Skip to content

Commit 7645167

Browse files
committed
dspm module
1 parent 91923a8 commit 7645167

17 files changed

Lines changed: 236 additions & 30 deletions
Lines changed: 15 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,2 +1,15 @@
1-
Data security objectives as the organizing model
2-
5
1+
### YamlMime:ModuleUnit
2+
uid: learn.wwl.purview-data-security-posture-management-understand.data-security-objectives
3+
title: Data security objectives as the organizing model
4+
metadata:
5+
title: Data security objectives as the organizing model
6+
description: "Data security objectives as the organizing model"
7+
ms.date: 02/03/2026
8+
author: wwlpublish
9+
ms.author: riswinto
10+
ms.topic: unit
11+
azureSandbox: false
12+
labModal: false
13+
durationInMinutes: 5
14+
content: |
15+
[!include[](includes/data-security-objectives.md)]
Lines changed: 15 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,2 +1,15 @@
1-
How AI is used inside DSPM
2-
4
1+
### YamlMime:ModuleUnit
2+
uid: learn.wwl.purview-data-security-posture-management-understand.data-security-posture-ai
3+
title: How AI is used inside DSPM
4+
metadata:
5+
title: How AI is used inside DSPM
6+
description: "How AI is used inside DSPM"
7+
ms.date: 02/03/2026
8+
author: wwlpublish
9+
ms.author: riswinto
10+
ms.topic: unit
11+
azureSandbox: false
12+
labModal: false
13+
durationInMinutes: 4
14+
content: |
15+
[!include[](includes/data-security-posture-ai.md)]
Lines changed: 15 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1 +1,15 @@
1-
Where DSPM fits in the broader data security workflow
1+
### YamlMime:ModuleUnit
2+
uid: learn.wwl.purview-data-security-posture-management-understand.data-security-workflow-fit
3+
title: Where DSPM fits in the broader data security workflow
4+
metadata:
5+
title: Where DSPM fits in the broader data security workflow
6+
description: "Where DSPM fits in the broader data security workflow"
7+
ms.date: 02/03/2026
8+
author: wwlpublish
9+
ms.author: riswinto
10+
ms.topic: unit
11+
azureSandbox: false
12+
labModal: false
13+
durationInMinutes: 6
14+
content: |
15+
[!include[](includes/data-security-workflow-fit.md)]
Lines changed: 15 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,2 +1,15 @@
1-
How DSPM evaluates data risk and posture
2-
5
1+
### YamlMime:ModuleUnit
2+
uid: learn.wwl.purview-data-security-posture-management-understand.evaluate-risk-posture
3+
title: How DSPM evaluates data risk and posture
4+
metadata:
5+
title: How DSPM evaluates data risk and posture
6+
description: "How DSPM evaluates data risk and posture"
7+
ms.date: 02/03/2026
8+
author: wwlpublish
9+
ms.author: riswinto
10+
ms.topic: unit
11+
azureSandbox: false
12+
labModal: false
13+
durationInMinutes: 5
14+
content: |
15+
[!include[](includes/evaluate-risk-posture.md)]

learn-pr/wwl-sci/purview-data-security-posture-management-understand/includes/data-security-objectives.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ In data security posture management (DSPM), objectives are the primary way risk
1010

1111
:::image type="content" source="../media/objectives-as-outcomes.png" border="false" alt-text="Diagram showing objectives progressing through assess, identify, recommend, and validate steps over time." lightbox="../media/objectives-as-outcomes.png":::
1212

13-
Objectives aren't checklists or static views. They function as workflows that connect:
13+
Objectives arent checklists or static views. They function as workflows that link:
1414

1515
- Assessing current posture
1616
- Identifying gaps or risks

learn-pr/wwl-sci/purview-data-security-posture-management-understand/includes/data-security-posture-ai.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ Within DSPM, AI assists with tasks that benefit from pattern recognition and con
1818
- Prioritization of risks based on patterns, trends, and scope
1919
- Analysis that explains why certain risks surface and how they relate to posture
2020

21-
These capabilities help reduce the time spent interpreting data and connecting signals across tools. They don't change what actions are available or how those actions are taken.
21+
These capabilities reduce the time spent interpreting data and connecting signals across tools. They don't change what actions are available or how those actions are taken.
2222

2323
## What AI doesn't do
2424

learn-pr/wwl-sci/purview-data-security-posture-management-understand/includes/data-security-workflow-fit.md

Lines changed: 8 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,12 @@
1-
Data security posture management (DSPM) isn't designed to replace existing security tools. It's designed to help decide how and when those tools should be used.
1+
Data security posture management (DSPM) isn't designed to replace existing security tools. It helps decide how and when those tools should be used.
22

33
Throughout the data security lifecycle, different solutions serve different purposes. DSPM sits upstream of that work. It helps identify where risk is concentrated so follow-up actions are intentional, not reactive.
44

55
## DSPM and data loss prevention
66

77
Data loss prevention (DLP) is where controls are defined and enforced. Policies determine what actions are allowed, blocked, or audited.
88

9-
DSPM doesn’t create or enforce DLP policies. Instead, it helps surface where sensitive data is most exposed, where protections are inconsistent, or where existing controls may not be sufficient. These insights can inform decisions about creating new policies, refining scope, or adjusting actions.
9+
DSPM doesn’t create or enforce DLP policies. Instead, it helps surface where sensitive data is most exposed, where protections are inconsistent, or where existing controls might not be sufficient. These insights can inform decisions about creating new policies, refining scope, or adjusting actions.
1010

