Knowledge base

March 15, 2025

Sensitive Information Types: Ready for NIS2?

 

More and more companies are taking data governance seriously, and for good reason. With the upcoming NIS2 directive in the Netherlands, companies are required to have their information security in order¹. And beware: soon there will be real fines for non-compliance! 🚨

Microsoft Purview provides powerful tools to identify and protect sensitive data. A critical part of these are Sensitive Information Types, or Sensitive Information Types (SITs). But how do they work and why are they essential for your organization?

🧐 What are Sensitive Information Types (SITs)?

A Sensitive Information Type or Sensitive Information Type (SIT) in Microsoft Purview helps you automatically detect sensitive data, such as:

βœ… Personally identifiable information (PII).
βœ… Payment card information (e.g., credit card numbers)
βœ… Confidential business information (such as contracts or patents)
βœ… Medical or financial data

Using machine learning, pattern recognition and keywords, Microsoft Purview can find sensitive data in emails, SharePoint documents, OneDrive and more.

 

πŸ“‚ What Sensitive Information Types are there?

Microsoft Purview offers standard and custom SITs.

πŸ”Ή Standard Sensitive Information Types

With more than 300 off-the-shelf SITs, Microsoft Purview helps you with compliance with AVG and NIS2, among others. Some examples:


πŸ”Ή Credit Card Number – Recognizes credit card numbers used worldwide.
πŸ”Ή U.S. Social Security Number (SSN) – Detects U.S. citizen service numbers
πŸ”Ή IBAN (International Bank Account Number) – Recognizes bank account numbers
πŸ”Ή AVG data – Recognizes passport numbers, email addresses and phone numbers

 

πŸ”Ή Custom Sensitive Information Types

Want to protect specific company information? Then create your own SIT:
πŸ”Έ Specific customer data or internal IDs
πŸ”Έ Unique keywords or patterns (such as project codes)
πŸ”Έ Regular expressions to recognize data patterns

 

πŸš€ How to Use Sensitive Information Types.

SITs are used in various Microsoft security solutions, such as:

πŸ”Ή Data Loss Prevention (DLP) – Prevents sensitive information from being shared
πŸ”Ή Microsoft Defender for Cloud Apps – Prevents sensitive data from ending up in unauthorized apps
πŸ”Ή Microsoft Information Protection (MIP) – Labels and encrypts documents
πŸ”Ή Insider Risk Management – Detects suspicious internal behavior

 

🎯 Why are SITs Important for NIS2?

With the introduction of NIS2 in the Netherlands, companies are required to take cybersecurity measures and protect sensitive data. Without proper data governance, you risk high fines!

βœ… Automatic protection of sensitive data
βœ… Compliance with NIS2, AVG and other regulations
βœ… Prevention of data breaches and reputational damage
βœ… Efficiency – less manual management required

 

⚠️ Is Your Organization Ready for NIS2?

As of Q3 2025, NIS2 will officially go into effect in the Netherlands. This means that companies must comply with strict cybersecurity requirements. Are you ready? πŸ€”

Want to make sure your organization is compliant and avoid fines? πŸ”

πŸ“ž Get in touch with ALTA-ICT! We help companies with:


βœ”οΈ NIS2 compliance audits
βœ”οΈ Modern Workspaces NIS2 compliant
βœ”οΈ Microsoft Purview and DLP implementations
βœ”οΈ Security awareness trainings
βœ”οΈ Automation of data governance

πŸ‘‰ Avoid risk and take the first step toward compliance now! πŸš€

πŸ’¬ Schedule a no-obligation consultation with our experts! πŸ›‘οΈ

 

References:

ΒΉhttps://alta-ict.nl/blog/wat-gaat-de-nis2-richtlijn-betekenen-voor-jouw-organisatie/

 

About the author

My name is Alta Martes, a specialist in Microsoft 365 and Google Workspace, with a focus on modern workplace management, cloud security and identity & access management. With years of experience, I help organizations optimize their IT infrastructure and create a secure, efficient digital workplace.

🎯 Need help with your Microsoft 365 strategy?
Click below and find out how we can support your organization:

Want to know more?

Get in touch
Illustratie van cybersecurity met een vergrendeld schild en digitale datastromen, symbool voor data protectie en compliance met NIS2 en Microsoft Purview.