{"id":41184,"date":"2021-06-02T16:00:01","date_gmt":"2021-06-02T16:00:01","guid":{"rendered":"https:\/\/www.microsoft.com\/security\/blog\/?p=93645"},"modified":"2021-06-02T16:00:01","modified_gmt":"2021-06-02T16:00:01","slug":"privacy-compliance-for-smart-meter-infrastructure-with-microsoft-information-protection-and-azure-purview","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/privacy-compliance-for-smart-meter-infrastructure-with-microsoft-information-protection-and-azure-purview\/","title":{"rendered":"Privacy compliance for smart meter infrastructure with Microsoft Information Protection and Azure Purview"},"content":{"rendered":"<p>Smart meters and smart grid infrastructure have been deployed in many of the world\u2019s electric distribution grids. They promise energy conservation, better grid management for utilities, electricity theft reduction, and a host of value-added services for consumers. To deliver on this promise, they need to collect granular electric usage data and make this available to the stakeholders who need it. This has created consumer privacy concerns which are being addressed with security and governance programs, like <a href=\"https:\/\/docs.microsoft.com\/en-us\/microsoft-365\/compliance\/information-protection?view=o365-worldwide\" target=\"_blank\" rel=\"noopener noreferrer\">Microsoft Information Protection<\/a> and <a href=\"https:\/\/azure.microsoft.com\/en-us\/services\/purview\/\" target=\"_blank\" rel=\"noopener noreferrer\">Azure Purview<\/a>, and with regulation by the government. The ability to protect and govern smart meter data is critical to addressing consumer privacy. It\u2019s also critical to making the data available to realize the return on investment in terms of environment, safety, savings, and enhanced services to consumers.<\/p>\n<h2>Smart grid data contains private information<\/h2>\n<p>Smart meter data is personally identifiable information (PII). Information potentially available through the smart grid includes:<\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"alignnone wp-image-93646 size-full\" src=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2021\/06\/PII-smart-grid.png\" alt=\"NISTIR 7628, Guidelines for Smart Grid Cybersecurity volume 2, Table 5-1. Information Potentially Available Through the Smart Grid.\" width=\"574\" height=\"305\" srcset=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2021\/06\/PII-smart-grid.png 574w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2021\/06\/PII-smart-grid-300x159.png 300w\" sizes=\"auto, (max-width: 574px) 100vw, 574px\"><\/p>\n<p><em>Figure 1: Information potentially available through the smart grid.<sup>1<\/sup><\/em><\/p>\n<p>This gives rise to a range of privacy concerns from personal data exposure for embarrassment or extortion, determination of behavior patterns for unwanted marketing, by criminals who might be casing a premises or seeking to exploit children, or inappropriate uses by government.<\/p>\n<p>Depending on the granularity and character of data collected, smart meter data can be disaggregated to reveal private information:<\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"alignnone wp-image-93647 size-full\" src=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2021\/06\/Markov-Models.png\" alt=\"NISTIR 7628, Guidelines for Smart Grid Cybersecurity volume 2, Figure 5-2. Using Hidden Markov Models to Produce an Appliance Disaggregation.\" width=\"541\" height=\"417\" srcset=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2021\/06\/Markov-Models.png 541w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2021\/06\/Markov-Models-300x231.png 300w\" sizes=\"auto, (max-width: 541px) 100vw, 541px\"><\/p>\n<p><em>Figure 2: Using hidden Markov models to produce an appliance disaggregation.<sup>2<\/sup><\/em><\/p>\n<p>Electric meter data was generally not a focus of privacy concern prior to smart meters. With smart meters, there is the potential for the data to be near real-time and with a frequency and granularity not previously available. The potential value of smart meter data for demand management programs, time of use pricing, outage management, grid optimization, energy theft reduction, unlocking the value of smart cities, and other uses increases as does the frequency and granularity of the data.<\/p>\n<p>Utilities and other stakeholders need to do a <a href=\"https:\/\/csrc.nist.gov\/glossary\/term\/PIA\" target=\"_blank\" rel=\"noopener noreferrer\">privacy impact assessment (PIA)<\/a> for the use of this data. Part of this process is to set out the controls that will be used to govern the data.<\/p>\n<p>Many of the same regulations and standards that cover PII in general apply to smart meter information. These include General Data Protection Regulation (GDPR), California Consumer Privacy Act, Canada\u2019s Personal Information Protection and Electronic Documents Act (PIPEDA), Brazil\u2019s General Data Protection Act (LGPD), and many other established and emerging privacy regimes. A <a href=\"https:\/\/www.dlapiperdataprotection.com\/index.html\" target=\"_blank\" rel=\"noopener noreferrer\">geographic summary<\/a> of privacy regulations is provided by the global law firm DLA Piper.