{"id":22619,"date":"2022-12-12T08:00:00","date_gmt":"2022-12-12T16:00:00","guid":{"rendered":""},"modified":"2025-06-11T07:47:11","modified_gmt":"2025-06-11T14:47:11","slug":"protecting-data-with-dataverse-part-2-security-from-internal-threats-users","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/power-platform\/blog\/power-apps\/protecting-data-with-dataverse-part-2-security-from-internal-threats-users\/","title":{"rendered":"Protecting Data with Dataverse Part 2: Security from Internal Threats (Users)\u00a0\u00a0"},"content":{"rendered":"\n<p class=\"wp-block-paragraph\">In this blog series, we will be covering how to protect data in Dataverse from external and internal threats (both from internal users and Microsoft). In today\u2019s post, we will focus on protecting data from internal user threats.&nbsp;<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><strong>Secure Data from Internal Data Leaks and Disgruntled Employees<\/strong>&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"wp-block-list-item\"><strong><em>How can I minimize user access to sensitive data in my applications?<\/em><\/strong>\u00a0<\/li>\n<\/ul>\n\n\n\n<p class=\"wp-block-paragraph\">Microsoft Purview Information Protection establishes protection across environments and provides ways to combine data sets to be defined that allow data collaboration. <a href=\"https:\/\/learn.microsoft.com\/microsoft-365\/compliance\/information-protection?view=o365-worldwide\" rel=\"noreferrer noopener\" target=\"_blank\">Microsoft Purview<\/a>&#8216;s data classification allows you to protect your data based on data sensitivity\/classification and prevent sensitive data from falling into the wrong hands. IT professionals and administrators can designate containers (Dataverse environments) and folders (data entities) with data sensitivity that can define the boundaries for that data in the organization. The platform also provides additional security using Role-Based Access (RBAC) that system administrators can configure to further lock down access to your organization\u2019s tables in the system. Dataverse uses Azure AD identity and access management mechanisms to help ensure that only authorized users can access the environment, data, and reports.&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"wp-block-list-item\"><strong><em>How can I ensure users have the right privileges necessary to access a Dataverse environment?<\/em><\/strong>\u00a0<\/li>\n<\/ul>\n\n\n\n<p class=\"wp-block-paragraph\">Dataverse uses role-based security to group together a collection of privileges. These <a href=\"https:\/\/docs.microsoft.com\/power-platform\/admin\/security-roles-privileges\" rel=\"noreferrer noopener\" target=\"_blank\">security roles<\/a> can be associated directly with users, or they can be associated with Dataverse teams and business units. These privileges provide users access to records.&nbsp; Secure data and ensure users have the least privilege necessary through Dataverse authorization and data level security roles that define row, field, hierarchical, and group protection.&nbsp;&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"wp-block-list-item\"><strong><em>How can I make sure users do not have the ability to intentionally leak or allow others to easily access and leak sensitive data in my environment?<\/em><\/strong>\u00a0<\/li>\n<\/ul>\n\n\n\n<p class=\"wp-block-paragraph\">Dataverse provides features that you can easily configure and set up to stop users from data leaking or accidentally providing access to the system. <a href=\"https:\/\/learn.microsoft.com\/power-platform\/admin\/wp-data-loss-prevention\" rel=\"noreferrer noopener\" target=\"_blank\">Data Loss Prevention Policies<\/a> are one way to do this. You can create data loss prevention (DLP) policies that can act as guardrails to help prevent users from unintentionally exposing organizational data.&nbsp;&nbsp;&nbsp;<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><strong>Protect, Detect &amp; Respond to Internal Client Threats<\/strong>&nbsp;<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><strong><em>Protect<\/em><\/strong>&nbsp;<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">We recommend the following preventative steps:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"wp-block-list-item\"><strong>Leverage Dataverse Authorization<\/strong> to create the right group and individual access to collections and records. See <a href=\"https:\/\/docs.microsoft.com\/power-platform\/admin\/how-record-access-determined\" target=\"_blank\" rel=\"noreferrer noopener\">how access to a record is determined in Dataverse<\/a> for more details about how to set up the proper authorization model.