Skip to main content
Home
/Data Security
Data Security

Copilot Data Security Architecture for Banking

Nine security layers protecting banking data in Copilot deployments. From sensitivity labels to runtime agent protection.

Why Data Security Architecture Matters for Banking Copilot Deployments

Copilot surfaces data based on existing Microsoft 365 permissions. It does not create new access paths. It makes existing access visible, which is the core problem. Most organizations have years of accumulated oversharing that was invisible until Copilot started surfacing it in AI-generated responses.

The scale of exposure is significant. Organizations have an average of 802,000 files at risk through inappropriate permissions, with 16% of business-critical files accessible to users who should not have access (Concentric AI, 2026). Over 50% of all permissions are classified as high-risk. For banks with decades of SharePoint content and inconsistent permission models, Copilot deployment without data security remediation creates immediate data exposure.

A defense-in-depth approach is required. No single security control is sufficient for banking compliance. The February 2026 DLP bypass incident (CW1226324), where Copilot summarized confidential emails despite active DLP policies, demonstrated that even Microsoft's own controls can have gaps (The Register, 2026). Banks need nine overlapping security layers to protect sensitive financial data in Copilot environments.

How Does Copilot Access Banking Data?

Copilot uses Microsoft Graph as its primary data access layer. It can access any content the user has permission to view across SharePoint, OneDrive, Teams, Exchange, and Loop. The Semantic Index processes and indexes organizational content for Copilot retrieval. Prompts and responses are processed through Azure OpenAI Service with enterprise data protections, and data is not used to train foundation models (Microsoft DPA).

For banks, this architecture means that permission hygiene determines security posture. Common oversharing patterns include 'Everyone except external users' groups, inherited permissions on sensitive sites, stale sharing links from departed employees, and broadly shared Teams channels. Banks typically accumulate 10+ years of SharePoint content with inconsistent permission models. Every one of these permission gaps becomes a Copilot data source.

Layer 1: Sensitivity Labels and Classification

Deploy mandatory sensitivity labeling across all Microsoft 365 content before enabling Copilot. The EXTRACT right on sensitivity labels controls whether Copilot can access labeled content. Banking institutions should implement a five-tier label taxonomy: Public, Internal, Confidential, Highly Confidential, and Restricted.

Banking-specific label assignments should map to regulatory data categories. SAR-related documents get the Restricted label with Copilot access blocked (EXTRACT right removed). Trading floor communications receive Highly Confidential with information barrier enforcement. Client portfolio data is labeled Confidential with department-scoped access. Board materials are Highly Confidential with named-user access only. PCI-scoped documents receive the Restricted label blocking all Copilot processing.

Auto-labeling policies should be configured for banking-specific patterns: account numbers, SSNs, SAR references, PCI data, and MNPI keywords. A default label policy should apply Internal classification to all new documents at minimum.

Layer 2: Data Loss Prevention (DLP)

DLP policies for the Copilot location became Generally Available in 2025 (Microsoft, 2025). These policies block Copilot from processing files and emails with specific sensitivity labels and detect sensitive information types (SITs) in prompts and responses.

Banks should create custom SITs for financial data that built-in detectors do not cover: SAR reference patterns, SWIFT/BIC codes, internal account number formats, and MNPI keyword lists. The February 2026 DLP bypass incident demonstrated that policies must be tested against edge cases including Sent/Draft folders and forwarded emails. DLP alone is not sufficient; it is one layer in a defense-in-depth model.

Payment card numbers

Use built-in Credit Card Number SIT. Action: Block + Notify. Label: Restricted

US Social Security Numbers

Use built-in SSN SIT. Action: Block + Notify. Label: Highly Confidential

SAR references

Create custom SIT with SAR pattern matching. Action: Block + Notify + Alert. Label: Restricted

SWIFT/BIC codes

Create custom SIT. Action: Warn + Log. Label: Confidential

MNPI references

Create custom SIT with MNPI keyword matching. Action: Block + Notify + Alert. Label: Restricted

Client PII clusters

Create custom SIT for Name + Account + SSN proximity. Action: Block + Notify. Label: Highly Confidential

Layer 3: Information Barriers

Microsoft Purview Information Barriers segment users by department and prevent cross-division communication and content access. For banking, this enforces Chinese walls between investment banking, research, and trading divisions.

There is a critical limitation: the Channel Agent (Teams Copilot agent) does not support Information Barriers. Banks must disable the Channel Agent for barrier-restricted divisions and restrict Copilot to individual-scope access (no cross-user content) in sensitive divisions. No Microsoft ETA for resolving this limitation has been published. Banks must implement compensating controls and document them for regulatory examiners.

