CISA Zero Trust Maturity Model for the data pillar

This section has Microsoft guidance and recommendations for the CISA Zero Trust Maturity Model in the data pillar. See Secure data with Zero Trust for more information. The Cybersecurity & Infrastructure Security Agency (CISA) definition of data includes all structured and unstructured files and fragments that reside, or resided in, federal systems, devices, networks, applications, databases, infrastructure, and backups. The definition includes on-premises and virtual environments, also the associated metadata.

5 Data

Protect enterprise data on devices, in applications, and on networks in accordance with federal requirements. Maintain an inventory of, categorize, and label data. Protect data at rest, in transit, and in use. Deploy mechanisms to detect and stop data exfiltration. Craft and review data governance policies to ensure data lifecycles are enforced across the enterprise.

Use the following links to go to sections of the guide.

5.1 Function: Data inventory management

CISA ZTMM Stage Description Microsoft guidance and recommendations
Initial Maturity Status

Enterprise begins to automate data inventory processes for both on-premises and in cloud environments, covering most Enterprise data, and begins to incorporate protections against data loss.
Microsoft Purview Information Protection
Classify data based on sensitive information types.
- Sensitive data and Purview
- Label policies

Define and apply container sensitivity labels: Microsoft Teams sites, Microsoft 365 groups, and Microsoft SharePoint sites.
Sensitivity labels

Microsoft Purview data governance
Use Purview governance solutions for automated scans of on-premises, multicloud, and Software as a Service (SaaS) data sources.
Microsoft Purview

Microsoft Purview Data Estate Insights
Governance stakeholders use this feature for data management, compliance, and for data use roles, such as Chief Data Officer. Use insights about data estate, catalog usage, adoption, and processes.
Insights reports, inventory, and ownership

Microsoft Purview Endpoint data loss prevention
Monitor actions taken on sensitive items and help prevent unintentional sharing.
Device list, device status

Advanced Maturity Status

Enterprise automates data inventory and tracking enterprise-wide, covering all applicable Enterprise data, with data loss prevention strategies based upon static attributes and/or labels.
Microsoft Purview sensitive information types
In the Purview compliance portal, review and define custom, sensitive information types. Use classifiers trained by machine learning (ML).
- Custom sensitive info types
- Trainable classifiers

Microsoft Purview content explorer
In content explorer and\or activity explorer, view identified Microsoft 365 content and associated user activities.
- Content explorer
- Activity explorer

Microsoft Purview sensitivity labels
Create and publish sensitivity labels according to your data label standards.
- Sensitivity labels and policy
- Labels in Microsoft 365

Microsoft Purview Data Loss Prevention
Create and publish DLP policies based on labels. For instance, prevent external sharing with content labeled Internal Only or Confidential. Include context and other sensitive information types.
Data loss prevention

Microsoft Purview Endpoint data loss prevention
Monitor actions taken on sensitive items and help prevent unintentional sharing.
Device list, device status

Optimal Maturity Status

Enterprise continuously inventories all applicable Enterprise data and employs robust data loss prevention strategies that dynamically block suspected data exfiltration.
Microsoft Purview content explorer
Use content explorer PowerShell to export inventory information about your sensitive content. Use a security information and event management (SIEM) app, or other analysis tools to create reports on data types to protect.
Content explorer PowerShell

Microsoft Purview Information Protection
Configure client-side labels for files and emails created in Microsoft Office applications.
Autolabeling for Office apps

Configure service-side labels for content stored in Microsoft 365.
Autolabeling in SharePoint, OneDrive, and Exchange

To find documents and emails in your environment with sensitive data, such as employee personally identifying information (PII), scan it for data that matches known data sources.
Exact data match

Use document fingerprinting to find and label content that matches highly sensitive documents, templates, and forms.
Document fingerprinting

Microsoft Purview data governance
Register data sources, scan, ingest, and classify data in the Purview governance portal.
- Data sources
- Scans and ingestion
- Data classification
- Supported sources
- Apply classification
- Protection policy for Azure
- Protection policies in Microsoft Fabric