<\/p>\n<h2>Where is PII from smart meters located?<\/h2>\n<p>Smart meter data is in the meters themselves and the backhaul infrastructure, potentially passing through range extenders, connected grid routers on its way to the head end. From here it is made available to the utility departments and other organizations as permitted in databases and data reservoirs to derive value from the data.<\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"alignnone wp-image-93648 size-full\" src=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2021\/06\/smart-grid-information-networks.png\" alt=\"Conceptual Reference Diagram for Smart Grid Information Networks. Ref NIST Special Publication 1108R2, Figure 3-2.\" width=\"661\" height=\"482\" srcset=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2021\/06\/smart-grid-information-networks.png 661w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2021\/06\/smart-grid-information-networks-300x219.png 300w\" sizes=\"auto, (max-width: 661px) 100vw, 661px\"><\/p>\n<p><em>Figure 3: Conceptual reference diagram for smart grid information networks.<sup>3<\/sup><\/em><\/p>\n<p>With the range of stakeholders that need access to the data, there will be a variety of technologies and architectures that must be governed. Broadly, there will be PII in structured resources like SQL or SAP S\/4HANA databases, and unstructured like desktop application files and email or data repositories like Azure Blob, Data Lake Storage, or Amazon S3.<\/p>\n<p>The data should be governed during its full lifecycle from collection through to secure auditable disposal\u2014both inside the utility\u2019s environment and outside as third parties access the data for permitted uses.<\/p>\n<h2>Protect and governing PII from smart meters<\/h2>\n<p>The Microsoft Information Protection and Governance framework protects and governs Microsoft 365 data, including desktop applications, email, on-premises repositories, and with Microsoft Cloud App Security, both in our own- and third-party clouds and on Windows 10 endpoints like laptops.<\/p>\n<p>Most impactful for smart meter data, we now have <a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/purview\/overview\" target=\"_blank\" rel=\"noopener noreferrer\">Azure Purview<\/a> (now in preview) for structured and unstructured data outside of Microsoft 365, such as in databases, data lakes, SAP, and a range of other environments where smart meter data is stored and used to extract value.<\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"alignnone wp-image-93649 size-full\" src=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2021\/06\/MIP.png\" alt=\"Microsoft Information Protection and Governance framework.\" width=\"1359\" height=\"667\" srcset=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2021\/06\/MIP.png 1359w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2021\/06\/MIP-300x147.png 300w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2021\/06\/MIP-1024x503.png 1024w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2021\/06\/MIP-768x377.png 768w\" sizes=\"auto, (max-width: 1359px) 100vw, 1359px\"><\/p>\n<p><em>Figure 4: Microsoft Information Protection and Governance.<\/em><\/p>\n<p>To properly protect and govern PII in smart grid data, we need to identify and inventory this data across our cloud and on-premises environment. We need to protect this data with durable security policies that stay with the data throughout its lifecycle. We need to implement Data Loss Prevention (DLP) to keep the information from traveling to places it should not go and we need to dispose of data when it\u2019s no longer needed for business purposes. The deletion should be permanent and auditable.<\/p>\n<p><a href=\"https:\/\/docs.microsoft.com\/en-us\/microsoft-365\/compliance\/information-protection?view=o365-worldwide\" target=\"_blank\" rel=\"noopener noreferrer\">Microsoft Information Protection<\/a> as part of Microsoft 365 provides the tools to know your data, protect your data, and prevent data loss. It provides users with a native experience in their documents and emails, providing automation to recognize PII and either recommend the user apply a <a href=\"https:\/\/docs.microsoft.com\/en-us\/microsoft-365\/compliance\/sensitivity-labels?view=o365-worldwide\" target=\"_blank\" rel=\"noopener noreferrer\">sensitivity label<\/a> with the option to override this suggestion with auditable justification to enforce the application of the label.<\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"alignnone wp-image-93650 size-full\" src=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2021\/06\/Sensitivity-label.png\" alt=\"Microsoft Information Protection provides real time assistance to users with a native experience while they work. Users receive suggestions and can automatically label data or override the suggestion with auditable justification if configured by the administrator.