, and audit
19+
- Distinguish between reactive and proactive investigation approaches
20+
- Recognize what data security investigations are and are not designed to replace
21+
- Identify when deeper investigation adds value and when simpler paths are sufficient
22+
- Understand how data security investigations fit into broader Microsoft security workflows
23+
24+
prerequisites: |
25+
- Familiarity with basic security investigation concepts
26+
- General awareness of Microsoft security and data protection tools
27+
28+
iconUrl: /training/achievements/generic-badge.svg
29+
levels:
30+
- intermediate
31+
roles:
32+
- administrator
33+
- risk-practitioner
34+
products:
35+
- m365
36+
- microsoft-purview
37+
subjects:
38+
- threat-protection
39+
- security
40+
units:
41+
- learn.wwl.purview-data-security-posture-management-understand.introduction
42+
- learn.wwl.purview-data-security-posture-management-understand.understand-data-security-posture-management
43+
- learn.wwl.purview-data-security-posture-management-understand.evaluate-risk-posture
44+
- learn.wwl.purview-data-security-posture-management-understand.data-security-objectives
45+
- learn.wwl.purview-data-security-posture-management-understand.data-security-posture-ai
46+
47+
48+
49+
50+
- learn.wwl.purview-data-security-posture-management-understand.knowledge-check
51+
- learn.wwl.purview-data-security-posture-management-understand.summary
52+
badge:
53+
uid: learn.wwl.purview-data-security-posture-management-understand.badge

0 commit comments

Comments
 (0)