Getting in touch with information protection

In the following section, we will dive into advanced Access Control for information on protection solutions.

Overview and needs

There was an interesting presentation from Dan Plastina, a product manager at Microsoft, which asked a very important question: 'Why do you seek to protect information?' The following answers were given in an actual survey:

  • 96% - Reduce leakage of data shared with others (B2B collaboration)
  • 94% - Partitioning of sensitive data from unauthorized users
  • 89% - Preventing malicious employees from leaking secrets
  • 87% - Meeting compliance requirements

Exactly because of these needs, we need to think about an information protection strategy in our solution design in order to provide the following: ...

Get Mastering Identity and Access Management with Microsoft Azure now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.