\" width=\"933\" height=\"267\" srcset=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2021\/06\/Sensitivity-label.png 933w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2021\/06\/Sensitivity-label-300x86.png 300w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2021\/06\/Sensitivity-label-768x220.png 768w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2021\/06\/Sensitivity-label-930x267.png 930w\" sizes=\"auto, (max-width: 933px) 100vw, 933px\"><\/p>\n<p><em>Figure 5: Microsoft Information Protection provides real-time assistance to users with a native experience while they work. <\/em><\/p>\n<p>The sensitivity label can enforce encryption, scoping the document to be consumed only by the intended organization, teams, or individuals. It can enforce watermarking, disable cut and paste, and a range of other security policies for the life of the document, even when it leaves the sender\u2019s environment.<\/p>\n<p>PII such as credit card numbers can be recognized as <a href=\"https:\/\/docs.microsoft.com\/en-us\/microsoft-365\/compliance\/sensitive-information-type-entity-definitions?view=o365-worldwide\" target=\"_blank\" rel=\"noopener noreferrer\">out-of-box sensitive information types<\/a> and then be tuned to reduce false positives. <a href=\"https:\/\/docs.microsoft.com\/en-us\/microsoft-365\/compliance\/create-a-custom-sensitive-information-type?view=o365-worldwide\" target=\"_blank\" rel=\"noopener noreferrer\">Custom sensitive information types<\/a> can be informed by keywords, keyword dictionaries, or regular expressions which are particularly useful for recognizing utility account numbers or smart meter numbers. Machine learning can be used to recognize documents by using <a href=\"https:\/\/docs.microsoft.com\/en-us\/microsoft-365\/compliance\/classifier-learn-about?view=o365-worldwide\" target=\"_blank\" rel=\"noopener noreferrer\">trainable classifiers<\/a> to reason over a sample of relevant documents to recognize documents that are like these.<\/p>\n<p>Sensitive data can be identified, inventoried, and protected as it is created, in the cloud with <a href=\"https:\/\/docs.microsoft.com\/en-us\/cloud-app-security\/data-protection-policies\" target=\"_blank\" rel=\"noopener noreferrer\">Microsoft Cloud App Security<\/a> (MCAS) or with on-premises resources using the <a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/information-protection\/deploy-aip-scanner\" target=\"_blank\" rel=\"noopener noreferrer\">Azure Information Protection (AIP) scanner<\/a>.<\/p>\n<p>These sensitivity labels and sensitive information types can trigger <a href=\"https:\/\/docs.microsoft.com\/en-us\/microsoft-365\/compliance\/data-loss-prevention-policies?view=o365-worldwide\" target=\"_blank\" rel=\"noopener noreferrer\">DLP policies<\/a> across email, desktop applications, SharePoint sites, OneDrive, Windows 10 devices, Teams, and third-party clouds. The policies are managed with a unified experience across Office 365, cloud, on-premises, and endpoint locations.<\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"alignnone wp-image-93651 size-full\" src=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2021\/06\/DLP-policy.png\" alt=\"Data loss prevention policies can be triggered by sensitivity labels or sensitive information types. These policies can be administered for email, SharePoint, OneDrive, Teams, endpoints, on premises repositories and third party clouds from a single admin interface.\" width=\"1556\" height=\"743\" srcset=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2021\/06\/DLP-policy.png 1556w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2021\/06\/DLP-policy-300x143.png 300w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2021\/06\/DLP-policy-1024x489.png 1024w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2021\/06\/DLP-policy-768x367.png 768w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2021\/06\/DLP-policy-1536x733.png 1536w\" sizes=\"auto, (max-width: 1556px) 100vw, 1556px\"><\/p>\n<p><em>Figure 6: Selections of locations to apply policy.<\/em><\/p>\n<p>Files and emails can be tagged with <a href=\"https:\/\/docs.microsoft.com\/en-us\/microsoft-365\/compliance\/retention?view=o365-worldwide#:~:text=Compare%20capabilities%20for%20retention%20policies%20and%20retention%20labels,%20%20Yes%20%209%20more%20rows%20\" target=\"_blank\" rel=\"noopener noreferrer\">retention labels<\/a> as well as sensitivity labels. Like sensitivity labels in Microsoft Information Protection, they can be applied manually or in an automated way based on out-of-box, custom information types, or machine learning with trainable classifiers.<\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"alignnone wp-image-93652 size-full\" src=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2021\/06\/Records-management.png\" alt=\"Retention labels can enforce auditable retention, deletion and disposition review of documents and emails in the Microsoft 365 tenant. \" width=\"953\" height=\"577\" srcset=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2021\/06\/Records-management.png 953w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2021\/06\/Records-management-300x182.png 300w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2021\/06\/Records-management-768x465.png 768w\" sizes=\"auto, (max-width: 953px) 100vw, 953px\"><\/p>\n<p><em>Figure 7: Records management.<\/em><\/p>\n<p>Retention labels can enforce auditable retention, deletion, and disposition review of documents and emails in the Microsoft 365 tenant.