1111
In practice:
1212

@@ -17,7 +17,7 @@ In practice:
1717

1818
Insider Risk Management focuses on detecting and analyzing risky patterns of behavior.
1919

20-
DSPM complements this by highlighting data-related conditions that may increase insider risk, like broad access to sensitive information or repeated exposure across workloads. When posture insights suggest elevated risk, Insider Risk Management provides the tools to investigate behavior in more detail.
20+
DSPM complements this by highlighting data-related conditions that might increase insider risk, like broad access to sensitive information or repeated exposure across workloads. When posture insights suggest elevated risk, Insider Risk Management provides the tools to investigate behavior in more detail.
2121

2222
In practice:
2323

@@ -41,7 +41,7 @@ Data security investigations bring together evidence, context, and analysis when
4141

4242
DSPM doesn’t replace investigations or manage cases. It helps justify when an investigation is warranted by identifying patterns, trends, or exposure that go beyond isolated events.
4343

44-
When posture insights indicate sustained or high-impact risk, investigations provide the structured environment to examine data, activity, and outcomes more closely.
44+
When posture insights indicate sustained or elevated risk, investigations provide the structured environment to examine data, activity, and outcomes more closely.
4545

4646
In practice:
4747

@@ -56,16 +56,18 @@ DSPM helps differentiate between:
5656

5757
- Isolated findings and broader patterns
5858
- Temporary conditions and sustained exposure
59-
- Low-impact gaps and high-risk areas
59+
- Low-priority gaps and high-risk areas
6060

6161
This context helps determine when to adjust controls, when to monitor trends, and when to escalate into investigation or enforcement workflows.
6262

6363
## Why DSPM is a starting point, not an end state
6464

6565
DSPM is designed to guide action, not complete it.
6666

67+
:::image type="content" source="../media/data-security-posture-lifecycle.png" border="false" alt-text="Diagram showing posture insights leading to protections, activity review, and outcome validation that refine posture over time." lightbox="../media/data-security-posture-lifecycle.png":::
68+
6769
It brings visibility, prioritization, and context together so decisions about data security are informed and focused. The actual work of enforcing policies, investigating activity, and validating outcomes still happens in the appropriate tools.
6870

69-
By starting with posture, data security work becomes more intentional. Effort is directed where it matters most, and actions across DLP, Insider Risk Management, audit, and investigations stay aligned to real risk.
71+
By starting with posture, data security work becomes more intentional. Effort is directed where it matters most. Actions across DLP, Insider Risk Management, audit, and investigations stay aligned to real risk.
7072

7173
This is how DSPM closes the loop.

learn-pr/wwl-sci/purview-data-security-posture-management-understand/includes/evaluate-risk-posture.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ DSPM doesn't rely on point-in-time checks or one-off scans. It builds its view o
66

77
Data environments don't stay still. Files are created, shared, moved, and reused. Access changes. New apps appear. AI accelerates all of this.
88

9-
DSPM accounts for this by continuously assessing where sensitive data exists and how it's being used. Instead of asking whether a scan ran or a policy fired, DSPM looks at what the environment looks like _now_ and how that picture changes over time.
9+
DSPM continuously assesses where sensitive data exists and how its being used. Instead of asking whether a scan ran or a policy fired, DSPM looks at what the environment looks like _now_ and how that picture changes over time.
1010

1111
This ongoing assessment is what allows DSPM to surface trends and shifts in exposure, not just isolated findings. Posture reflects patterns and conditions over time, not individual events or momentary findings.
1212

Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,15 @@
1+
Data security work often starts in the middle. Teams respond to alerts, investigate activity, and adjust policies based on what surfaces in individual tools. What's harder to answer is a more basic question: **where is the organization most exposed right now, and why**.
2+
3+
When sensitive data is spread across workloads, widely accessible, or actively used through AI-driven experiences, isolated signals don't provide enough context to guide decisions. Without a clear view of posture, teams might spend effort in the wrong places or react to symptoms instead of underlying risk.
4+
5+
Data security posture management exists to solve this problem. It helps teams understand where sensitive data exists, how it’s being used, and how consistently it's protected. This context helps direct effort intentionally before configuring controls or launching investigations.
6+
7+
## Learning objectives
8+
9+
By the end of this module, you'll be able to:
10+
11+
- Explain what data security posture management is and the problem it addresses
12+
- Describe how posture is evaluated over time
13+
- Explain how data security objectives organize risk into outcomes
14+
- Describe the role of AI in data security posture management
15+
- Explain how data security posture management fits with data loss prevention (DLP), Insider Risk Management, audit, and investigations
Lines changed: 17 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,17 @@
1+
Understanding data security posture management starts with understanding its role. It doesn't enforce policies, investigate incidents, or replace existing security tools. It provides the visibility and context needed to decide where those tools should be applied and why.
2+
3+
In this module, you learned how to:
4+
5+
- Explain what data security posture management is and the problem it addresses
6+
- Describe how posture is evaluated over time
7+
- Explain how data security objectives organize risk into outcomes
8+
- Describe the role of AI in data security posture management
9+
- Explain how data security posture management fits with data loss prevention (DLP), Insider Risk Management, audit, and investigations
10+
11+
Without this understanding, teams might react to isolated findings, focus effort in the wrong areas, or miss patterns that indicate broader exposure. Using posture as a starting point helps align protection, investigation, and validation around real data risk as conditions change.
12+
13+
This foundation prepares you to apply controls, investigate activity, and evaluate outcomes with clearer intent, using Microsoft Purview tools in a way that stays focused on what matters most.
14+
15+
## Resources
16+
17+
- [Learn about Data Security Posture Management](/purview/data-security-posture-management-learn-about?azure-portal=true)

0 commit comments

Comments
 (0)