DLP in Power Platform, why we use it and how to create policy for enviroment level and tenant level.

Data Loss Prevention (DLP) policies serve as indispensable safeguards in protecting organizational data and upholding information security within a tenant or enterprise environment. By combining advanced technology, comprehensive policies, and user awareness initiatives, DLP initiatives help mitigate the risks of data breaches, uphold regulatory compliance, and preserve the integrity and confidentiality of sensitive information. 

At present, let us elucidate the process of crafting Data Loss Prevention (DLP) Policies within the Power Platform, delineating procedures for both Environment Level and Tenant Level.


1. To commence, navigate to the administrative center of the Power Platform.

2). Proceed to access the Data Policies option located in the bottom left corner.

3). Now, click on the "Create New Policy" button and transition to the subsequent screen.


4). Provide the designated name for your policy.

5) Subsequently, option for the "Prebuilt Connector" selection.


When creating a Data Loss Prevention (DLP) policy in the Power Platform using the prebuilt connector option, you'll encounter three types of connector options within the "Assign Connector" section: Business, Non-Business, and Blocked. Let's explore each of these options and their implications:

Business: Connectors categorized as "Business" are typically those that adhere to organizational compliance and security standards. These connectors are considered safe for handling sensitive data and are approved for use within the organization. When you assign a "Business" connector in your DLP policy, you're essentially allowing users to access and interact with this connector without any restrictions, provided they comply with the organization's data usage guidelines and policies.

Non-Business: Connectors labeled as "Non-Business" may pose a higher risk in terms of data security or compliance. These connectors might be associated with services or applications that have not undergone thorough scrutiny or approval processes within the organization. Assigning a "Non-Business" connector in your DLP policy typically requires additional scrutiny and justification. Depending on the organization's policies, users may still be permitted to utilize these connectors, but with certain restrictions or monitoring mechanisms in place to mitigate potential risks.

Blocked: Connectors categorized as "Blocked" are deemed too risky or non-compliant for use within the organization. Assigning a "Blocked" connector in your DLP policy effectively prohibits users from accessing or utilizing this connector in their Power Platform workflows or applications. This strict restriction is imposed to prevent inadvertent exposure of sensitive data, unauthorized data transfers, or breaches of regulatory requirements.


6). For business-related correspondence, select data sources from the "Non-Business" category. Options like SharePoint, Office365Users, Outlook, OneDrive for Business, Excel, among others, are suitable choices.



7). To prevent breaches of sensitive data for social media and personal purposes, opt to block data connectors such as Gmail, Facebook, LinkedIn, Twitter, etc.


8). In the scenario where both you and another party have developed custom connectors, it's advisable to utilize the Business Policy and categorize it under the Blocked category to maintain stringent control over its usage. if you have not costume connector so ignore it.

9). Now, when defining the scope, you have three options:



A) "Add all environments": This choice encompasses all environments within the Power Platform.

B) "Add Multi-Environment": Here, you can selectively include multiple environments as per your requirements.

C) "Exclude Certain Environments": This option allows you to exclude specific environments from the policy scope, providing granularity in your control measures.


10.) If your requirement necessitates specificity for certain environments, you would opt for "Add Multi-Environment" to select those particular environments. However, for broader tenant-level requirements, you would choose "Add All Environments" to encompass all environments within your tenant.

=> Here we choose specific one enviroment.


Now go to Next Option to create new policy for specific enviorment 


Now we created successfully DLP for specific enviorment  


Now, proceed to the PowerApps studio and establish a connection to the data source. If you've selected "Business" in your data source, ensure you exclusively connect to data within the business category. Conversely, if you've opted for a "Non-Business" data source, connect solely to non-business data sources within the PowerApps studio. This meticulous selection ensures alignment with the designated categories in your DLP policy, minimizing discrepancies between matches and mismatches within the policy framework.



You're absolutely right. In Power Automate, similar principles apply for Data Loss Prevention (DLP). When creating workflows or automations, it's essential to adhere to the guidelines set forth in your DLP policies. Ensure that the connectors and data sources utilized within your Power Automate flows align with the designated categories specified in your DLP policy. This proactive approach helps maintain data security and compliance across all facets of your organization's digital operations, reinforcing a robust framework for safeguarding sensitive information.




No comments:

Post a Comment

Thanks!

Pages