<\/p>\n<p>This can facilitate compliance with privacy regulations, but also regulations that require retention for discovery purposes such as utility commissions or Freedom of Information (FOI) requests.<\/p>\n<p>Visualization and reporting for sensitive data, including smart meter PII as well as the retention labels and policies applied, are available from the compliance portal so that sensitive data can be inventoried, managed, and reported on.<\/p>\n<h2>Azure Purview<\/h2>\n<p>Azure Purview is a unified data governance service that helps you manage and govern your on-premises, multi-cloud, and software as a service (SaaS) data. We\u2019ll focus on PII data discovery in this post.<\/p>\n<p>Azure Purview Data Map captures metadata across a wide range of <a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/purview\/purview-connector-overview\" target=\"_blank\" rel=\"noopener noreferrer\">data sources<\/a> and <a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/purview\/sources-and-scans#file-types-supported-for-scanning\" target=\"_blank\" rel=\"noopener noreferrer\">file types<\/a> with automated data discovery and sensitive data classification. Azure Purview extends our information protection and governance capabilities beyond Microsoft 365.<\/p>\n<p>Among the broad list of data sources, you\u2019ll be able to scan SQL databases, Azure Blob Storage, Azure Data Lake Storage, Azure Cosmos DB, <a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/purview\/register-scan-amazon-s3\" target=\"_blank\" rel=\"noopener noreferrer\">AWS S3 buckets<\/a>, <a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/purview\/register-scan-oracle-source\" target=\"_blank\" rel=\"noopener noreferrer\">Oracle databases<\/a>, <a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/purview\/register-scan-sapecc-source\" target=\"_blank\" rel=\"noopener noreferrer\">SAP ECC<\/a>, and <a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/purview\/register-scan-saps4hana-source\" target=\"_blank\" rel=\"noopener noreferrer\">SAP S\/4HANA<\/a>.<\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"alignnone wp-image-93653 size-full\" src=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2021\/06\/metadata-map.png\" alt=\"Azure Purview creates a data map for a broad list of sources including but not limited to SQL databases, Azure Blob Storage, Azure Data Lake Storage, Azure Cosmos DB, AWS S3 buckets, Oracle databases, SAP ECC, and SAP S\/4HANA.\" width=\"1262\" height=\"613\" srcset=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2021\/06\/metadata-map.png 1262w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2021\/06\/metadata-map-300x146.png 300w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2021\/06\/metadata-map-1024x497.png 1024w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2021\/06\/metadata-map-768x373.png 768w\" sizes=\"auto, (max-width: 1262px) 100vw, 1262px\"><\/p>\n<p><em>Figure 8: Metadata map.<\/em><\/p>\n<p>The data in these sources can be classified and <a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/purview\/create-sensitivity-label\" target=\"_blank\" rel=\"noopener noreferrer\">labeled by out-of-box<\/a> and custom sensitive information types, including those defined for smart grid PII.<\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"alignnone wp-image-93654 size-full\" src=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2021\/06\/Microsoft-Azure-Purview.png\" alt=\"The data in the sources connected to Azure Purview can be classified and labelled by out of the box and custom sensitive information types, including those defined for smart grid PII.\" width=\"1034\" height=\"584\" srcset=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2021\/06\/Microsoft-Azure-Purview.png 1034w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2021\/06\/Microsoft-Azure-Purview-300x169.png 300w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2021\/06\/Microsoft-Azure-Purview-1024x578.png 1024w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2021\/06\/Microsoft-Azure-Purview-768x434.png 768w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2021\/06\/Microsoft-Azure-Purview-539x303.png 539w\" sizes=\"auto, (max-width: 1034px) 100vw, 1034px\"><\/p>\n<p><em>Figure 9: Microsoft Azure Purview classification rules.<\/em><\/p>\n<p>The sensitive information types and sensitivity labels are made available to Azure Purview from the <a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/purview\/create-sensitivity-label\" target=\"_blank\" rel=\"noopener noreferrer\">Microsoft 365 Compliance Center<\/a>, the same place the Microsoft Information Protection rules are managed, creating a unified experience for the administrators.<\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"alignnone wp-image-93655 size-full\" src=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2021\/06\/label-sensitivity.png\" alt=\"The sensitive information types and sensitivity labels are made available to Azure Purview from the Microsoft 365 Compliance Center, the same place the Microsoft Information Protection rules are managed, creating a unified experience for the administrators.