Microsoft Purview Data Loss Prevention
Control how data is shared, and enable actions that prevent misuse. Collect evidence from devices and simulate policy before deployment.
- Protective actions
- On-premises repositories
- Collect evidence in devices
- Simulate before deployment

Microsoft Purview Endpoint data loss prevention
Monitor actions taken on sensitive items and help prevent unintentional sharing.
Device list, device status

Microsoft Purview Insider Risk Management
Create data loss prevention (DLP) policies with Insider Risk Management Risky User detection for Adaptive Protection.
- Adaptive protection
- Microsoft Entra Conditional Access

Microsoft Defender for Cloud Apps
Enable app governance in Defender for Cloud Apps to monitor app connectivity and access to enterprise data.
App governance

Conditional Access app control
Use app control’s reverse proxy architecture to enforce app access, based on defined conditions such as user groups, cloud apps, and network locations. Defined users are routed to Microsoft Defender for Cloud Apps to apply access and session controls.
- Session controls
- App control

5.2 Function: Data categorization

CISA ZTMM Stage Description Microsoft guidance and recommendations
Initial Maturity Status

Enterprise begins to implement a data categorization strategy with defined labels and manual enforcement mechanisms.
Microsoft Purview Information Protection
Categorize data based on sensitive information types.
- Sensitive data
- Label policy
- Know your data

Microsoft Purview data governance
Register data sources, scan, ingest, and classify data in the Purview governance portal. Explore and understand your data.
- Data catalog
- Data sources
- Scans and ingestion
- Data classification
- Supported data sources
- Apply data classification

Advanced Maturity Status

Enterprise automates some data categorization and labeling processes in a consistent, tiered, targeted manner with simple, structured formats and regular review.
Microsoft Purview Information Protection
Automate data categorization, based on sensitive information types and classifiers trained by machine learning (ML).
- Sensitive data
- Label policy

Configure client-side labels for files and emails created in Microsoft Office applications.
Autolabeling for Office apps

Configure service-side labels for content stored in Microsoft 365.
Autolabeling in SharePoint, OneDrive, and Exchange

Create and publish sensitivity labels in Purview, according to enterprise data label standards. Configure policy that requires users to apply needed sensitivity labels to emails and documents.
Apply labels

Microsoft Purview data governance
Register data sources, scan, ingest, and classify data in the Purview governance portal. Explore and understand your data.
- Data catalog
- Data sources
- Scans and ingestion
- Data classification
- Supported data sources
- Apply data classification

Optimal Maturity Status

Enterprise automates data categorization and labeling enterprise-wide with robust techniques; granular, structured formats; and mechanisms to address all data types.
Microsoft Purview Information Protection
Review sensitive information types in the Purview compliance portal. Define custom sensitive information types. To detect data matching in known data sources, create exact-match sensitive information types.
- Sensitive information types
- Exact Data Match

Use trainable classifiers in Purview to recognize content with machine learning (ML). Create and train classifiers with human-picked and positively matched samples.
Trainable classifiers

Microsoft Purview content explorer
Use content explorer PowerShell commandlets to export a list of sensitive assets. Use a security information and event management (SIEM) app, or other reporting tools, for analysis. Determine whether protection levels and location access align with the detected sensitive data.
Review sensitive information-type matches in content explorer for relevant classifiers. Identify false positives and negatives. To minimize misclassification, regularly adjust custom classifiers and trainable classifier definitions.
Content explorer PowerShell

Microsoft Purview data governance
Register data sources, scan, ingest, and classify data in the Purview governance portal. Explore and understand your data.
- Data catalog
- Data sources
- Scans and ingestion
- Data classification
- Supported data sources
- Apply data classification

5.3 Function: Data availability

CISA ZTMM Stage Description Microsoft guidance and recommendations
Initial Maturity Status

Enterprise makes some data available from redundant, highly available data stores (e.g., cloud) and maintains off-site backups for on-premises data.
Microsoft cloud services
Microsoft Azure ensures high availability and redundancy with features like geo-zone-redundant storage (GZRS), zone redundant storage (ZRS), and Azure Site Recovery. These features replicate data across zones and regions.
Microsoft 365 enhances data security and compliance with data residency policies, data retention programs, and vulnerability remediation processes. Enable reliable and secure data storage solutions, and help ensure business continuity and regulatory compliance.
- Resiliency and continuity
- Data resiliency in Microsoft 365

