📄️ 001: Sensitive data discovery
Overview
📄️ 002: Document / Identify all approved cross-boundary data sharing scenarios
Overview
📄️ 003: Document / Identify approved sharing of sensitive information with external partners
Overview
📄️ 004: Identify sharing with customers
Overview
📄️ 005: Data governance regulatory needs
Overview
📄️ 006: Define a data classification taxonomy for the organization based on data sensitivity
Overview
📄️ 007: Identify Automatic Classification cases
Overview
📄️ 008: Manually classify sensitive assets
Overview
📄️ 009: Implement label recommendations
Overview
📄️ 010: Monitor external sharing
Overview
📄️ 011: Monitor sharing with customers
Overview
📄️ 012: Deploy Data Loss Prevention policies
Overview
📄️ 013: Manage DLP Alerts & Incidents
Overview
📄️ 014: Restrict and monitor sharing by employees
Overview
📄️ 015: Automatically label sensitive assets
Overview
📄️ 016: Identify sensitive data using Trainable Classifiers
Overview
📄️ 017: Implement SharePoint Permission Strategy
Overview
📄️ 018: Set Insider Risk Management policies
Overview
📄️ 019: Privileged Access Management for DLP/MIP/IRM Admins
Overview
📄️ 020: Set RBAC for DLP/MIP/IRM Admins
Overview
📄️ 021: Set minimum standards for trusted devices / accounts
Overview
📄️ 022: Segment administration using Administrative Units and RBAC
Overview
📄️ 023: Identify Critical Assets
Overview
📄️ 024: Plan for the protection of Critical Assets
Overview
📄️ 025: Protect Critical Assets
Overview
📄️ 026: Evaluate and implement special cryptographic needs (BYOK, DKE)
Overview