Sensitivity Labels
Azure Information Protection
Azure Information Protection
Microsoft introduced sensitivity labels for Office 365 in September 2018 as a replacement for Azure Information Protection (AIP) labels. Initially, these sensitivity labels had limited functionality and required a separate client installation to apply labels to Office documents. Since then, Microsoft has continuously rolled out new features and enhancements. 2023 might be the year your organization implements sensitivity labels to protect and classify information in Exchange Online and SharePoint Online.
Sensitivity labels are part of the Microsoft Purview Information Protection product. Anyone with an Office 365 license can read documents or emails protected by these labels. To manually apply a label, users need an Office 365 E3 or higher license. For automatic, policy-driven application of labels, an Office 365 E5, Microsoft 365 E5, or Microsoft 365 E5 Compliance license is required. “Automatic” includes actions like assigning a default sensitivity label to a SharePoint document library, which also applies to default retention labels for document libraries.
Users who are not part of a Microsoft 365 tenant can still receive and access protected content. In these cases, attempts to access the content will redirect them to the Office 365 Message Encryption (OME) portal. After authentication, they can read the content.
You can manage sensitivity labels through the Information Protection section of the Microsoft Purview Compliance portal (Figure 1). Each label is assigned a priority number, starting from 0 (zero, the lowest priority). SharePoint Online utilizes this priority order to determine if users are storing confidential information on sites intended for more general access, helping to prevent label mismatches.
Managing sensitivity labels involves several tasks:
Sensitivity label functionality is divided into two broad categories:
Protection: This was the initial focus of sensitivity labels, utilizing Azure Information Protection rights management. Essentially, users can only access protected content if the creator grants them the right to do so, with the specific rights defining the actions a user can take. For instance, a user might be able to read a document but not print it. To make users aware that they are handling confidential information, sensitivity labels can add visual markers to documents and messages. For example, a label might insert text like “Confidential – Do Not Release Outside the Company” in the footer of Office documents.
Sensitivity labels also support using color as a visual indicator for the relative importance of labeled content. Labels for the most confidential material might be red, while those for less sensitive information might be yellow, green, or any other appropriate color.
The encryption keys used for protection can be managed either by Microsoft (the default) or by the tenant (BYOK, or bring your own key). Double-key encryption (DKE) is also available, where both Microsoft and the tenant manage separate keys, both of which must be available for a user to access the content. Additionally, Outlook supports sensitivity labels that use S/MIME to encrypt and apply digital signatures to emails. BYOK, DKE, and S/MIME demonstrate how Microsoft has expanded sensitivity labels to accommodate different forms of protection used by customers. However, the most common form of protection remains where Microsoft manages the encryption keys through its Rights Management service.
Container Management: Initially, a container referred to a team, group, or site. Recently, Microsoft has added OWA meetings and Teams meetings to this set (the latter requires Teams Premium licenses). Container management allows an organization to apply policies through labels. For instance, an organization might not want guest users to be members of teams handling highly sensitive information. By applying a label that disables the Guest Access setting to such a team, only administrators can add external users to the team’s membership. Another example is controlling the sharing capabilities for a SharePoint site. The same sensitivity label that prevents guest user access can also restrict the site’s external sharing capability to “Only people in your organization” (Figure 3).
Sensitivity labels can be used for both protection and container management. However, I prefer to create separate sets of labels for each function, as this approach makes label management easier to understand. The scope of the labels, as shown in Figure 1, indicates their usage: “Site, UnifiedGroup” denotes labels for container management, while “File, Email” denotes labels for protection. “Meetings” is the latest scope used to protect meetings.
Implementing sensitivity labels requires a considerable effort in planning and deployment. Even seemingly simple tasks, like label naming, require careful attention. Users are more likely to protect sensitive information correctly when guided by well-chosen names, descriptions, and limited choices. It’s challenging for users to decide between three or four similar labels. A clear, precise, and easy-to-follow naming scheme is always better than providing too many options. For example, Figure 4 shows eighteen labels, which is excessive, and some label names do not clearly indicate their intended usage.
The screenshot comes from my tenant, so I understand why so many labels are present. However, consider the average user who is asked to choose from this array of labels. The abundance of options can lead to confusion and increase the likelihood of errors.
The biggest change for sensitivity labels over the past few years is the native mode support within applications. Native mode means that an application includes code built using the Microsoft Information Protection SDK to apply, read, and respect sensitivity labels. Initially, labeling depended on a separate client (the AIP client and later the unified labeling client). Now, the Microsoft 365 enterprise desktop apps (Word, Excel, and PowerPoint), their online equivalents, and the paid version of Adobe Acrobat can interact directly with sensitivity labels. This support also extends to protecting PDFs generated by Office applications.
The unified labeling client is now in maintenance mode. However, it is still necessary for applying sensitivity labels to files stored outside Microsoft 365 or to files from applications that don’t support information protection. This article discusses how to use the client to apply sensitivity labels to the MP4 files generated from Teams meeting recordings.