\u00a0<\/li>\n\n\n\n<li class=\"wp-block-list-item\">Use<strong> <\/strong><strong>IP address-based cookie binding<\/strong> to <a href=\"https:\/\/learn.microsoft.com\/power-platform\/admin\/block-cookie-replay-attack\" target=\"_blank\" rel=\"noreferrer noopener\">block cookie replay attacks in Dataverse.<\/a>\u00a0<\/li>\n\n\n\n<li class=\"wp-block-list-item\"><a href=\"https:\/\/learn.microsoft.com\/power-platform\/admin\/control-user-access\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Restrict guest user access<\/strong> permissions through Azure Active Directory.<\/a>\u00a0<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"wp-block-list-item\"><strong>Limit IP surface area<\/strong> by configuring inbound and outbound rules within Power Platform. See <a href=\"https:\/\/learn.microsoft.com\/azure\/virtual-network\/service-tags-overview\" target=\"_blank\" rel=\"noreferrer noopener\">Azure service tags overview<\/a> for available service tags.\u00a0<\/li>\n<\/ul>\n\n\n\n<p class=\"wp-block-paragraph\"><strong><em>Detect<\/em><\/strong>&nbsp;<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Take these steps to identify and locate possible issues:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"wp-block-list-item\"><strong>Review <\/strong><a href=\"https:\/\/docs.microsoft.com\/azure\/active-directory\/reports-monitoring\/concept-audit-logs\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>audit logs<\/strong> in Azure Active Directory<\/a> for public IP address access to your environment and to identify which users have authenticated to Dataverse.\u00a0<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"wp-block-list-item\"><a href=\"https:\/\/learn.microsoft.com\/power-apps\/developer\/data-platform\/auditing\/retrieve-audit-data\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Retrieve the history of audited data changes in Dataverse.<\/strong><\/a>\u00a0<\/li>\n\n\n\n<li class=\"wp-block-list-item\"><strong>Review <\/strong><a href=\"https:\/\/learn.microsoft.com\/power-platform\/admin\/analytics-powerapps\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Microsoft 365 admin center activity reports<\/strong><\/a><strong>.<\/strong>\u00a0<\/li>\n\n\n\n<li class=\"wp-block-list-item\"><a href=\"https:\/\/learn.microsoft.com\/power-platform\/guidance\/adoption\/cds-usage\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Use Microsoft Dataverse usage reports.<\/strong><\/a>\u00a0<\/li>\n\n\n\n<li class=\"wp-block-list-item\"><a href=\"https:\/\/learn.microsoft.com\/power-platform\/guidance\/adoption\/access-usage\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Track user access<\/strong> of the Microsoft Power Platform.<\/a>\u00a0<\/li>\n\n\n\n<li class=\"wp-block-list-item\"><strong>Deep auditing<\/strong> for all data changes to detect tampering or manipulation and rich access\/activity auditing for data exfiltration risks.\u00a0<\/li>\n<\/ul>\n\n\n\n<p class=\"wp-block-paragraph\"><strong><em>Respond<\/em><\/strong>&nbsp;<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Follow these steps to execute an effective response:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"wp-block-list-item\"><strong>Disable user<\/strong> from the environment (see <a href=\"https:\/\/learn.microsoft.com\/power-platform\/admin\/delete-users\" target=\"_blank\" rel=\"noreferrer noopener\">delete users from environments<\/a>).\u00a0<\/li>\n\n\n\n<li class=\"wp-block-list-item\"><a href=\"https:\/\/docs.microsoft.com\/azure\/active-directory\/enterprise-users\/users-revoke-access\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Revoke user access<\/strong> in an emergency in Azure Active Directory.<\/a>\u00a0\u00a0<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"wp-block-list-item\"><strong>Modify <\/strong><a href=\"https:\/\/learn.microsoft.com\/power-platform-release-plan\/2022wave2\/data-platform\/limit-user-access-ip-firewall\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>IP Firewall<\/strong><\/a> to meet your changing network requirements.