Module 05 β€” Protection & Enforcement

Data Security Posture Management

Continuous visibility Β· Risk scoring Β· Oversharing detection Β· Microsoft 365 Copilot considerations Β· Cross-platform signals

What Is DSPM?

Data Security Posture Management (DSPM) is the continuous discovery and risk assessment layer of the Microsoft Purview platform. Where DLP enforces policy on known sensitive data, DSPM finds sensitive data you didn't know was there β€” across Microsoft 365, cloud storage, and SaaS apps β€” and scores the risk of your current posture.

DSPM answers: "Where is sensitive data being overshared, undermined by weak permissions, or exposed to AI models?" It surfaces those gaps as actionable insights rather than waiting for a policy violation to occur.

DSPM Operating Model
πŸ‘οΈ
Visibility

Continuous discovery of sensitive data across Microsoft 365, cloud storage, and SaaS apps. Identifies where PII, financial data, and classified content actually lives β€” including shadow copies and unexpected locations.

πŸ“Š
Risk Assessment

Scores posture risk based on: sensitivity of data, exposure level (internal/external/public), label presence or absence, activity patterns, and access scope. Surfaces the highest-risk concentrations first.

πŸ”§
Remediation

Provides actionable recommendations: apply missing labels, restrict overshared content, remove stale access, update DLP policy scope to cover newly discovered locations.

Key Risk Signals
SignalDescriptionRisk LevelRecommended Action
Unlabeled sensitive contentSensitive data detected (SIT match) with no sensitivity label appliedHighApply auto-labeling policy; escalate to data owner
Restricted content shared externallyItems with Restricted label shared with external accountsCriticalRevoke share; DLP rule review; incident response
Confidential content in public Teams channelConfidential items accessible to all org members in public teamHighMove to private channel; restrict access; re-evaluate team privacy
Large volume of unlabeled financial contentSharePoint site with high density of SIT matches but no labelsHighTrigger auto-labeling simulation; review with site owner
Stale external shares on sensitive filesFiles with sensitive classification shared externally, not accessed in 90+ daysMediumRemove external permissions; review sharing policy
Copilot grounding on restricted dataCopilot has access to Restricted or Confidential PHI content via user contextHighRestrict Copilot scopes; apply label-based Copilot DLP rules
Microsoft 365 Copilot Considerations
Critical: Microsoft 365 Copilot grounds responses in content the signed-in user is authorized to access. The risk is not that Copilot bypasses permissions; the risk is that overshared, mislabeled, stale, or overly permissive content becomes easier to discover and summarize through natural-language prompts. DSPM, sensitivity labels, permissions hygiene, and DLP for Microsoft 365 Copilot should be treated as layered controls.
Copilot Oversharing Risk

Copilot respects SharePoint permissions and sensitivity labels β€” but only if they are correctly applied. Unlabeled sensitive content or overly broad permissions are the primary oversharing vectors. DSPM surfaces these before Copilot reaches them.

Label-Based Copilot DLP

Configure DLP policies with the Microsoft 365 Copilot location to restrict what content Copilot can use as grounding material. For Restricted and Confidential PHI content, this is a required control before Copilot deployment in affected teams.

Pre-Copilot Posture Assessment

Before enabling Copilot for a business unit, run DSPM to identify: unlabeled sensitive content, overshared sites and files, stale external links, and Restricted/Confidential PHI content accessible to Copilot scope. Remediate before rollout.

Ongoing Monitoring

After Copilot deployment, review DSPM posture monthly. New content, new team members, and site permission changes constantly introduce new exposure. DSPM posture is not static.

Cross-Platform Signal Integration
DSPM β†’ DLP

DSPM discovers new sensitive data locations not yet covered by DLP policy scope. Those locations should be added to DLP policy targets. DSPM posture gaps are direct inputs to DLP gap analysis.

DSPM β†’ Labeling

DSPM identifies unlabeled sensitive content. Output feeds auto-labeling policy scope β€” ensuring new repositories discovered by DSPM scanning are added to auto-labeling targets.

DSPM β†’ Governance

DSPM risk findings can be registered in the Data Catalog as asset-level risk annotations. Data owners receive posture alerts for their catalog assets.

DSPM β†’ Insider Risk

Behavioral signals from DSPM (large volume access to sensitive content, repeated download of restricted files) feed the Insider Risk Management indicator model as contextual amplifiers.

References
KPI Operating Model β€” Health Γ— Effectiveness

DSPM posture data feeds directly into the two-axis KPI model: Health (is the control working?) and Effectiveness (is it doing its job?). These are two separate questions and must be measured separately. A program can be healthy but ineffective β€” or effective in one location and absent in another.

