Skip to main content

Data Protection Requirements

Microsoft Purview Information Protection addresses four fundamental problems in regulated data environments:

  1. Discovery — Where is sensitive data? Content Explorer maps labeled content across SharePoint, OneDrive, Exchange, and Teams. The Purview Information Protection Scanner extends coverage to on-premises file shares.
  2. Classification — What is it? Sensitivity labels create a consistent taxonomy that travels with files regardless of location or sharing state.
  3. Flow Control — Where can it go? Data Loss Prevention (DLP) policies enforce boundary constraints — blocking external shares, email forwards, or clipboard paste based on label or content match.
  4. Encryption — Even if data leaves the boundary, sensitivity label encryption makes it unreadable without the right Entra ID identity and an active license in the issuing tenant.

CMMC Scope

For CMMC Level 2, Purview addresses the following controls within the information protection domain:

CMMC PracticePurview Mechanism
AC.L2-3.1.3 (CUI Flow Control)DLP policies prevent CUI from being sent to external recipients, uploaded to non-approved services, or shared with users outside the tenant boundary.
SC.L2-3.13.11 (FIPS Encryption)Sensitivity label encryption uses AES-256 and RSA-2048 through Microsoft's FIPS 140-2 validated cryptographic modules. Encryption is document-level and persists independent of storage location.
SC.L2-3.13.16 (CUI at Rest)Labels applying encryption protect CUI at rest in SharePoint, OneDrive, Exchange mailboxes, and Teams — including items in shared drives and archived conversations.
MP.L2-3.8.1 (Media Protection)Sensitivity labels persist when CUI is exported to USB or local disk. Intune Device Control (configured in Chapter 10) restricts unencrypted export to removable media.
MP.L2-3.8.7 (Removable Media)Defender for Endpoint Device Control provides the enforcement layer; Purview Endpoint DLP provides the data-awareness layer — triggering policy based on label or content match during copy-to-USB events.

CUI Label Taxonomy

The DoD CUI Registry defines over 20 categories. For most DIB organizations, a practical starting taxonomy covers the categories that appear most frequently in engineering and program management workflows:

LabelScopeEncryption
PublicApproved for public release; no restrictions.None
InternalInternal business information not cleared for external release.None
CUIControlled Unclassified Information — default label for unmarked CUI.Required — AES-256 via sensitivity label
CUI // SP-CTIControlled Technical Information — engineering drawings, specifications, test data.Required
CUI // SP-EXPTExport Controlled — ITAR/EAR-regulated technical data.Required
Start with CUI, not the full registry

Attempting to implement all 20+ CUI sub-categories at initial deployment creates user confusion and drives low adoption. Start with the three encrypted labels (CUI, SP-CTI, SP-EXPT). Users can request additional sub-categories as the program matures. A CMMC assessor needs to see that CUI is labeled and encrypted — not that every category is pre-built on day one.

GCC High Purview is Sovereign — Verify Your Portal URL

Purview in GCC High uses sovereign endpoints. Confirm that your compliance portal URL is compliance.microsoft.us. If it resolves to compliance.microsoft.com, sensitivity label encryption keys may be managed in the commercial cloud, which is out of scope for CUI. Verify your Azure Information Protection service endpoint in the Purview admin center before deploying labels.

📩 Don't Miss the Next Solution

Join the list to see the real-time solutions I'm delivering to my GCC High clients.