Microsoft Purview Data Lifecycle Management
Use Data Lifecycle Management and Purview records management to govern data compliance or regulatory requirements.
Data Lifecycle Management

Microsoft OneDrive, Microsoft SharePoint
Use the platforms for off-site backup and data sharing.
Set up OneDrive

Azure Backup
Use Azure Blob Storage for redundant and highly available data storage. Back up on-premises resources to the cloud. Geo-redundancy options ensure data replicates across regions.
Azure Backup

Microsoft Purview data governance
Register data sources, scan, ingest, and classify data in the Purview governance portal. Explore and understand your data.
- Data catalog
- Data sources
- Supported data sources

Microsoft Purview Information Protection
Use content explorer and\or activity explorer to view identified Microsoft 365 content and associated user activities.
- Content explorer
- Activity explorer

Advanced Maturity Status

Enterprise primarily makes data available from redundant, highly available data stores and ensures access to historical data.
Microsoft Purview data governance
Manage data with an AI-powered and unified approach. Use data cataloging, lineage, and classification to ensure data, including historical data, is organized and accessible.
- Data Lifecycle Management
- Data catalog
- Data sources
- Scans and ingestion
- Supported data sources

Microsoft Purview Information Protection
Use content explorer and\or activity explorer to view identified Microsoft 365 content and associated user activities.
- Content explorer
- Activity explorer

Microsoft SharePoint Online
Data was migrated to SharePoint Online, and it’s the default data location, including historical data shared across the enterprise. Retention policies extend to SharePoint Online data.
SharePoint and OneDrive in Microsoft 365

Microsoft Purview Data Catalog
Use Purview data governance and Data Catalog to inventory sensitive structured data assets and define data governance controls.
Data governance experience

Optimal Maturity Status

Enterprise uses dynamic methods to optimize data availability, including historical data, according to user and entity need.
Microsoft Purview data governance
Manage data with an AI-powered, and unified approach. Use data cataloging, lineage, and classification to ensure data, including historical data, is organized and accessible.
- Data Lifecycle Management
- Data catalog
- Data sources
- Supported data sources

Microsoft Purview Information Protection
Use content explorer and\or activity explorer to view identified Microsoft 365 content and associated user activities.
- Content explorer
- Activity explorer

Azure Files
The default is cloud hosted locations for enterprise data; it includes file shares, SQL, and data analytics with the Power BI service, and other data tools.
- Azure Files
- Azure SQL
- Azure and Power BI

5.4 Function: Data access

CISA ZTMM Stage Description Microsoft guidance and recommendations
Initial Maturity Status

Enterprise begins to deploy automated data access controls that incorporate elements of least privilege across the enterprise.
Microsoft Purview Information Protection
Define data classification standards and a labeling taxonomy that align with policies. Deploy sensitivity labels and enable users to apply them to documents.
- Sensitive data
- Label policy

Microsoft Purview Data Loss Prevention
Run policy in simulation mode and see the effects before enforcement.
Simulate before deployment

Advanced Maturity Status

Enterprise automates data access controls that consider various attributes such as identity, device risk, application, data category, etc., and are time limited where applicable.
Microsoft Purview Information Protection
Implement access controls for sensitive files. At a minimum, implement differentiation between materials shared and not shared with nongovernment workers or foreign individuals. Define categories for content shared outside the enterprise. Consider more granularity for data classification, based on your current confidentiality standards.
Sensitivity labels and access

Configure sensitivity label policies to apply labels to files and emails created in Microsoft Office applications.
Autolabeling for Office apps

Configure service-side labels for content stored in Microsoft 365.
Autolabeling for SharePoint, OneDrive, and Exchange

Microsoft Purview Data Loss Prevention
Monitor user activity, protect on-premises repositories, and collect evidence from devices. Simulate policy before deployment.
- Protective actions
- On-premises repositories
- Collect evidence from devices
- Simulate before deployment

