Phase 1 – Discovery
- Audit email flow
- Identify high-risk departments
- Catalog sensitive data types
Phase 2 – Classification
- Apply sensitivity labels
- Define organization-specific identifiers
Phase 3 – Policy Creation
- Define actions for each data type
- Start with warning-only policies
Phase 4 – Deployment
- Integrate with Microsoft 365 or Google Workspace
- Deploy to pilot users first
Phase 5 – Optimization and Enforcement
- Reduce false positives
- Transition from warnings to blocking
- Enable compliance reporting