Skip to content

Free Security Assessment Tool

Copilot Security Checklist: 25 Pre-Deployment Controls

Assess your Microsoft 365 environment against 25 critical security controls before deploying Copilot. Track your progress and identify gaps.

Overall Progress: 0/25

High Risk

0/9

Critical Controls

0%

Complete

Permissions & Access

0/5 complete

Audit SharePoint site permissions for oversharing

Critical

Review all site-level and library-level permissions. Remove "Everyone" and "Everyone except external users" access from sensitive libraries.

Review Microsoft 365 group memberships

Critical

Audit group-based access to ensure users only belong to groups relevant to their role. Remove stale memberships from departed or transferred employees.

Implement least-privilege access model

Critical

Configure role-based access controls (RBAC) aligned with job functions. Limit Copilot data access to content users genuinely need for their work.

Configure Conditional Access policies

High

Require MFA for Copilot access. Restrict Copilot usage to managed devices and compliant locations based on organizational risk tolerance.

Enable access reviews in Azure AD

High

Schedule quarterly access reviews for sensitive SharePoint sites, Microsoft Teams, and Microsoft 365 Groups to prevent permission drift.

Data Classification

0/5 complete

Deploy sensitivity labels across all document libraries

Critical

Configure Microsoft Purview sensitivity labels (e.g., Public, Internal, Confidential, Highly Confidential) and apply default labels to SharePoint libraries.

Enable auto-labeling policies for sensitive content

Critical

Configure auto-labeling rules using sensitive information types (SITs) to detect and label PII, PHI, financial data, and other regulated content automatically.

Classify existing unstructured data

High

Run Content Explorer and Activity Explorer in Microsoft Purview to identify unlabeled sensitive content. Prioritize high-risk libraries for manual classification.

Configure label inheritance for containers

Medium

Set container-level labels on SharePoint sites and Teams so files inherit the classification of their parent container by default.

Test label enforcement with Copilot queries

High

Verify that sensitivity labels properly restrict Copilot from surfacing Highly Confidential content to users without appropriate clearance.

DLP Policies

0/4 complete

Configure DLP policies for sensitive information types

Critical

Create DLP policies detecting SSN, credit card numbers, health records, and custom SITs specific to your organization. Block or warn on sharing.

Enable DLP for Teams chat and channels

High

Extend DLP policies to Microsoft Teams to prevent sensitive data exposure in chat messages and channel conversations accessed by Copilot.

Configure endpoint DLP for Copilot interactions

Medium

Deploy endpoint DLP to monitor and restrict sensitive data in Copilot-generated content on managed devices.

Create custom DLP policies for industry-specific data

High

Build custom SITs and DLP policies for regulated data types specific to your industry (e.g., HIPAA identifiers, ITAR markings, SOX financial controls).

Audit & Monitoring

0/4 complete

Enable unified audit logging

Critical

Ensure Microsoft 365 Unified Audit Log is enabled and configured with appropriate retention (minimum 90 days, 365 days recommended for regulated industries).

Configure Copilot-specific audit events

Critical

Monitor CopilotInteraction audit events including prompts, responses, data sources accessed, and files referenced in Copilot outputs.

Set up alert policies for anomalous Copilot usage

High

Create alert policies for unusual patterns: bulk data access, off-hours queries against sensitive libraries, or repeated failed access attempts through Copilot.

Integrate Copilot logs with SIEM

Medium

Export Copilot audit data to your SIEM (Sentinel, Splunk, etc.) for correlation with other security events and automated incident response.

Compliance

0/5 complete

Configure retention policies for Copilot interactions

Critical

Apply retention labels to Copilot-generated content matching your organizational retention schedule. Ensure AI outputs are subject to legal hold capabilities.

Enable eDiscovery for Copilot content

High

Verify that Copilot interactions and AI-generated content are discoverable through Microsoft Purview eDiscovery for legal and regulatory inquiries.

Configure Information Barriers (if applicable)

High

For financial services and legal organizations, configure Information Barriers to prevent Copilot from crossing ethical walls between departments.

Document Copilot governance policy

High

Create a formal Copilot Acceptable Use Policy covering permitted use cases, prohibited activities, data handling expectations, and incident reporting procedures.

Conduct Data Protection Impact Assessment (DPIA)

Medium

For GDPR-subject organizations, complete a DPIA documenting Copilot data processing activities, legal basis, risks, and mitigation measures.

Training & Governance

0/2 complete

Develop Copilot user training program

High

Create role-specific training covering proper Copilot usage, data handling expectations, prompt best practices, and how to report security concerns.

Establish Copilot governance committee

Medium

Form a cross-functional governance committee (IT, Legal, Compliance, HR) to oversee Copilot policies, review incidents, and approve expansion.

Start Your Assessment

Check off each security control as you verify it in your environment. Focus on Critical priority items first.

Get Professional Assessment

Frequently Asked Questions

Want a Professional Security Assessment?

Our team uses automated tools and deep Microsoft expertise to evaluate all 25 controls plus 50+ additional checks. Get a comprehensive report in 2-4 weeks.