Share via


Copilot Control System security and governance

When you implement Microsoft 365 Copilot and agents, you might face new and amplified risks related to security, compliance, privacy, and governance. This security and governance framework helps you mitigate these issues in the following components:

  • Microsoft 365 Copilot
  • Microsoft 365 Copilot Chat
  • Microsoft 365 prebuilt agents
  • Agents created in Microsoft Copilot Studio and published to Microsoft 365 channels

This article refers to foundational and optimized controls. In general, those terms refer to the following products and services:

  • Foundational: controls for security and governance in the Microsoft 365 admin center, SharePoint Advanced Management, and Microsoft Purview with an A3/E3/G3 license.

  • Optimized: controls in Microsoft Purview and Microsoft Defender for Cloud Apps with an A5/E5/G5 license.

A diagram of the Copilot Control System framework highlighting the Security and Governance pillar.

Note

The Copilot Control System consists of three main pillars:

The security and governance pillar of the Copilot Control System focuses on the following key capabilities:

  • Data security
  • AI security
  • Compliance and privacy

Data security

First and foremost, safeguard your organization's information. Depending on your current licensing, use Microsoft Purview and SharePoint Advanced Management to assess oversharing risks. You can also use Microsoft Purview for policy recommendations and to take corrective actions. These actions help you to be confident that sensitive data remains protected, and access is limited to only those users who need it, including with Copilot and agents.

Foundational data security and governance controls

In SharePoint Advanced Management and Microsoft Purview with an A3/E3/G3 license, you get the following foundational data security and governance controls:

In Microsoft Purview with an A3/E3/G3 license, you get the following foundational data security controls:

Optimized data security controls

In Microsoft Purview with an A5/E5/G5 license, you get the following optimized data security controls:

AI security

You also need to safeguard AI-powered tools and their associated data against evolving threats. The Copilot Control System provides controls to monitor, detect, and respond to AI-related risks. For example, oversharing of sensitive information, anomalous user behavior, and misuse of generative AI capabilities. Use these controls to ensure that AI integrations remain secure, compliant, and resilient against both internal and external threats.

Foundational AI security controls

Copilot already includes built-in protections against AI-based attacks. These protections include, but aren't limited to, the following protections:

In Microsoft Purview with an A3/E3/G3 license, you get the following foundational AI security controls:

Optimized AI security controls

In Microsoft Purview with an A5/E5/G5 license, you get the following optimized AI security controls:

Compliance and privacy

The third aspect of security and governance in the Copilot Control System is to ensure that you can monitor, audit, and manage how Copilot and agent interactions comply with regulatory and internal standards. Use Microsoft Purview to provide comprehensive oversight of Copilot activities. With these controls, you can protect sensitive information, maintain privacy, and demonstrate regulatory compliance when you deploy and use Microsoft 365 Copilot and agents.

Foundational compliance and privacy controls

In Microsoft Purview with an A3/E3/G3 license, you get the following foundational compliance and privacy controls:

Optimized compliance and privacy controls

In Microsoft Purview with an A5/E5/G5 license, you get the following optimized compliance and privacy controls:

Zero Trust

Microsoft provides detailed documentation for implementing the principles of Zero Trust in your organization, and specific considerations for Microsoft 365 Copilot and Copilot Chat. Zero Trust isn't a product or service, but an approach in designing and implementing the following set of security principles:

  • Verify explicitly
  • Use least privileged access
  • Assume breach

For more information, see Use Zero Trust security to prepare for Copilot.