Optimal Maturity Status

Enterprise automates dynamic just-in-time and just-enough data access controls enterprise-wide with continuous review of permissions.
Microsoft Purview Information Protection
Labels restrict access to groups that require access. For example, files with sensitive HR data are labeled and have resulting access controls.
Sensitivity labels and access

Microsoft Purview Data Loss Prevention
Monitor user activity, protect on-premises repositories, and collect evidence from devices. Simulate policy before deployment.
- Protective actions
- On-premises repositories
- Collect evidence from devices
- Simulate before deployment

Microsoft Defender for Cloud Apps
Access policies use Conditional Access app control for real-time monitoring and cloud app access controls.
Access policy

Use session policies for granular visibility into cloud apps with real-time, session-level monitoring.
Session policy

Microsoft Entra ID Governance
Use entitlement management to bundle resources in access packages. Facilitate user assignments to resources with just-in-time (JIT) access. Automate just-enough-access (JEA) controls with access reviews.
- Entitlement management scenarios
- Privileged Identity Management
- Access reviews

5.5 Function: Data encryption

CISA ZTMM Stage Description Microsoft guidance and recommendations
Initial Maturity Status

Enterprise encrypts all data in transit and, where feasible, data at rest and data in use (e.g., mission critical data and data stored in external environments) and begins to formalize key management policies and secure encryption keys.
Microsoft 365 encryption
Use baseline, volume-level encryption with the Windows security feature BitLocker and Distributed Key Manager (DKM). Microsoft 365 assets use encrypted storage.
Encryption in Microsoft 365

Microsoft Purview sensitivity labels
Use sensitivity label policies to apply persistent encryption at the document, or email, level for high-risk data in Microsoft 365.
- Encrypt documents
- Email encryption

Microsoft Purview Data Loss Prevention
Monitor user activity, protect on-premises repositories, and collect evidence from devices. Simulate policy before deployment.
- Protective actions
- On-premises repositories
- Collect evidence from devices
- Simulate before deployment

Microsoft Defender for Cloud Apps
Use session policies for granular visibility into cloud apps with real-time, session-level monitoring.
Session policy

Advanced Maturity Status

Enterprise encrypts all data at rest and in transit across the enterprise to the maximum extent possible, begins to incorporate cryptographic agility, and protects encryption keys (i.e., secrets aren't hard coded and are rotated on a regular basis).
Microsoft Purview sensitivity labels
The enterprise uses label policies with access controls, based on Microsoft Entra groups. Access control covers users, partners, vendors, and external users in the environment.
Sensitivity labels and access

Microsoft Purview Data Loss Prevention
Monitor user activity, protect on-premises repositories, and collect evidence from devices. Simulate policy before deployment.
- Protective actions
- On-premises repositories
- Collect evidence from devices
- Simulate before deployment

Microsoft Defender for Cloud Apps
Use session policies for granular visibility into cloud apps with real-time, session-level monitoring.
Session policy

Optimal Maturity Status

Enterprise encrypts data in use where appropriate, enforces least privilege principles for secure key management enterprise-wide, and applies encryption using up-to-date standards and cryptographic agility to the extent possible.
Microsoft Purview sensitivity labels
Label policies are deployed with access control mechanisms for sensitive data. Access is restricted with least privilege principles. Enforce use of labels and access controls with content detection in Microsoft Exchange, Microsoft OneDrive, and Microsoft SharePoint.
- Sensitivity labels and access
- Sensitivity labels in Microsoft 365

Microsoft Purview Data Loss Prevention
Monitor user activity, protect on-premises repositories, and collect evidence from devices. Simulate policy before deployment.
- Protective actions
- On-premises repositories
- Collect evidence from devices
- Simulate before deployment

Microsoft Defender for Cloud Apps
Use session policies for granular visibility into cloud apps with real-time, session-level monitoring.
Session policy

5.6 Function: Visibility and analytics

CISA ZTMM Stage Description Microsoft guidance and recommendations
Initial Maturity Status

Enterprise obtains visibility based on data inventory management, categorization, encryption, and access attempts, with some automated analysis and correlation.
For more information, see section 5.1 Function: Data inventory management.

