Create a data loss prevention (DLP) policy
To protect data in your organization, Power Apps lets you create and enforce policies that define which consumer connectors specific business data can be shared with. These policies that define how data can be shared are referred to as data loss prevention (DLP) policies. DLP policies ensure that data is managed in a uniform manner across your organization, and they prevent important business data from being accidentally published to connectors such as social media sites.
In this topic, you'll learn how to create a DLP policy for a single environment that prevents data that's stored in your Common Data Service and SharePoint databases from being published to Twitter.
To follow the steps, one of the following items is required:
- Azure Active Directory Tenant Admin permissions
- Office 365 Global Admin permissions
- Power Apps Environment Admin permissions plus a Power Apps plan, Power Automate plan, or a free Power Apps trial license
For more information, see Environments administration in Power Apps.
Sign in to the Power Apps Admin center
Sign in to the Admin center at https://admin.powerapps.com.
Create a DLP policy
In the navigation pane, click or tap Data policies, and then click or tap New policy.
The Data Policy Name field auto-populates with a name based on the time and date the policy is created. Replace this with Secure Data Access for Contoso.
The options on the Environments tab differ depending on whether you're an Environment admin or a Tenant admin. If you're an Environment admin, select an environment from the drop-down list, and then click or tap Continue.
If you're a Tenant admin, you can create DLP policies that apply to one or more environments, or to all environments within the tenant (including those created using a trial license). For this topic, click or tap Apply to ONLY selected environments, select an environment from the drop-down list, and then click or tap Continue.
Note that environment DLP policies cannot override tenant-wide DLP policies.
On the Data groups tab, under Business data only, click or tap Add.
In the Add connectors window, select Common Data Service and SharePoint (you may have to scroll down or search to find them), and then click or tap Add connectors to add them to the Business data only data group.
Connectors can reside in only one data group at a time and are added to the No business data allowed group by default. By moving Common Data Service and SharePoint to the Business data only group, you're preventing users from creating flows and apps that combine these two connectors with any of the connectors in the No business data allowed group.
Click Save policy.
The Secure Data Access for Contoso policy is created and appears in the list of data loss prevention policies. Since the Twitter connector resides in the No business data allowed data group, this policy ensures that the Common Data Service and SharePoint do not share their data with Twitter.
It's good practice for administrators to share a list of DLP policies with their organization so that users are aware of the policies prior to creating apps.
In this topic, you learned how to create a DLP policy for a single environment to prevent important business data from being accidentally published to connectors such as Twitter. To learn more about DLP policies, check out the article about how to manage them.