\u00a0<\/li>\n<\/ul>\n\n\n\n<p class=\"wp-block-paragraph\"><strong>Additional Resources<\/strong><\/p>\n\n\n\n<h5 class=\"wp-block-heading\" id=\"learn-more-about-dataverse-security-features-and-capabilities-covered-in-the-microsoft-dataverse-security-white-paper\"><strong>Learn more about Dataverse Security features and capabilities covered in the&nbsp;<a href=\"https:\/\/nam06.safelinks.protection.outlook.com\/?url=https%3A%2F%2Fdownload.microsoft.com%2Fdownload%2F9%2Fe%2Fd%2F9edefa88-50a0-4900-97f4-815bca5a7cb8%2FDataverse-security-and-scenarios.pdf&amp;data=05%7C01%7Cv-asparza%40microsoft.com%7C6fe393f29f424d7b19a508dabcea0ce4%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C638030010670824031%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&amp;sdata=LqJV9uCXZ3mIe%2FPOvbpVRAfTDIjcuPE%2FLzPJC%2BrkfF0%3D&amp;reserved=0\">Microsoft Dataverse Security<\/a>&nbsp;white paper.<\/strong><\/h5>\n","protected":false},"excerpt":{"rendered":"<p>Protecting data from internal threats (users)<\/p>\n","protected":false},"author":117,"featured_media":129244,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"ms_queue_id":[],"ep_exclude_from_search":false,"_classifai_error":"","_classifai_text_to_speech_error":"","_alt_title":"","ms-ems-related-posts":[],"footnotes":""},"audience":[3378],"content-type":[3423],"job-role":[],"product":[3473],"property":[],"topic":[3421,3443],"coauthors":[3026],"class_list":["post-22619","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","audience-it-professional","content-type-tips-and-guides","product-power-apps","topic-application-modernization","topic-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Protecting Data with Dataverse Part 2: Security from Internal Threats (Users)\u00a0\u00a0 - Microsoft Power Platform Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.microsoft.com\/en-us\/power-platform\/blog\/2022\/12\/12\/protecting-data-with-dataverse-part-2-security-from-internal-threats-users\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Protecting Data with Dataverse Part 2: Security from Internal Threats (Users)\u00a0\u00a0 - Microsoft Power Platform Blog\" \/>\n<meta property=\"og:description\" content=\"Protecting data from internal threats (users)\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.microsoft.com\/en-us\/power-platform\/blog\/power-apps\/protecting-data-with-dataverse-part-2-security-from-internal-threats-users\/\" \/>\n<meta property=\"og:site_name\" content=\"Microsoft Power Platform Blog\" \/>\n<meta property=\"article:published_time\" content=\"2022-12-12T16:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-11T14:47:11+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.microsoft.com\/en-us\/power-platform\/blog\/wp-content\/uploads\/2022\/12\/CLO22_TechOffice_058-1024x683.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"683\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Mark Spilde\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Mark Spilde\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/power-platform\/blog\/2022\/12\/12\/protecting-data-with-dataverse-part-2-security-from-internal-threats-users\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/power-platform\/blog\/2022\/12\/12\/protecting-data-with-dataverse-part-2-security-from-internal-threats-users\/\"},\"author\":[{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/power-platform\/blog\/author\/mark-spilde\/\",\"@type\":\"Person\",\"@name\":\"Mark Spilde\"}],\"headline\":\"Protecting Data with Dataverse Part 2: Security from Internal Threats (Users)\u00a0\u00a0\",\"datePublished\":\"2022-12-12T16:00:00+00:00\",\"dateModified\":\"2025-06-11T14:47:11+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/power-platform\/blog\/2022\/12\/12\/protecting-data-with-dataverse-part-2-security-from-internal-threats-users\/\"},\"wordCount\":609,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/power-platform\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/power-platform\/blog\/2022\/12\/12\/protecting-data-with-dataverse-part-2-security-from-internal-threats-users\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.microsoft.com\/en-us\/power-platform\/blog\/wp-content\/uploads\/2022\/12\/CLO22_TechOffice_058.jpg\",\"keywords\":[\"Dataverse\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.microsoft.com\/en-us\/power-platform\/blog\/2022\/12\/12\/protecting-data-with-dataverse-part-2-security-from-internal-threats-users\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/power-platform\/blog\/2022\/12\/12\/protecting-data-with-dataverse-part-2-security-from-internal-threats-users\/\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/power-platform\/blog\/2022\/12\/12\/protecting-data-with-dataverse-part-2-security-from-internal-threats-users\/\",\"name\":\"Protecting