Intermediate

Security for Microsoft Copilot

Microsoft 365 Copilot inherits the security model of Microsoft 365, but AI amplifies both the benefits and risks of your existing data governance posture. Pre-deployment security preparation is critical.

Security Architecture

M365 Copilot's security relies on several layers:

  • Entra ID authentication: All Copilot interactions are authenticated through Microsoft Entra ID
  • Microsoft Graph permissions: Copilot can only access data the user already has permission to access
  • Azure OpenAI boundary: Data is processed in your Microsoft tenant boundary; not used for model training
  • Sensitivity labels: Microsoft Purview sensitivity labels are respected by Copilot
  • DLP policies: Existing Microsoft Purview DLP policies apply to Copilot interactions
The oversharing problem: Copilot makes data access problems visible. If a user has access to an HR document they should not see because SharePoint permissions are too broad, Copilot will surface that document in responses. Audit and fix permissions before deploying Copilot.

Pre-Deployment Security Checklist

TaskPriorityDetails
SharePoint permissions auditCriticalReview site and document permissions; remove "Everyone" and "Everyone except external users" sharing
Sensitivity labelsHighDeploy Microsoft Purview sensitivity labels for confidential and restricted content
DLP policiesHighConfigure DLP policies to prevent sensitive data exposure through Copilot
Conditional accessMediumConfigure conditional access policies for Copilot-enabled users
Information barriersMediumImplement information barriers for regulated industries
Retention policiesMediumDefine retention for Copilot interaction logs and generated content

Compliance Considerations

  • Data residency: M365 Copilot processes data within your tenant's geographic region
  • eDiscovery: Copilot interactions are captured and searchable through Microsoft Purview eDiscovery
  • Audit logging: All Copilot activities are logged in the Microsoft 365 unified audit log
  • Regulatory compliance: Copilot supports compliance with GDPR, HIPAA, SOC 2, and other frameworks

Microsoft Purview for Copilot

Microsoft Purview provides the governance backbone for Copilot security:

  1. Sensitivity labels: Classify and protect documents; Copilot respects these labels
  2. Data Loss Prevention: Prevent sensitive information from being shared through Copilot
  3. Information Protection: Encryption and access controls that persist across Copilot interactions
  4. Insider Risk Management: Detect risky user behavior patterns with Copilot
Start with SharePoint: The single most impactful security action before Copilot deployment is auditing SharePoint Online permissions. Use SharePoint Advanced Management or third-party tools to identify and remediate overshared content.