Ingestion path: Purview Security and Compliance logs β†’ Event Hub β†’ Splunk HEC. Reporting cadence: monthly (specific window TBD with client), rolling to live dashboard as program matures.

AudienceKPIAxisSource SystemSplunk LayerMaturity
EngineeringDLP event ingestion freshnessHealthSplunk _indextimePipeline Health🟒 Live
EngineeringDLP policy match volumeHealthDLP.All / Advanced HuntingDLP Effectiveness🟒 Live
EngineeringPolicy assignment & coverage %HealthUAL + policy scopeDLP Effectiveness🟑 Partial
EngineeringAuto-labeling job success rateHealthUAL / Purview classification eventsDLP Effectiveness🟑 Partial
EngineeringRule action distributionHealthUAL + AH enrichmentDLP Effectiveness🟑 Partial
EngineeringSIT confidence distributionEffectivenessAH / Purview event detailsDLP Effectiveness🟑 Partial
EngineeringFalse-positive rateEffectivenessDefender XDR classificationInvestigation Ops🟑 Partial
EngineeringLabel adoption / usage rateEffectivenessUAL + label eventsDLP Effectiveness⚫ Blank
EngineeringConnector / SHIR scan healthHealthPurview Data Map telemetryPipeline Health⚫ Blank
EngineeringOCR pipeline statusHealthControl registerPipeline Health⚫ Not deployed
InvestigationsAlert volume by severityHealthDefender XDR alertsInvestigation Ops🟒 Live
InvestigationsTriage queue depth & agingHealthDefender XDR incidentsInvestigation Ops🟒 Live
InvestigationsMean time to triage (MTTA)EffectivenessDefender incident lifecycleInvestigation Ops🟑 Partial
InvestigationsMean time to resolve (MTTR)EffectivenessDefender resolved timestampInvestigation Ops🟑 Partial
InvestigationsTop exfiltration vectorsEffectivenessDLP events + workload / actionDLP Effectiveness🟑 Partial
ExecutiveProgram coverage % (locations protected)HealthControl inventory + policy scopeExecutive Scorecard🟑 Partial
ExecutiveControl Health composite scoreHealthKPI martExecutive Scorecard🟑 Partial
ExecutiveRisk exposure trend (90-day)EffectivenessAlerts + DLP eventsExecutive Scorecard🟒 Live once retained
ExecutivePHI / PCI protected vs. exposedEffectivenessSIT + action outcomeExecutive Scorecard⚫ Blank
ExecutiveBlock / allow-with-override ratioEffectivenessDLP enforcement / actionExecutive Scorecard🟑 Partial
ExecutiveRetention deployment statusHealthPurview retention inventoryExecutive Scorecard⚫ Blank
Deployment maturity tagging rule: Every KPI must be tagged honestly β€” Blank (report built, no data), Partial (some data, not comprehensive), or Live (report-ready). Never hide that data is partial. An empty dashboard is still audit evidence that the control framework exists.
PII-in-logs risk: DLP audit logs can contain matched content fragments, making any downstream SIEM or BI store a regulated data store. Minimize, mask, hash, or drop sensitive matched-value fragments in the export or ingestion pipeline before they land in Sentinel, Splunk, Power BI, or long-term storage. Where raw matched values are required for investigation, restrict access to Purview/Defender investigation surfaces using least-privilege RBAC and audit all access.
πŸ“Š
Full Splunk reporting architecture β†’ Splunk Reporting Architecture
Dual-ingestion model (UAL + Defender XDR + Advanced Hunting), 6 raw indexes, normalized fact table, 5 KPI marts, 5 dashboard tiers, composite Health Γ— Effectiveness score formulas, and the full engineering prompt for the Splunk / Microsoft team.
AI & Forward-Looking Roadmap
Why This Exists: Engineers and analysts cannot recommend what they don't see. This section makes the unseen visible β€” capabilities not yet deployed in the current environment that could materially improve posture measurement, alert triage, and investigation quality.
πŸ€– Copilot for Security

Why: AI-assisted investigation summarization and alert triage recommendation. Could be revelatory for L1/L2 analysts β€” converts raw alert data into plain-language risk summaries.
Recommend: Pilot in Q1, constrained scope. Private endpoint required β€” no external telemetry. CMK mandatory for NPI processing.
Status: Not deployed.

πŸ”¬ Data Investigations (Purview)

Why: Specialized investigation surface for sensitive-data exposure incidents. Shortens investigation time substantially by surfacing related content and collaborators.
Recommend: Enable after legal/HR formal review of scope and data-handling policies.
Status: Not deployed β€” requires sign-off.