Microsoft Purview Data Catalog
For visibility into your structured data assets, manage, and categorize inventories.
Data Catalog

Microsoft Entra ID
Monitor Microsoft Entra ID sign-in logs for visibility based on initial access attempts.
- Monitoring and health
- Sign-in logs

Microsoft Graph activity logs
Microsoft Graph logs in Microsoft Entra enable visibility into access attempts with information about user sign-in and resource access. Use logging to monitor authentication events, identify potential security threats, and ensure compliance with access policies.
Access activity logs

Microsoft Purview content explorer
To understand sharing and access patterns, also to identify reporting needs, use content explorer and activity explorer. Investigate access and sensitive data sharing cases.
- Activity explorer
- Content explorer

Microsoft Purview Data Loss Prevention
Implement DLP policies to monitor and manage sensitive data sharing.
Data Loss Prevention

Advanced Maturity Status

Enterprise maintains data visibility in a more comprehensive, enterprise-wide manner with automated analysis and correlation and begins to employ predictive analytics.
Microsoft Purview Data Map
Enhance enterprise-wide structured data visibility with a data map. Integrate metadata and classification.
Data Map

Microsoft Purview insights
Use advanced analytics for correlation of, and predictive insights about, data security.
- Data Estate Insights
- Asset insights

Microsoft Purview Insider Risk Management
Create data loss prevention (DLP) policies with Insider Risk Management Risky User detection for Adaptive Protection.
- Adaptive protection
- Conditional Access and adaptive protection

Microsoft Purview content explorer
Use content explorer PowerShell to export inventory information about your sensitive unstructured content, such as Office files. To create reports about data types to protect, use a security information and event management (SIEM) app, or other analysis tools.
- Content explorer PowerShell
- Advanced monitoring

Optimal Maturity Status

Enterprise has visibility across the full data lifecycle with robust analytics, including predictive analytics, that support comprehensive views of Enterprise data and continuous security posture assessment.
Microsoft Purview Data Catalog, data classification
Achieve lifecycle visibility and data management with continuous classification and cataloging.
Data classification with Purview

Microsoft Entra Conditional Access
Integrate with Purview to manage and assess access controls. Ensure continuous alignment with security policies.
Elevated insider risk

Microsoft Purview Insider Risk Management analytics
Conduct an evaluation of predictive insider risks without configuring insider risk policies. Identify potential higher user risk. Determine insider risk management policy types and scope.
Enable analytics

Microsoft Sentinel
Continuously assess data security. Integrate insights from Purview for a view of your security posture.
Data security with Sentinel

Microsoft SharePoint, unified audit log, Sentinel
Monitor sensitive information sharing and access. To analyze access and sharing patterns, integrate the Microsoft 365 unified audit log with a security information and event management (SIEM) app.
- SharePoint sharing schema
- Data loss prevention schema
- Microsoft Sentinel
- SharePoint Advanced Management

Microsoft Purview Information Protection
To understand sharing and access patterns, also to identify reporting needs, use content explorer and activity explorer to review access and sensitive data sharing cases.
- Content explorer
- Activity explorer

5.7 Function: Automation and orchestration

CISA ZTMM Stage Description Microsoft guidance and recommendations
Initial Maturity Status

Enterprise uses some automated processes to implement data lifecycle and security policies.
Microsoft Purview Data Catalog
To implement lifecycle and security policies, use automated data classification and cataloging.
Data Catalog

Microsoft Defender for Cloud
Implement automated security policies and monitor data resources.
Defender for Cloud

Microsoft Purview Information Protection
To understand sharing and access patterns, also to identify reporting needs, use content explorer and activity explorer to review access and sensitive data sharing cases.
- Content explorer
- Activity explorer

Microsoft Purview data governance
Manage data with an AI-powered and unified approach. Use data cataloging, lineage, and classification to ensure data, including historical data, is organized and accessible. Explore and understand your data.
- Data Lifecycle Management
- Data catalog
- Data sources
- Supported data sources

Advanced Maturity Status

Enterprise implements data lifecycle and security policies primarily through automated methods for most Enterprise data in a consistent, tiered, targeted manner across the enterprise.
Microsoft Purview Data Map, insights
Implement advanced automation for data classification, retention, and security policies across data tiers and classifications.
Data Map

