Introduction to Sensitivity Labels
1. Introduction to Sensitivity Labels
In this video, we will discover Sensitivity Labels and how they can be a useful tool to catalog our Fabric Items for security and auditing purposes.2. Sensitivity labels are like document tags
Imagine sensitivity labels as color-coded folders in a filing cabinet. Red folders might contain highly confidential documents, yellow for confidential, and green for public information. We can use them as tags to identify confidential information, which can be analyzed in the auditing process to identify security risks. For example, applying a sensitivity label 'highly confidential' to a document containing customers' addresses helps you identify its sensitivity without knowing the actual data in the document.3. Sensitivity labels are managed in Purview
Sensitivity Labels are enabled and customized in Microsoft Purview, a monitoring and auditing tool that is out of the scope of this course. You can think Purview as a smart guard for your company's information. It helps find, label, and protect important data, making sure everyone treats it with the right level of care. Let's imagine that the security admin at Fashionbric have set up Purview for you.4. How to apply sensitivity labels in Fabric
When enabled, you will find the sensitivity label panel in the top menu of many fabric items like reports and dashboards. With this, you can easily flag each item according to the correct level of confidentiality. This activity should be done together with the security team, to make sure that security practices are respected.5. Why sensitivity labels are important
You may be wondering why sensitivity labels are important. First of all, it helps protect your most valuable data by controlling who can access sensitive information. They're crucial for meeting legal requirements like GDPR or ISO standards. Labels also simplify data management at a large scale by maintaining consistent standards for how information is treated. Finally, they reduce the risk of data breaches by allowing you to monitor and prevent unauthorized access.6. Let's Practice!
We’ve learned about sensitivity labels and their role in the security process. Let’s recap them with some exercises.Create Your Free Account
or
By continuing, you accept our Terms of Use, our Privacy Policy and that your data is stored in the USA.