Apply principles of Zero Trust to Microsoft Copilot Chat
Summary: To apply Zero Trust principles to Microsoft Copilot Chat, you need to:
- Implement security protections for web-grounded prompts to the Internet.
- Add security protections for Microsoft Edge browser summarization.
Introduction
Copilot Chat is an AI companion in the Microsoft 365 Copilot app, in Edge, and at the following URLs — M365copilot.com and Copilot.cloud.microsoft. It's provided for Entra account users with a qualifying license. Copilot Chat includes enterprise data protection. Enterprise data protection is not included in Copilot Chat for personal use (consumer version). This article helps you implement security protections to keep your organization and data safe while using Copilot Chat. By implementing these protections, you're building a foundation of Zero Trust.
Zero Trust security recommendations for Copilot Chat focus on protection for user accounts, user devices, and your organization data that can be summarized by Copilot Chat in Edge.
How does Zero Trust help with AI?
Security, especially data protection, is often a top concern when introducing AI tools into an organization. Zero Trust is a security strategy that verifies every user, device, and resource request to ensure that each of these is allowed. The term "zero trust" refers to the strategy of treating each connection and resource request as though it originated from an uncontrolled network and a bad actor. Regardless of where the request originates or what resource it accesses, Zero Trust teaches us to “never trust, always verify.”
As a leader in security, Microsoft provides a practical roadmap and clear guidance for implementing Zero Trust. Microsoft’s set of Copilots are built on top of existing platforms, which inherit the protections applied to those platforms. For the details of applying Zero Trust to Microsoft’s platforms, see the Zero Trust Guidance Center. By implementing these protections, you're building a foundation of Zero Trust security.
This article draws from that guidance to prescribe the Zero Trust protections that relate to Copilot.
What’s included in this article
This article walks through the security recommendations that apply in two stages. This provides a path for you to introduce Copilot Chat into your environment while you apply security protections for users, devices, and the data accessed by Copilot.
Stage | Configuration | Components to secure |
---|---|---|
1 | Web-grounded prompts to the Internet | Basic security hygiene for users and devices using identity and access policies. |
2 | Web-grounded prompts to the Internet with Edge browser page summarization enabled | Your organization data on local, intranet, and cloud locations that Copilot in Edge can summarize. |
Stage 1. Start with security recommendations for web-grounded prompts to the Internet
The simplest configuration of Copilot provides AI assistance with web-grounded prompts.
In the illustration:
- Users can interact with Copilot Chat through M365copilot.com, Copilot.cloud.microsoft, the Microsoft 365 Copilot app, and Edge.
- Prompts are web-grounded. Copilot Chat only uses publicly available data to respond to prompts.
- Edge browser page summarization is not enabled.
With this configuration, your organization data isn’t included in the scope of data that Copilot Chat references. However, you need to ensure that browser page summarization is not enabled. As an admin, you can do this by using the EdgeEntraCopilotPageContext group policy setting.
Use this stage to implement identity and access policies for users and devices to prevent bad actors from using Copilot. At a minimum, you must configure Conditional Access policies that require:
Additional recommendations for Microsoft 365 E3
- For user account authentication and access, also configure the identity and access policies to Block clients that don’t support modern authentication.
- Use Windows protection capabilities.
Additional recommendations for Microsoft 365 E5
Implement the recommendations for E3 and configure the following identity and access policies:
Stage 2. Add security protections for Edge browser summarization
From the Microsoft Edge sidebar, Microsoft Copilot Chat helps you get answers and inspirations from across the web and, if enabled, from some types of information displayed in open browser tabs.
If you disabled browser page summarization, you need to re-enable this feature. As an admin, you can do this by using the EdgeEntraCopilotPageContext group policy setting.
Here are some examples of private or organization web pages and document types that Copilot in Edge can summarize:
- Intranet sites such as SharePoint, except embedded Office documents
- Outlook Web App
- PDFs, including those stored on the local device
- Sites not protected by Microsoft Purview DLP policies, Mobile Application Management (MAM) policies, or MDM policies
Note
For the current list of document types supported by Copilot in Edge for analysis and summarization, see Copilot in Edge webpage summarization behavior.
Potentially sensitive organization sites and documents that Copilot in Edge can summarize could be stored in local, intranet, or cloud locations. This organization data can be exposed to an attacker who has access to the device and uses Copilot in Edge to quickly produce summarizations of documents and sites.
The organization data that can be summarized by Copilot in Edge can include:
Local resources on the user’s computer
PDFs or information displayed in an Edge browser tab by local apps that are not protected with MAM policies
Intranet resources
PDFs or sites for internal apps and services that are not protected by Microsoft Purview DLP policies, MAM policies, or MDM policies
Microsoft 365 sites that are not protected by Microsoft Purview DLP policies, MAM policies, or MDM policies
Microsoft Azure resources
PDFs on virtual machines or sites for SaaS apps that are not protected by Microsoft Purview DLP policies, MAM policies, or MDM policies
Third-party cloud product sites for cloud-based SaaS apps and services that are not protected by Microsoft Purview DLP policies, MAM policies, or MDA policies
Use this stage to implement levels of security to prevent bad actors from using Copilot to more quickly discover and access sensitive data. At a minimum, you must:
- Deploy data security and compliance protections with Microsoft Purview
- Configure minimum user permissions to data
- Deploy threat protection for cloud apps with Microsoft Defender for Cloud Apps
For more information about Copilot in Edge, see:
Recommendations for E3 and E5
Implement Intune app protection policies (APP) for data protection. APP can prevent the inadvertent or intentional copying of Copilot-generated content to apps on a device that aren’t included in the list of permitted apps. APP can limit the blast radius of an attacker using a compromised device.
Turn on Microsoft Defender for Office 363 Plan 1, which include Exchange Online Protection (EOP) for Safe Attachments, Safe Links, advanced phishing thresholds and impersonation protection, and real-time detections.
Next steps
See these additional articles for Zero Trust and Microsoft's Copilots:
References
Refer to these links to learn about the various services and technologies mentioned in this article.