\" width=\"1568\" height=\"507\" srcset=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2021\/06\/label-sensitivity.png 1568w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2021\/06\/label-sensitivity-300x97.png 300w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2021\/06\/label-sensitivity-1024x331.png 1024w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2021\/06\/label-sensitivity-768x248.png 768w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2021\/06\/label-sensitivity-1536x497.png 1536w\" sizes=\"auto, (max-width: 1568px) 100vw, 1568px\"><\/p>\n<p><em>Figure 10: How to edit label sensitivity.<\/em><\/p>\n<p>Custom classifications and rules to identify custom sensitive data types or keywords can be <a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/purview\/create-a-custom-classification-and-classification-rule\" target=\"_blank\" rel=\"noopener noreferrer\">created in the Azure Purview solution<\/a>.<\/p>\n<p>Azure Purview provides reporting that shows where sensitive data such as PII is located across an organization\u2019s data estate. Sensitivity labels with security policy can be applied to this data. The repositories where sensitive data is located can have additional security added or the data can be removed from locations where it does not belong.<\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"alignnone wp-image-93656 size-full\" src=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2021\/06\/Azure-Purview-sensitive-data.png\" alt=\"Azure Purview provides reporting that shows where sensitive data such as PII is located across an organization\u2019s data estate. Sensitivity labels with security policy can be applied to this data.\" width=\"1073\" height=\"609\" srcset=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2021\/06\/Azure-Purview-sensitive-data.png 1073w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2021\/06\/Azure-Purview-sensitive-data-300x170.png 300w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2021\/06\/Azure-Purview-sensitive-data-1024x581.png 1024w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2021\/06\/Azure-Purview-sensitive-data-768x436.png 768w\" sizes=\"auto, (max-width: 1073px) 100vw, 1073px\"><\/p>\n<p><em>Figure 11: Azure Purview showing locations where sensitive data exists.<\/em><\/p>\n<p>Azure Purview can validate that the Data Privacy Impact Assessment (DPIA) and controls undertaken by an organization around sensitive smart grid data are being enforced. This reporting can provide evidence to a regulator that an organization\u2019s commitments to security and privacy that enabled the use of customer\u2019s private data have been upheld.<\/p>\n<p>Azure Purview does not move or store customer data outside of the geographic region in which it is deployed so data residency requirements can be met.<\/p>\n<p>In addition to helping protect sensitive data, Microsoft also offers agentless, security monitoring for industrial control system (ICS) and operational technology (OT) networks to rapidly detect and respond to anomalous or unauthorized activities in control networks. <a href=\"https:\/\/azure.microsoft.com\/en-us\/services\/azure-defender-for-iot\/\" target=\"_blank\" rel=\"noopener noreferrer\">Azure Defender for IoT<\/a> integrates with existing security operations center (SOC) tools (like <a href=\"https:\/\/azure.microsoft.com\/en-us\/services\/azure-sentinel\" target=\"_blank\" rel=\"noopener noreferrer\">Azure Sentinel<\/a>, Splunk, IBM QRadar, and ServiceNow), is broadly deployed in production across power distribution and generation sites worldwide, and is available for both on-premises and cloud-connected environments.<\/p>\n<p>Microsoft 365 Information Protection and Governance and Azure Purview together provide tools to protect and govern smart meter data and other sensitive data for utilities. The more effectively we can implement protection and governance of this data, the more we can make use of it and derive value for the ratepayers who have invested in the smart grid.<\/p>\n<h2>Learn more<\/h2>\n<p>To learn more about Microsoft Security solutions, <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\" target=\"_blank\" rel=\"noopener noreferrer\">visit our website<\/a>. Bookmark the <a href=\"https:\/\/www.microsoft.com\/security\/blog\/\" target=\"_blank\" rel=\"noopener noreferrer\">Security blog<\/a> to keep up with our expert coverage on security matters. Also, follow us at <a href=\"https:\/\/twitter.com\/@MSFTSecurity\" target=\"_blank\" rel=\"noopener noreferrer\">@MSFTSecurity<\/a> for the latest news and updates on cybersecurity.<\/p>\n<hr>\n<p><sup>1<\/sup><em><a href=\"https:\/\/csrc.nist.gov\/publications\/detail\/nistir\/7628\/rev-1\/final\" target=\"_blank\" rel=\"noopener noreferrer\">NISTIR 7628, Guidelines for Smart Grid Cybersecurity volume 2, Table 5-1<\/a>.<\/em><\/p>\n<p><sup>2<\/sup><em><a href=\"https:\/\/csrc.nist.gov\/publications\/detail\/nistir\/7628\/rev-1\/final\" target=\"_blank\" rel=\"noopener noreferrer\">NISTIR 7628, Guidelines for Smart Grid Cybersecurity volume 2<\/a>.<\/em><\/p>\n<p><sup>3<\/sup><em><a href=\"https:\/\/nvlpubs.nist.gov\/nistpubs\/SpecialPublications\/NIST.SP.1108r2.