πŸ€– Agent 365

Why: Microsoft 365 agent framework. Potential for Purview-specific agents: triage assistant, label coach, compliance advisor. Operates within M365 tenant boundary.
Recommend: Evaluate Q2 after Copilot for Security baseline is established. Don't build agents before controls are mature.
Status: Evaluate after Q1.

πŸ”— MCP β€” Model Context Protocol

Why: Structured AI rollout framework β€” workers, skills, pre-prompts. Enables consistent AI-assisted workflows without ad-hoc prompt engineering.
Recommend: Parallel track owned by internal AI SME. 12-month roadmap. Not an in-scope deliverable β€” but must be formally recommended now.
Owner: Internal AI SME.

πŸ“‘ OCR Pipeline (Purview)

Why: Without OCR enabled, image-based exfiltration β€” scanned documents, screenshots, image attachments β€” is entirely invisible to DLP. A significant blind spot for organizations handling paper-originated PHI and regulated documents.
Recommend: Enable for high-risk locations once licensing confirmed. Pay-as-you-go scope to be verified.
Status: Not deployed.

🧠 Local LLM Track

Why: On-premises or private-Azure LLM with no external data dependency. Unlimited customization for client-specific workflows vs. Copilot's constraints. Long-horizon: enables private AI enrichment of DLP alerts without PHI leaving the tenant.
Recommend: 12-month feasibility exploration. Hosting model (on-prem vs. Azure Private) and funding model to be determined.
Owner: Internal AI SME.

πŸ—οΈ AI Builder (Power Platform)

Why: Low-code AI automation layer for Power Platform workflows β€” form processing, approval routing, document classification, and integration with Purview outputs.
Recommend: Use before November 1, 2026. Evaluate active workflows for migration path.
⚠️ Credit Retirement: AI Builder credits retire November 1, 2026 and migrate to Copilot Credits. Any Power Platform AI Builder workflows must be inventoried and assessed before this date to avoid disruption.
Status: Credits active until Nov 1, 2026.

Privacy constraint β€” applies to all AI tooling: Any tool that processes PHI or PCI data must use a private endpoint with customer-managed keys (CMK) and zero external telemetry. Microsoft Security Copilot in-tenant or Azure OpenAI with private endpoint are the approved patterns. No SIT context should be sent to a model over a public API.

12-Month AI Enablement Sequence

  1. Q1: Copilot for Security pilot β€” constrained scope, private endpoint, CMK. Measure triage time reduction.
  2. Q1–Q2: Data Investigations β€” enable after legal/HR sign-off. Measure investigation time reduction.
  3. Q2: OCR pipeline β€” enable for top-risk locations (SharePoint Legal, HR, Finance). Measure new detection volume.
  4. Q2–Q3: Agent 365 evaluation β€” triage assistant or label coach pilot. Measure analyst adoption.
  5. Q3–Q4: MCP structured rollout via internal AI SME β€” formalize skills, pre-prompts, worker definitions.
  6. Year 2: Local LLM feasibility study and hosting model decision.
  7. Deadline β€” Nov 1, 2026: AI Builder credit retirement β†’ Copilot Credits migration. Inventory all Power Platform AI Builder workflows and confirm migration path before cutover.
CNC Data Security Platform Β· Module 05

Data Security Posture Management

Continuous visibility Β· Risk scoring Β· Copilot considerations Β· Cross-platform signals Β· Remediation model
DSPM Operating Model

πŸ‘οΈ Visibility

Continuous discovery across M365, cloud, and SaaS. Finds shadow copies and unexpected sensitive data locations.

πŸ“Š Risk Assessment

Scores risk: sensitivity + exposure + label presence + activity patterns. Surfaces highest-risk concentrations.

πŸ”§ Remediation

Apply labels, restrict sharing, remove stale access, update DLP scope to cover new locations.

Top Risk Signals

Critical / High Risk

  • Restricted content shared externally β†’ revoke share + IR
  • Unlabeled sensitive content β†’ auto-label policy + owner escalation
  • Copilot grounding on Restricted or Confidential PHI data
  • Confidential content in public Teams channel

Medium Risk

  • Stale external shares on sensitive files (90+ days)
  • Large volume unlabeled financial content in SharePoint
  • Overshared sites with sensitive classification content
Copilot M365 β€” Required Controls

⚠️ Pre-Deployment

Run DSPM posture assessment before enabling Copilot. Remediate unlabeled content, overshared sites, and Restricted/Confidential PHI exposure before rollout.

πŸ›‘οΈ Ongoing

Configure Copilot DLP rules. Review DSPM posture monthly post-deployment. Label-based Copilot scope restrictions required for Legal and Executive users.

References: learn.microsoft.com/en-us/purview/data-security-posture-management  Β·  learn.microsoft.com/en-us/copilot/microsoft-365/microsoft-365-copilot-privacy