Microsoft Entra ID Governance
Use identity governance and automated policy enforcement for a range of data resources.
Microsoft Entra ID Governance

Microsoft Defender for Cloud
Enable automated security policy enforcement across data resources.
Data security in Defender for Cloud

Microsoft Purview data governance
Manage data with an AI-powered and unified approach. Use data cataloging, lineage, and classification to ensure data, including historical data, is organized and accessible. Explore and understand your data.
- Data Lifecycle Management
- Data catalog
- Data sources
- Supported data sources

Optimal Maturity Status

Enterprise automates, to the maximum extent possible, data lifecycles and security policies for all Enterprise data across the enterprise.
Microsoft Purview
Automate data lifecycle management, classification, and security policies using integrated features across data assets.
Data management with Purview

Microsoft Defender for Cloud
Achieve automated data security policies, threat detection, and response across enterprise data.
Automation with Defender for Cloud

Microsoft Sentinel
Automate monitoring, respond to, and manage data security policies.
Advanced monitoring

Microsoft 365 connector for Microsoft Sentinel
To analyze access and sharing patterns, integrate the Microsoft 365 unified audit log with a security information and event management (SIEM) app.
- SharePoint sharing schema
- Data loss prevention schema
- Microsoft Sentinel
- Microsoft 365 connector for Sentinel

Microsoft Purview Information Protection
To understand sharing and access patterns, also to identify reporting needs, use content explorer and activity explorer to review access and sensitive data sharing cases.
- Content explorer
- Activity explorer

Microsoft Purview data governance
Manage your data with an AI-powered and unified approach. Use data cataloging, lineage, and classification to ensure data, including historical data, is organized and accessible. Explore and understand your data.
- Data Lifecycle Management
- Data catalog
- Data sources
- Supported data sources

5.8 Function: Governance

CISA ZTMM Stage Description Microsoft guidance and recommendations
Initial Maturity Status

Enterprise defines high-level data governance policies and relies primarily on manual, segmented implementation.
Microsoft Purview data governance
Manage data with an AI-powered and unified approach. Use data cataloging, lineage, and classification to ensure data, including historical data, is organized and accessible.
- Data Lifecycle Management
- Data catalog
- Data sources
- Supported data sources

Microsoft Purview Data Lifecycle Management
Implement retention and deletion policies on documents with retention labels.
Data Lifecycle Management

Advanced Maturity Status

Enterprise begins integration of data lifecycle policy enforcement across the enterprise, enabling more unified definitions for data governance policies.
Microsoft Purview data governance
Manage data with an AI-powered and unified approach. Use data cataloging, lineage, and classification to ensure data, including historical data, is organized and accessible. Explore and understand your data.
- Data Lifecycle Management
- Data catalog
- Data sources
- Supported data sources

Microsoft Purview Data owner policy
Use data owner policies to manage access to user data in sources registered for data policy enforcement in Purview.
Data owner policy

Microsoft Defender for Cloud
For an automated and integrated enforcement, implement enterprise-wide data security and lifecycle management policies.
Data security with Defender for Cloud

Microsoft Sentinel
Unify monitoring and data governance policy enforcement.
Advanced monitoring

Optimal Maturity Status

Enterprise data lifecycle policies are unified to the maximum extent possible and dynamically enforced across the enterprise.
Microsoft Purview data governance
Manage your data with an AI-powered and unified approach. Use data cataloging, lineage, and classification to ensure data, including historical data, is organized and accessible.
- Data Lifecycle Management
- Data catalog
- Data sources
- Supported data sources

Microsoft Purview Insider Risk Management adaptive protection
Adaptive protection uses machine learning to identify critical risks and apply protection controls.
- Mitigate risks

Microsoft Purview Insider Risk Management
Create data loss prevention (DLP) policies with Insider Risk Management Risky User detection for Adaptive Protection.
- Adaptive protection in data loss prevention
- Conditional Access and adaptive protection
- Mitigate risks

Microsoft Defender for Cloud
Achieve automated and dynamic data security policy enforcement for your enterprise data.
Automation with Defender for Cloud

Next steps

Configure Microsoft Cloud Services for the CISA Zero Trust Maturity Model.