Data with Dataverse Part 2: Security from Internal Threats (Users)\u00a0\u00a0 - Microsoft Power Platform Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/power-platform\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/power-platform\/blog\/2022\/12\/12\/protecting-data-with-dataverse-part-2-security-from-internal-threats-users\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/power-platform\/blog\/2022\/12\/12\/protecting-data-with-dataverse-part-2-security-from-internal-threats-users\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.microsoft.com\/en-us\/power-platform\/blog\/wp-content\/uploads\/2022\/12\/CLO22_TechOffice_058.jpg\",\"datePublished\":\"2022-12-12T16:00:00+00:00\",\"dateModified\":\"2025-06-11T14:47:11+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/power-platform\/blog\/2022\/12\/12\/protecting-data-with-dataverse-part-2-security-from-internal-threats-users\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.microsoft.com\/en-us\/power-platform\/blog\/2022\/12\/12\/protecting-data-with-dataverse-part-2-security-from-internal-threats-users\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/power-platform\/blog\/2022\/12\/12\/protecting-data-with-dataverse-part-2-security-from-internal-threats-users\/#primaryimage\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/power-platform\/blog\/wp-content\/uploads\/2022\/12\/CLO22_TechOffice_058.jpg\",\"contentUrl\":\"https:\/\/www.microsoft.com\/en-us\/power-platform\/blog\/wp-content\/uploads\/2022\/12\/CLO22_TechOffice_058.jpg\",\"width\":9504,\"height\":6336,\"caption\":\"A woman sitting at a desk with a computer\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/power-platform\/blog\/2022\/12\/12\/protecting-data-with-dataverse-part-2-security-from-internal-threats-users\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.microsoft.com\/en-us\/power-platform\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Protecting Data with Dataverse Part 2: Security from Internal Threats (Users)\u00a0\u00a0\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/power-platform\/blog\/#website\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/power-platform\/blog\/\",\"name\":\"Microsoft Power Platform Blog\",\"description\":\"Innovate with Business Apps\",\"publisher\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/power-platform\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.microsoft.com\/en-us\/power-platform\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/power-platform\/blog\/#organization\",\"name\":\"Microsoft Power Platform Blog\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/power-platform\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/power-platform\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/power-platform\/blog\/wp-content\/uploads\/2020\/03\/Microsoft-Logo-e1685482038800.png\",\"contentUrl\":\"https:\/\/www.microsoft.com\/en-us\/power-platform\/blog\/wp-content\/uploads\/2020\/03\/Microsoft-Logo-e1685482038800.png\",\"width\":194,\"height\":145,\"caption\":\"Microsoft Power Platform Blog\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/power-platform\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/power-platform\/blog\/#\/schema\/person\/e43bbd60b1fc46a5eb3b5c18159bd3cc\",\"name\":\"Mark Spilde\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/2638da883981aeea4779b45984a44981d5f59978ab898f69f42c8f3d2cc93f9f?s=96&d=mm&r=g870a6889afc722a7da73f8269afadc90\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/2638da883981aeea4779b45984a44981d5f59978ab898f69f42c8f3d2cc93f9f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/2638da883981aeea4779b45984a44981d5f59978ab898f69f42c8f3d2cc93f9f?s=96&d=mm&r=g\",\"caption\":\"Mark Spilde\"},\"url\":\"https:\/\/www.microsoft.com\/en-us\/power-platform\/blog\/author\/mspilde\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Protecting Data with Dataverse Part 2: Security from Internal Threats (Users)\u00a0\u00a0 - Microsoft Power Platform Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.microsoft.com\/en-us\/power-platform\/blog\/2022\/12\/12\/protecting-data-with-dataverse-part-2-security-from-internal-threats-users\/","og_locale":"en_US","og_type":"article","og_title":"Protecting