Security and Sharing

Modified on Mon, 30 Jan, 2023 at 11:35 AM

Introduction

Torsion's Data Access Governance solution for Microsoft 365 features the Sharing & Security panel, providing vital data access insights to business users. Upon accessing a particular Information Resource, like a Microsoft Team, Site, document, or folder, this panel can be viewed by either the Owner or Member


Matrix of who sees what in Torsion's Sharing and Security User Console Settings.

This matrix describes who can and cannot view what in the Torsions Sharing and Security panel settings.



Read-Only UserRead-Write UserAdministrator (of sources system)Business Owner

Sharing & Security Panel

* Yes

* Yes

Yes

Yes

See Who Has Access Tab

Yes

Yes

Yes

Yes

Reporting Buttons

No

No

Yes

Yes

Security Issues Tab

No

No

No

Yes

Configuration Tab

Read-Only

Read-Only

Editable

Editable

Share Tabs

No

No

Yes

Yes

Child Resources

Ŧ Read-Only

Ŧ Read-Only

Yes

ǂ Yes



* Cannot classify or assign ownership, buttons are hidden.

Ŧ Can only see information resources they have access to.

ǂ Can only see Information Resources they have access to, unless “Allow Business Owners to see Information Resources they can't access” has been selected in Admin General Settings


Security and Sharing

The Sharing & Security panel gives users control over access to information and the ability to modify security settings. It displays the assigned Security Classification, enabling Business Owners to grant access while preserving security and enforcing governance. 



Header

The title of the Sharing & Security panel shows the particular Information Resource that is currently displayed in the dialogue.



The Sharing & Security panel displays the total number of people who have access to the Information Resource on the left, and if a Security Classification has been applied to the resource, this is displayed on the right. Within the panel are various tabs of information and controls. The navigation is arranged in two groups: Manage Security and Share.


Manage Security

Under Manage Security, there are four tabs: Overview, Issues, See Who Has Access, and Configuration. 



  • The Overview tab gives an overview of the sharing access of the resource, and issues that need attention. 
  • The Issues tab outlines any issues with the current sharing state of the resource, along with ways to resolve them. 
  • The See Who Has Access tab shows who has access to the resource.
  • Configuration tab allows you to adjust the sharing and security settings.



  • The Business Owner is responsible for the Information Resource and can nominate others to join as co-owners. 
  • The Security Status displays the vulnerability of the resource and the number of outstanding security issues. 
  • The Shared Outside flag indicates if anyone with access to the resource is external to the organization. 
  • The Security Classification shows the sensitivity, access rules, and security configuration of the resource. 
  • The Security Inheritance section shows if the resource has its own security configuration or inherits from another resource. The People With Access section displays the total number of people who have access, including external individuals and those with read-only or modify access.



See Who Access

The See Who Has Access tab displays all individuals who have access to the Information Resource. This tab lists access provided through different mechanisms. 



Only the configuration that provides the highest level of access is shown by default, with the option to reveal additional configurations by clicking "Show x more...". 


The list of individuals can be filtered by internal/external status, sharing mechanism, access level, and searchable by name or role. The Reason for Access column displays the business reason for each person's access to the Information Resource, whether it be through individual sharing, a Security Rule, or a Security Group. Access details for an individual can be viewed by clicking the blue (i) icon. Changes in the security configuration can be viewed by clicking the "See What's Changed" button.


Configuration

Note that changes made in this tab will only affect the selected Information Resource, and will not change the configuration of any parent or child resources. It’s important to review the entire hierarchy of an Information Resource before making any changes, to understand the full impact of any changes.



Additionally, removing a configuration may have implications for the access of other Information Resources that rely on the same configuration. So, it’s important to understand the relationships between configurations, and the impact of any changes, before making them.


Share

Under Share, there are three tabs: With a Security Rule, With Individual People, and With a Group. 



  • Security Rule tab allows you to share the resource with a security rule.
  • Individual People and With a Group tabs allow you to share the resource with particular people or groups, respectively. 
  • Note depending on your system configuration and access level, some tabs may not be visible to you.



Share with a Security Rule


The Security Rule is a mechanism for controlling access to an Information Resource based on specific business criteria, rather than a list of names. 



To create a Security Rule, select options from the available Security Dimensions on the left, which are customised for your business. The name of the Security Rule will change based on the selected options. The View Rule Members button shows the people who currently match the criteria of the Security Rule. Once satisfied, the Security Rule can be added by clicking the ‘Add Rule’ button and selecting the Access Level. The people who match the criteria of the Security Rule will automatically receive access, while those who no longer match will have their access revoked.



Share With Individual People

Sharing Information Resource with individual people can be done by entering their name or email address in the textbox and selecting them. 


The business reason for their access can be specified as being based on their current position, temporary, or permanent. The business reason can be specified by selecting attributes of their current role, specifying the duration of access, or by specifying a reason in a dropdown list or freeform textbox.


Was this article helpful?

That’s Great!

Thank you for your feedback

Sorry! We couldn't be helpful

Thank you for your feedback

Let us know how can we improve this article!

Select at least one of the reasons
CAPTCHA verification is required.

Feedback sent

We appreciate your effort and will try to fix the article