  • Define barrier segments aligned with compliance policies: IB division, trading desk, research, retail banking
  • Configure Information Barrier policies in Purview and verify enforcement across SharePoint, OneDrive, and Teams
  • Disable Channel Agent for all barrier-restricted divisions
  • Test Copilot behavior at barrier boundaries before production deployment
  • Document Channel Agent exclusions and compensating controls for regulatory records

Layer 4: Conditional Access and Role-Based Deployment

Not all M365 users need Copilot access. Deploy licenses by role and risk profile, using Conditional Access policies to restrict how and where Copilot can be used.

  • Block Copilot access from unmanaged and personal devices
  • Require compliant device plus managed application for Copilot access
  • Restrict Copilot to corporate network or approved VPN connections
  • Apply session controls to limit download of Copilot-referenced files on mobile
  • Use risk-based Conditional Access to block Copilot during high-risk sign-in events
  • Trading floor users: restricted or no Copilot access depending on information barrier status
  • Compliance officers: full Copilot access with enhanced audit logging enabled

Layers 5-6: Agent Identity (Entra Agent ID) and Runtime Protection (Defender for AI)

Entra Agent ID (Preview, 2025) provides a dedicated identity framework for AI agents. Every Copilot Studio agent, Power Automate flow, and custom integration receives a managed identity with lifecycle management, sponsor requirements, orphan prevention, and Conditional Access policy enforcement. For banking, this prevents shadow agents from operating without identity governance. Abandoned agents from departed employees are automatically flagged for deactivation.

Defender for AI provides runtime protection that monitors agent behavior, blocks actions via webhooks, and generates security alerts. The AI Security Posture Management dashboard identifies the Top 10 agent misconfigurations specific to an organization's deployment. For banking, this layer catches agent actions that violate data policies in real time, before the action completes, rather than detecting violations after the fact through audit logs.

Layers 7-8: Oversharing Remediation and Monitoring

Microsoft's Oversharing Blueprint provides a structured remediation process using SharePoint Advanced Management (SAM) and Purview DSPM for AI. SAM is included with the Copilot license at no additional cost.

1

Run SAM data access governance reports to identify overshared sites (28-day rolling window)

2

Use Restricted Content Discovery (RCD) to flag sites for immediate Copilot exclusion while remediation is in progress

3

Apply Restricted Access Control (RAC) to lock down high-risk sites to specific user allow lists

4

Bulk remediate overshared links: org-wide, 'anyone,' and 'everyone' groups

5

Enable Purview DSPM for AI for ongoing weekly risk assessments of Copilot-related data exposure

6

Implement quarterly site access reviews for banking-critical SharePoint libraries

Layer 9: Data Residency and Processing Boundaries

Microsoft's EU Data Boundary processes Copilot data within the EU for EU tenants. In-region processing is available in 15+ countries (announced 2025). Copilot prompts and responses are stored in Exchange Online in the same residency region as the user mailbox. Semantic Index data is stored in the same region as the M365 tenant.

For global banks, data residency alone does not equal regulatory compliance. GDPR, DORA, and national regulations may impose requirements beyond where data is processed. Banks must document data flows, identify cross-border transfers, maintain Standard Contractual Clauses where applicable, and verify that Copilot data processing stays within required jurisdictional boundaries.

Common Questions

Copilot uses Microsoft Graph to access any content the user has permission to view across SharePoint, OneDrive, Teams, Exchange, and Loop. It does not create new access paths. It surfaces existing access, which means oversharing problems that were previously invisible become immediately visible through Copilot responses. The Semantic Index processes and indexes organizational content for retrieval. Prompts and responses are processed through Azure OpenAI Service and are not used to train foundation models (Microsoft DPA).

Organizations have an average of 802,000 files at risk through inappropriate permissions, with over 50% of permissions classified as high-risk (Concentric AI, 2026). Banks with decades of SharePoint content typically have 'Everyone except external users' groups, inherited permissions on sensitive sites, and stale sharing links from departed employees. Copilot makes these invisible permission problems visible by surfacing content in AI responses. Banks must remediate oversharing before or during Copilot deployment.

Banks should implement a five-tier label taxonomy: Public, Internal, Confidential, Highly Confidential, and Restricted. SAR-related documents receive the Restricted label with the EXTRACT right removed to block Copilot access entirely. Trading floor communications receive Highly Confidential with information barrier enforcement. Client portfolio data is Confidential with department-scoped access. PCI-scoped documents receive Restricted classification. Auto-labeling policies should detect banking-specific patterns: account numbers, SSNs, SAR references, and MNPI keywords.

Get Your Copilot Data Security Assessment

Evaluate your data protection posture across 9 security layers.