Data with Dataverse Part 2: Security from Internal Threats (Users)\u00a0\u00a0 - Microsoft Power Platform Blog","og_description":"Protecting data from internal threats (users)","og_url":"https:\/\/www.microsoft.com\/en-us\/power-platform\/blog\/power-apps\/protecting-data-with-dataverse-part-2-security-from-internal-threats-users\/","og_site_name":"Microsoft Power Platform Blog","article_published_time":"2022-12-12T16:00:00+00:00","article_modified_time":"2025-06-11T14:47:11+00:00","og_image":[{"width":1024,"height":683,"url":"https:\/\/www.microsoft.com\/en-us\/power-platform\/blog\/wp-content\/uploads\/2022\/12\/CLO22_TechOffice_058-1024x683.jpg","type":"image\/jpeg"}],"author":"Mark Spilde","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Mark Spilde","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.microsoft.com\/en-us\/power-platform\/blog\/2022\/12\/12\/protecting-data-with-dataverse-part-2-security-from-internal-threats-users\/#article","isPartOf":{"@id":"https:\/\/www.microsoft.com\/en-us\/power-platform\/blog\/2022\/12\/12\/protecting-data-with-dataverse-part-2-security-from-internal-threats-users\/"},"author":[{"@id":"https:\/\/www.microsoft.com\/en-us\/power-platform\/blog\/author\/mark-spilde\/","@type":"Person","@name":"Mark Spilde"}],"headline":"Protecting Data with Dataverse Part 2: Security from Internal Threats (Users)\u00a0\u00a0","datePublished":"2022-12-12T16:00:00+00:00","dateModified":"2025-06-11T14:47:11+00:00","mainEntityOfPage":{"@id":"https:\/\/www.microsoft.com\/en-us\/power-platform\/blog\/2022\/12\/12\/protecting-data-with-dataverse-part-2-security-from-internal-threats-users\/"},"wordCount":609,"commentCount":0,"publisher":{"@id":"https:\/\/www.microsoft.com\/en-us\/power-platform\/blog\/#organization"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/power-platform\/blog\/2022\/12\/12\/protecting-data-with-dataverse-part-2-security-from-internal-threats-users\/#primaryimage"},"thumbnailUrl":"https:\/\/www.microsoft.com\/en-us\/power-platform\/blog\/wp-content\/uploads\/2022\/12\/CLO22_TechOffice_058.jpg","keywords":["Dataverse"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.microsoft.com\/en-us\/power-platform\/blog\/2022\/12\/12\/protecting-data-with-dataverse-part-2-security-from-internal-threats-users\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.microsoft.com\/en-us\/power-platform\/blog\/2022\/12\/12\/protecting-data-with-dataverse-part-2-security-from-internal-threats-users\/","url":"https:\/\/www.microsoft.com\/en-us\/power-platform\/blog\/2022\/12\/12\/protecting-data-with-dataverse-part-2-security-from-internal-threats-users\/","name":"Protecting Data with Dataverse Part 2: Security from Internal Threats (Users)\u00a0\u00a0 - Microsoft Power Platform Blog","isPartOf":{"@id":"https:\/\/www.microsoft.com\/en-us\/power-platform\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.microsoft.com\/en-us\/power-platform\/blog\/2022\/12\/12\/protecting-data-with-dataverse-part-2-security-from-internal-threats-users\/#primaryimage"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/power-platform\/blog\/2022\/12\/12\/protecting-data-with-dataverse-part-2-security-from-internal-threats-users\/#primaryimage"},"thumbnailUrl":"https:\/\/www.microsoft.com\/en-us\/power-platform\/blog\/wp-content\/uploads\/2022\/12\/CLO22_TechOffice_058.jpg","datePublished":"2022-12-12T16:00:00+00:00","dateModified":"2025-06-11T14:47:11+00:00","breadcrumb":{"@id":"https:\/\/www.microsoft.com\/en-us\/power-platform\/blog\/2022\/12\/12\/protecting-data-with-dataverse-part-2-security-from-internal-threats-users\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.microsoft.com\/en-us\/power-platform\/blog\/2022\/12\/12\/protecting-data-with-dataverse-part-2-security-from-internal-threats-users\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.microsoft.com\/en-us\/power-platform\/blog\/2022\/12\/12\/protecting-data-with-dataverse-part-2-security-from-internal-threats-users\/#primaryimage","url":"https:\/\/www.microsoft.com\/en-us\/power-platform\/blog\/wp-content\/uploads\/2022\/12\/CLO22_TechOffice_058.jpg","contentUrl":"https:\/\/www.microsoft.com\/en-us\/power-platform\/blog\/wp-content\/uploads\/2022\/12\/CLO22_TechOffice_058.jpg","width":9504,"height":6336,"caption":"A woman sitting at a desk with a