ASD's Blueprint for Secure Cloud

Information labelling and classification

This section describes the design decisions associated with the labelling and classification of information with Microsoft Purview for system(s) built using ASD's Blueprint for Secure Cloud.

Estimated reading time: 9 minutes

Labelling and classification

The labelling and classification of information are key capabilities within the Microsoft Purview suite:

  • Labels are logical tags, unique to each Purview tenant or organisation, that enable the control and categorisation of information in accordance with operational, security and privacy requirements.
  • Classifiers are patterns and rules that assist the identification of data types within information.

Implementing sensitivity labels

Sensitivity labels are applied or associated with certain types of emails, documents and containers within Microsoft 365 services, applications and endpoints, this process is primarily to provide content marking and to mitigate unauthorised access.

Implementing sensitive information types

Sensitive information types are pattern-based classifiers that can be developed to identify information with a degree of confidence for any number of use cases. While the development of sensitive information types can be straightforward, implementing them can be difficult without knowledge of the organisational specific context in which information is stored, used and shared. Implementation without considering this context can result in excess false positive or false negatives, excess administrative alerts or events, and a poor user experience.

Auto-labelling and data loss prevention policy configurations using sensitive information types have not been specified. However, organisations should use the provided sensitive information type configurations as a starting point to develop their own, organisational specific policies. Such policies can be used in simulation mode to assess their effectiveness before being set to enforce. Example use cases include:

  • Detecting unlabelled information, or emails or documents with markings but without a label
  • Detecting mis-labelled information
  • Detecting malicious label downgrades
  • Mapping historical PSPF markings to current equivalents
  • Detecting sensitive personal, financial or technical information
  • Detecting SECRET or TOP SECRET information

Applying labels

Sensitivity labels can be applied by default, manually or automatically, with the method selected being dependent on the Microsoft 365 service, application or endpoint used, and an organisation’s ability to implement classifiers.

Default labels are not able to be widely used in a security context without understanding the risks associated with mis-labelled information, and the potential lack of personal accountability for PSPF marking decisions. Auto-labelling has similar risks which can be minimised by ensuring the trigger for an auto-labelling action is based on relatively deterministic conditions, like an email’s X-Protective-Marking X-header value, for example. Residual risks can be mitigated to a degree by the use of sensitive information types (or other classifiers) to detect, alert and prompt the user to take action on mis-labelled or incorrectly marked information.

Auto-labelling can be performed via client-side (end-user application) or service-side (Microsoft 365 service) mechanisms, with the latter offering more flexibility in choosing conditions for labelling triggers. Service-side auto-labelling polices are able to be used in conjunction with data loss prevention policies to apply email X-header and subject markings to incoming and outgoing emails, respectively, and are discussed in more detail in the email handling page.

Changing labels

Similar to the initial application of a sensitivity label, a label can also be changed manually or automatically depending on the Microsoft 365 service, application or endpoint used, and an organisation’s ability to implement classifiers.

Label naming, priority and grouping

While a sensitivity label’s name can be arbitrary, it’s important that users are easily able to associate the label with its purpose of controlling or categorising information. Labels can be created with a priority order and grouped to determine how they will display in applications, the priority of auto-labelling rules will apply when labelling conflicts occur, and the user experience when changing labels or moving labelled information.

The suggested sensitivity label naming, priority ordering and grouping is:

  • UNOFFICIAL
  • OFFICIAL
  • OFFICIAL Sensitive (group)
    • OFFICIAL Sensitive
    • Personal Privacy
    • Legal Privilege
    • Legislative Secrecy
  • OFFICIAL Sensitive NATIONAL CABINET (group)
    • OFFICIAL Sensitive NATIONAL CABINET
    • Personal Privacy
    • Legal Privilege
    • Legislative Secrecy
  • PROTECTED (group)
    • PROTECTED
    • Personal Privacy
    • Legal Privilege
    • Legislative Secrecy
  • PROTECTED NATIONAL CABINET (group)
    • PROTECTED NATIONAL CABINET
    • Personal Privacy
    • Legal Privilege
    • Legislative Secrecy
  • PROTECTED CABINET (group)
    • PROTECTED CABINET
    • Personal Privacy
    • Legal Privilege
    • Legislative Secrecy

Label publishing

Sensitivity labels must be published to specific users or groups which then allows them to be applied in supported Microsoft 365 applications and workflows.

Content marking

When a sensitivity label is applied to a document, email or meeting invite the process can add a watermark, header or footer to mark the information.

Access control

The access controls associated with sensitivity labels use Azure Rights Management usage rights and can be used to not only ensure the correct users are permitted or denied access, but can be used to apply encryption to documents, control offline access to information, and to restrict the specific operations allowed on information. These controls provide an effective means of mitigating risks associated with unauthorised access, and also serve to compliment and backstop many other related Microsoft 365 access controls and third party security services.

How label access controls are implemented is discussed in more detail in the Azure Rights Management page.

Privacy

A sensitivity label can be used to apply privacy settings that will replace any existing privacy settings configured for a team or group site.

External sharing

A sensitivity label can be used to apply external sharing settings that provide restricted external sharing settings to what may be configured in SharePoint Online and at the container level. If there is a conflict in sharing permissions, the most restrictive sharing settings will always apply.

Conditional Access

By associating a sensitivity label with a Conditional Access Authentication Context, it is possible use the presence of a label as a condition to enforce a Conditional Access policy.

Security & Governance

Design

Configuration

Tools

References

Do you have a suggestion on how the above page could be improved? Get in touch! ASD's Blueprint for Secure Cloud is an open source project, and we would love to get your input. Submit an issue on our GitHub, or send us an email at blueprint@asd.gov.au

Acknowledgement of Country icon

Acknowledgement of Country
We acknowledge the Traditional Owners and Custodians of Country throughout Australia and their continuing connections to land, sea and communities. We pay our respects to them, their cultures and their Elders; past, present and emerging. We also recognise Australia's First Peoples' enduring contribution to Australia's national security.

Authorised by the Australian Government, Canberra