Azure data loss

azure_learner 615 Reputation points
2025-04-09T15:48:03.52+00:00

Hi Friends, I need a comprehensive framework on DLP Azure Data Loss Prevention works in Azure, and in particular with ADLS and Blob storage services.

What are the key ingredients of DLP? Detailed explanations with useful links would be appreciated. Meanwhile, I went through these links :

https://learn.microsoft.com/en-us/purview/dlp-overview-plan-for-dlp

https://www.microsoft.com/en-us/security/business/security-101/what-is-data-loss-prevention-dlp    Thank you.

Azure Data Factory
Azure Data Factory
An Azure service for ingesting, preparing, and transforming data at scale.
11,625 questions
0 comments No comments
{count} votes

Accepted answer
  1. Chandra Boorla 14,585 Reputation points Microsoft External Staff Moderator
    2025-04-09T18:00:56.41+00:00

    @azure_learner

    Great question - and good to see you have already reviewed the foundational resources from Microsoft!

    I need a comprehensive framework on DLP Azure Data Loss Prevention works in Azure, and in particular with ADLS and Blob storage services.

    Here’s a comprehensive framework that explains how Data Loss Prevention (DLP) works in Azure, specifically in the context of Azure Data Lake Storage (ADLS) and Azure Blob Storage. This includes core principles, technical components, and how to apply governance and protection using Microsoft Purview, Defender for Storage, and related Azure services.

    What is DLP in Azure?

    Data Loss Prevention (DLP) refers to a combination of technologies and processes that identify, monitor, and protect sensitive data to prevent unintentional disclosure or unauthorized access.

    In Azure, DLP is not a single tool, but a framework powered by:

    • Microsoft Purview (data classification, labeling, DLP policies),
    • Azure Security & Compliance controls (RBAC, encryption, private endpoints),
    • Microsoft Defender for Storage (threat detection),
    • Microsoft Sentinel (monitoring and automation).

    Currently, DLP doesn’t natively scan or block uploads to Blob/ADLS like it does for Microsoft 365. However, you can build an indirect enforcement model using:

    • Purview for scanning/classification
    • Defender for threat detection
    • Information Protection labels
    • Access and logging policies

    What are the key ingredients of DLP? Detailed explanations with useful links would be appreciated.

    Key Building Blocks of DLP for ADLS and Blob Storage:

    # Component Purpose Tools / Services Documentation
    1 Data Discovery & Classification Automatically scan and tag sensitive data (e.g., PII, PHI, financial records). Microsoft Purview Purview Classification Overview
    2 Sensitivity Labels Apply encryption, content marking, or access restrictions at the file level. Labels can persist with the data. Microsoft Information Protection (MIP) Sensitivity Labels Overview
    3 DLP Policies Define rules to detect and prevent risky behaviors (e.g., uploading PII to public storage). Microsoft Purview DLP (mainly for M365, endpoints) Purview DLP Planning
    4 Access Control & Identity Management Prevent unauthorized access using RBAC, ACLs, and conditional access. Azure RBAC, ADLS POSIX ACLs, Azure AD Access Control in Azure Storage
    5 Encryption Protect data at rest and in transit using Microsoft-managed or customer-managed keys (CMK). Azure Storage Encryption, Azure Key Vault Azure Storage Encryption
    6 Network Controls Restrict data access from public networks using firewalls, private endpoints, or service endpoints. Azure Virtual Network, Private Link Azure Storage Firewalls & Networks
    7 Threat Detection Detect anomalous access patterns, malware upload attempts, or mass deletions. Microsoft Defender for Storage Defender for Storage Overview
    8 Logging & Auditing Monitor data access and actions for compliance and investigations. Azure Monitor, Diagnostic Logs, Microsoft Sentinel Monitor Azure Storage
    9 Policy Enforcement Prevent misconfigurations (e.g., public Blob containers) and ensure security standards. Azure Policy, Azure Blueprints Azure Policy Samples
    10 Incident Response Automation Trigger workflows when DLP rules or threats are detected. Microsoft Sentinel, Azure Logic Apps Automate Response with Sentinel

    Summary:

    Microsoft Purview can scan and classify data in Blob and ADLS Gen2.

    Native DLP enforcement (e.g., block copy/download/upload) is not available yet for Blob/ADLS.

    Enforcement is limited to Microsoft 365, Exchange, SharePoint, Teams, and endpoints.

    You can still build indirect enforcement using Azure Policy, Defender for Storage, Microsoft Sentinel, and Logic Apps.

    I hope this information helps. Please do let us know if you have any further queries.


    If this answers your query, do click Accept Answer and Yes for was this answer helpful. And, if you have any further query do let us know.

    0 comments No comments

0 additional answers

Sort by: Most helpful

Your answer

Answers can be marked as Accepted Answers by the question author, which helps users to know the answer solved the author's problem.