computer"},{"@type":"BreadcrumbList","@id":"https:\/\/www.microsoft.com\/en-us\/power-platform\/blog\/2022\/12\/12\/protecting-data-with-dataverse-part-2-security-from-internal-threats-users\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.microsoft.com\/en-us\/power-platform\/blog\/"},{"@type":"ListItem","position":2,"name":"Protecting Data with Dataverse Part 2: Security from Internal Threats (Users)\u00a0\u00a0"}]},{"@type":"WebSite","@id":"https:\/\/www.microsoft.com\/en-us\/power-platform\/blog\/#website","url":"https:\/\/www.microsoft.com\/en-us\/power-platform\/blog\/","name":"Microsoft Power Platform Blog","description":"Innovate with Business Apps","publisher":{"@id":"https:\/\/www.microsoft.com\/en-us\/power-platform\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.microsoft.com\/en-us\/power-platform\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.microsoft.com\/en-us\/power-platform\/blog\/#organization","name":"Microsoft Power Platform Blog","url":"https:\/\/www.microsoft.com\/en-us\/power-platform\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.microsoft.com\/en-us\/power-platform\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.microsoft.com\/en-us\/power-platform\/blog\/wp-content\/uploads\/2020\/03\/Microsoft-Logo-e1685482038800.png","contentUrl":"https:\/\/www.microsoft.com\/en-us\/power-platform\/blog\/wp-content\/uploads\/2020\/03\/Microsoft-Logo-e1685482038800.png","width":194,"height":145,"caption":"Microsoft Power Platform Blog"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/power-platform\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.microsoft.com\/en-us\/power-platform\/blog\/#\/schema\/person\/e43bbd60b1fc46a5eb3b5c18159bd3cc","name":"Mark Spilde","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/2638da883981aeea4779b45984a44981d5f59978ab898f69f42c8f3d2cc93f9f?s=96&d=mm&r=g870a6889afc722a7da73f8269afadc90","url":"https:\/\/secure.gravatar.com\/avatar\/2638da883981aeea4779b45984a44981d5f59978ab898f69f42c8f3d2cc93f9f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/2638da883981aeea4779b45984a44981d5f59978ab898f69f42c8f3d2cc93f9f?s=96&d=mm&r=g","caption":"Mark Spilde"},"url":"https:\/\/www.microsoft.com\/en-us\/power-platform\/blog\/author\/mspilde\/"}]}},"bloginabox_animated_featured_image":null,"bloginabox_display_generated_audio":false,"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Microsoft Power Platform Blog","distributor_original_site_url":"https:\/\/www.microsoft.com\/en-us\/power-platform\/blog","push-errors":false,"_links":{"self":[{"href":"https:\/\/www.microsoft.com\/en-us\/power-platform\/blog\/wp-json\/wp\/v2\/posts\/22619","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.microsoft.com\/en-us\/power-platform\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.microsoft.com\/en-us\/power-platform\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/power-platform\/blog\/wp-json\/wp\/v2\/users\/117"}],"replies":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/power-platform\/blog\/wp-json\/wp\/v2\/comments?post=22619"}],"version-history":[{"count":1,"href":"https:\/\/www.microsoft.com\/en-us\/power-platform\/blog\/wp-json\/wp\/v2\/posts\/22619\/revisions"}],"predecessor-version":[{"id":128672,"href":"https:\/\/www.microsoft.com\/en-us\/power-platform\/blog\/wp-json\/wp\/v2\/posts\/22619\/revisions\/128672"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/power-platform\/blog\/wp-json\/wp\/v2\/media\/129244"}],"wp:attachment":[{"href":"https:\/\/www.microsoft.com\/en-us\/power-platform\/blog\/wp-json\/wp\/v2\/media?parent=22619"}],"wp:term":[{"taxonomy":"audience","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/power-platform\/blog\/wp-json\/wp\/v2\/audience?post=22619"},{"taxonomy":"content-type","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/power-platform\/blog\/wp-json\/wp\/v2\/content-type?post=22619"},{"taxonomy":"job-role","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/power-platform\/blog\/wp-json\/wp\/v2\/job-role?post=22619"},{"taxonomy":"product","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/power-platform\/blog\/wp-json\/wp\/v2\/product?post=22619"},{"taxonomy":"property","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/power-platform\/blog\/wp-json\/wp\/v2\/property?post=22619"},{"taxonomy":"topic","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/power-platform\/blog\/wp-json\/wp\/v2\/topic?post=22619"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/power-platform\/blog\/wp-json\/wp\/v2\/coauthors?post=22619"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}