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">NIST Special Publication 1108R2<\/a>.<\/em><\/p>\n<p> READ MORE <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2021\/06\/02\/privacy-compliance-for-smart-meter-infrastructure-with-microsoft-information-protection-and-azure-purview\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Smart meters and smart grid infrastructure have been deployed in many of the world\u2019s electric distribution grids. They promise energy conservation, better grid management for utilities, electricity theft reduction, and a host of value-added services for consumers.<br \/>\nThe post Privacy compliance for smart meter infrastructure with Microsoft Information Protection and Azure Purview appeared first on Microsoft Security. READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":41185,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[276],"tags":[941,347,101,6420],"class_list":["post-41184","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-microsoft-secure","tag-compliance","tag-cybersecurity","tag-data-privacy","tag-microsoft-365"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Privacy compliance for smart meter infrastructure with Microsoft Information Protection and Azure Purview 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/privacy-compliance-for-smart-meter-infrastructure-with-microsoft-information-protection-and-azure-purview\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Privacy compliance for smart meter infrastructure with Microsoft Information Protection and Azure Purview 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/privacy-compliance-for-smart-meter-infrastructure-with-microsoft-information-protection-and-azure-purview\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2021-06-02T16:00:01+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/06\/privacy-compliance-for-smart-meter-infrastructure-with-microsoft-information-protection-and-azure-purview.png\" \/>\n\t<meta property=\"og:image:width\" content=\"574\" \/>\n\t<meta property=\"og:image:height\" content=\"305\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/privacy-compliance-for-smart-meter-infrastructure-with-microsoft-information-protection-and-azure-purview\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/privacy-compliance-for-smart-meter-infrastructure-with-microsoft-information-protection-and-azure-purview\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Privacy compliance for smart meter infrastructure with Microsoft Information Protection and Azure Purview\",\"datePublished\":\"2021-06-02T16:00:01+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/privacy-compliance-for-smart-meter-infrastructure-with-microsoft-information-protection-and-azure-purview\/\"},\"wordCount\":1720,\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/privacy-compliance-for-smart-meter-infrastructure-with-microsoft-information-protection-and-azure-purview\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/06\/privacy-compliance-for-smart-meter-infrastructure-with-microsoft-information-protection-and-azure-purview.png\",\"keywords\":[\"compliance\",\"Cybersecurity\",\"Data Privacy\",\"Microsoft 365\"],\"articleSection\":[\"Microsoft Secure\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/privacy-compliance-for-smart-meter-infrastructure-with-microsoft-information-protection-and-azure-purview\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/privacy-compliance-for-smart-meter-infrastructure-with-microsoft-information-protection-and-azure-purview\/\",\"name\":\"Privacy compliance for smart meter infrastructure with Microsoft Information Protection and Azure Purview 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/privacy-compliance-for-smart-meter-infrastructure-with-microsoft-information-protection-and-azure-purview\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/privacy-compliance-for-smart-meter-infrastructure-with-microsoft-information-protection-and-azure-purview\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/06\/privacy-compliance-for-smart-meter-infrastructure-with-microsoft-information-protection-and-azure-purview.png\",\"datePublished\":\"2021-06-02T16:00:01+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/privacy-compliance-for-smart-meter-infrastructure-with-microsoft-information-protection-and-azure-purview\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.threatshub.org\/blog\/privacy-compliance-for-smart-meter-infrastructure-with-microsoft-information-protection-and-azure-purview\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/privacy-compliance-for-smart-meter-infrastructure-with-microsoft-information-protection-and-azure-purview\/#primaryimage\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/06\/privacy-compliance-for-smart-meter-infrastructure-with-microsoft-information-protection-and-azure-purview.png\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/06\/privacy-compliance-for-smart-meter-infrastructure-with-microsoft-information-protection-and-azure-purview.png\",\"width\":574,\"height\":305},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/privacy-compliance-for-smart-meter-infrastructure-with-microsoft-information-protection-and-azure-purview\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.threatshub.org\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"compliance\",\"item\":\"https:\/\/www.threatshub.org\/blog\/tag\/compliance\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Privacy