Another major improvement over the last few years has been the support of sensitivity labels within SharePoint Online. Initially, while it was possible to store protected content in a document library, SharePoint Online couldn’t process the encrypted files. SharePoint Online stores item metadata separately from the blobs used to hold documents in Azure SQL, so metadata (like document names and authors) was always accessible. However, services like Microsoft Search couldn’t index the encrypted content, meaning other Microsoft 365 services like Data Loss Prevention (DLP) policies couldn’t function.
The solution is for SharePoint Online to decrypt content before storing files and to encrypt files when users access them. This allows other services to access and use protected content stored in both SharePoint Online and OneDrive for Business. Although the mechanism sounds simple, it required significant engineering effort to implement.
Before an organization can use sensitivity labels with SharePoint Online in an integrated manner, it must opt-in to support sensitivity labels. This step instructs SharePoint Online to decrypt protected content before storage.
Microsoft has made significant progress in improving and refining how sensitivity labels work across Microsoft 365. While some challenges still exist, such as the lack of APIs to allow organizations to apply sensitivity labels to content (which is coming), the overall outlook is very positive.
However, difficulties arise when dealing with scenarios beyond the day-to-day handling of Office/PDF files. Managing protected files can be especially challenging for third-party applications. For instance, backup products request data from SharePoint and download protected files, which are then copied to the backup repository. However, end-user recovery and access to these backup files are less certain. Conceptually, this challenge is easier for the forthcoming Microsoft Syntex backup service because all data remains within Microsoft, but it still requires thorough testing.
The same issue of dealing with protected content arises during tenant-to-tenant migrations, where millions of emails and documents might move from one tenant to another. User accounts created in the target tenant can open unprotected files, but it’s likely that rights assigned to protected files won’t include their email addresses, blocking access. Removing encryption from documents before the transfer is possible (the same process used to recover protected documents left by ex-employees), but it’s a slow and painful process.
Sensitivity Labels, Azure Information Protection (AIP) is a cloud-based service that helps organizations classify, label, and protect sensitive data. It enables users to apply encryption, access controls, and rights management to documents and emails, safeguarding them both within and outside the organization’s boundaries, enhancing data security and compliance.
Documents with this label will be able to be viewed by anyone. both internally and externally to the organization.
This will allow Anyone to view the document when this label is applied
Colour: Clear
Scope: Items, Files, Email’s, Groups and Sites
Content Marking: None
Auto Labelling: none
Protection Settings:
Privacy and external user access settings
External Sharing and Conditional Access:
Decryption: Information can be shared internally and with trusted partners but isnt for general public viewing
Colour: Green
Scope: Items, Files, Email’s, Groups and Sites
Protection settings
Auto Labelling: none
Protection Settings:
Privacy and external user access settings:
External Sharing and Conditional Access:
Decryption: Sensitive Information intended for specific people inside or outside of the organisation
Colour: Amber
Scope: Items, Files, Email’s, Groups and Sites
Protection settings
Access Control
Content Marking
Auto Labelling: none
Protection Settings:
Privacy and external user access settings:
External Sharing and Conditional Access:
Decryption: Sensitive Information intended for people WITHIN our organisation
Colour: Orange
Scope: Items, Files, Email’s, Groups and Sites
Protection settings
Access Control
Content Marking
Auto Labelling: none
Protection Settings:
Privacy and external user access settings:
External Sharing and Conditional Access:
Decryption: Use to communicate sensitive information but dont want to be printed, forwarded or copied.
Colour: Dark red
Scope: Items, Files, Email’s
Protection settings
Access Control
Permissions: custom
Content Marking
Auto Labelling: none
Protection Settings:
Privacy and external user access settings:
External Sharing and Conditional Access:
When an Azure sensitivity label of “Public” is applied to a document or resource, the end user can expect the following:
In essence, a “Public” sensitivity label indicates that the content is safe to be openly distributed and accessed by a wide audience without concern for security or privacy issues.
When using the “General” sensitivity label in Azure, the end user can expect the following:
In summary, the “General” sensitivity label is intended for internal or semi-public use within an organization, with moderate security controls and limited external sharing.
When using the “External Confidential” sensitivity label in Azure, the end user can expect the following:
In summary, the “External Confidential” label is used to protect sensitive content that is allowed to be shared outside the organization, but only with trusted recipients under strict access controls and security measures.
When using the “Confidential – View Only” sensitivity label in Azure, the end user can expect the following:
In summary, the “Confidential – View Only” label is used to ensure that sensitive content can be viewed but not edited, copied, printed, or shared, offering maximum protection while still allowing authorized individuals to access the information for reference purposes.
Default sensitivity label is set to General.
Sensitivity label selection option in Word.
When setting to public, will be requested to advise for the Justification.
Sensitivity label settings in outlook.
Public Sensitivity Label
– Will be able to be opened by anyone
Confidnetial Internal – when an end user who is not able to authenticate attempts to open the link.
Confidential read only – end user will not be able to screen shot, print or forward to other email addresses