compliance for smart meter infrastructure with Microsoft Information Protection and Azure Purview\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Privacy compliance for smart meter infrastructure with Microsoft Information Protection and Azure Purview 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/privacy-compliance-for-smart-meter-infrastructure-with-microsoft-information-protection-and-azure-purview\/","og_locale":"en_US","og_type":"article","og_title":"Privacy compliance for smart meter infrastructure with Microsoft Information Protection and Azure Purview 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/privacy-compliance-for-smart-meter-infrastructure-with-microsoft-information-protection-and-azure-purview\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2021-06-02T16:00:01+00:00","og_image":[{"width":574,"height":305,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/06\/privacy-compliance-for-smart-meter-infrastructure-with-microsoft-information-protection-and-azure-purview.png","type":"image\/png"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/privacy-compliance-for-smart-meter-infrastructure-with-microsoft-information-protection-and-azure-purview\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/privacy-compliance-for-smart-meter-infrastructure-with-microsoft-information-protection-and-azure-purview\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Privacy compliance for smart meter infrastructure with Microsoft Information Protection and Azure Purview","datePublished":"2021-06-02T16:00:01+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/privacy-compliance-for-smart-meter-infrastructure-with-microsoft-information-protection-and-azure-purview\/"},"wordCount":1720,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/privacy-compliance-for-smart-meter-infrastructure-with-microsoft-information-protection-and-azure-purview\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/06\/privacy-compliance-for-smart-meter-infrastructure-with-microsoft-information-protection-and-azure-purview.png","keywords":["compliance","Cybersecurity","Data Privacy","Microsoft 365"],"articleSection":["Microsoft Secure"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/privacy-compliance-for-smart-meter-infrastructure-with-microsoft-information-protection-and-azure-purview\/","url":"https:\/\/www.threatshub.org\/blog\/privacy-compliance-for-smart-meter-infrastructure-with-microsoft-information-protection-and-azure-purview\/","name":"Privacy compliance for smart meter infrastructure with Microsoft Information Protection and Azure Purview 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/privacy-compliance-for-smart-meter-infrastructure-with-microsoft-information-protection-and-azure-purview\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/privacy-compliance-for-smart-meter-infrastructure-with-microsoft-information-protection-and-azure-purview\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/06\/privacy-compliance-for-smart-meter-infrastructure-with-microsoft-information-protection-and-azure-purview.png","datePublished":"2021-06-02T16:00:01+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/privacy-compliance-for-smart-meter-infrastructure-with-microsoft-information-protection-and-azure-purview\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/privacy-compliance-for-smart-meter-infrastructure-with-microsoft-information-protection-and-azure-purview\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/privacy-compliance-for-smart-meter-infrastructure-with-microsoft-information-protection-and-azure-purview\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/06\/privacy-compliance-for-smart-meter-infrastructure-with-microsoft-information-protection-and-azure-purview.png","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/06\/privacy-compliance-for-smart-meter-infrastructure-with-microsoft-information-protection-and-azure-purview.png","width":574,"height":305},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/privacy-compliance-for-smart-meter-infrastructure-with-microsoft-information-protection-and-azure-purview\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"compliance","item":"https:\/\/www.threatshub.org\/blog\/tag\/compliance\/"},{"@type":"ListItem","position":3,"name":"Privacy compliance for smart meter infrastructure with Microsoft Information Protection and Azure Purview"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/41184","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=41184"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/41184\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/41185"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=41184"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=41184"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=41184"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}