Control 2.1: Managed Environments
Control ID: 2.1 Pillar: Management Regulatory Reference: FINRA 4511, SEC 17a-4, GLBA 501(b), SOX 302 Last UI Verified: February 2026 Governance Levels: Baseline / Recommended / Regulated Last Verified: 2026-02-03
Agent 365 Architecture Update
Agent 365 lifecycle management complements Power Platform Managed Environments by providing cross-platform promotion gates and approval workflows. While Managed Environments continue to govern Copilot Studio agents, Agent 365 extends lifecycle governance to Agent Builder, Microsoft Foundry, and SharePoint agents. See Unified Agent Governance for lifecycle management architecture.
Objective
Enable premium governance capabilities for Power Platform environments by designating them as Managed Environments, providing enhanced control over sharing, solution deployment, usage monitoring, and maker onboarding essential for financial services governance.
Why This Matters for FSI
- FINRA 4511: Usage insights provide activity records supporting books and records requirements
- SEC 17a-4: Solution checker enforces change control for recordkeeping systems
- GLBA 501(b): Sharing limits protect customer information from unauthorized access
- SOX 302: Maker welcome content documents policy acknowledgment for internal controls
Prerequisites
Licensing Requirements
Managed Environments require Power Platform Premium capacity or equivalent licensing. Verify the following before implementation:
- Managed Environment activation: Requires Power Apps, Power Automate, or Copilot Studio premium licenses, OR Dynamics 365 licenses, OR Power Platform per-app/per-user plans with premium entitlements
- Advanced security features (IP Firewall, VNet, CMK, Lockbox): Require additional licensing beyond Managed Environment designation
- Usage insights: Included with Managed Environment; no additional license required
- Solution checker enforcement: Included with Managed Environment; no additional license required
Consult Microsoft Learn: Licensing overview for current licensing requirements.
Pay-As-You-Go Does NOT Satisfy Managed Environment Licensing
Enabling pay-as-you-go for a Managed Environment is NOT sufficient to meet licensing requirements if:
- Users without standalone Power Apps licenses are using Power Apps in that environment, OR
- Users without standalone Power Automate licenses are using flows in that environment
Pay-as-you-go consumption meters (Power Apps per app PAYG, Copilot Studio PAYG) do NOT satisfy Managed Environment licensing for active users—standalone premium licenses are required for each user accessing the environment.
Critical Deadline: February 2026 Pipeline Requirement
Action Required: February 2026 Managed Environment Enforcement
Starting February 2026, Microsoft will automatically enable Managed Environments for any pipeline target environments that aren't already enabled.
Impact:
- All pipeline target environments will become Managed Environments
- Licensing charges may apply for environments without premium capacity
- Developer environments are NOT affected (can remain unmanaged)
- Pipeline host environments can be production without being managed
Required Actions:
- Audit all pipeline target environments in your tenant
- Verify premium licensing coverage for each target environment
- Proactively enable Managed Environment status to control timing
- Use Pipeline Governance Cleanup to discover and remediate personal pipelines before enforcement
Control Description
Managed Environments provide premium governance capabilities for Power Platform environments, enabling centralized control over sharing, solution deployment, usage insights, and maker onboarding. When enabled, administrators gain access to governance capabilities including sharing controls, solution checker enforcement, usage insights, maker welcome content, and cross-tenant restrictions. Advanced security features such as IP Firewall, VNet support, Customer Managed Keys, and Lockbox require separate licensing and configuration beyond the Managed Environment designation.
For FSI organizations, Managed Environments are essential for enforcing governance policies at the environment level. The feature enables a "sterile default" strategy where all non-personal environments operate under controlled sharing, monitored usage, and enforced deployment gates.
Key capabilities particularly relevant for regulated financial services include:
- Manage sharing - Limit how widely apps, flows, and agents can be shared
- Solution checker enforcement - Block/warn on solution imports with security issues
- Usage insights - Weekly digest of top apps and flows for compliance monitoring
- Maker welcome content - Custom onboarding guidance communicating policy requirements
- Cross-tenant restrictions - Control connector access across tenant boundaries
Key Configuration Points
Managed Environment Settings
- Enable Managed Environment status for all non-personal environments
- Configure sharing limits per resource type (Power Apps, Power Automate, Copilot Studio)
- Set solution checker enforcement level: None (Zone 1), Warn (Zone 2), Block (Zone 3)
- Enable usage insights with Compliance team as additional recipients
- Configure maker welcome content with governance policy summary and policy links
- Apply cross-tenant restrictions (disable inbound/outbound for regulated environments)
- Configure masking rules to redact or mask sensitive data fields (e.g., SSN, account numbers) in agent responses within managed environments
- Apply conditional access policies on individual apps within managed environments to enforce app-level authentication and authorization requirements beyond environment-level controls
- Configure app allow/block lists to restrict which Power Apps and agents can run in each managed environment, supporting least-privilege application governance
Environment Provisioning Governance
-
Restrict environment creation to authorized admins: In Power Platform Admin Center > Tenant Settings, configure the following to "Only specific admins" for each environment type:
- Developer environment assignments
- Production environment assignments
- Trial environment assignments
This prevents uncontrolled environment sprawl where trial or developer environments may expose sensitive data or bypass compliance controls
-
Configure environment routing: In PPAC > Tenant Settings > Environment Routing, configure routing rules to ensure new environments are created in the correct region aligned with data residency requirements and organizational governance policies. This supports compliance with data locality regulations and optimizes resource management
-
Enable tenant isolation: In PPAC > Security > Identity and access > Tenant Isolation, enable "Restrict Cross-Tenant Connections" to prevent data from moving into or out of the tenant via Power Platform connectors. Configure explicit exceptions (by Tenant ID and direction) only for trusted partner tenants. Unrestricted cross-tenant connectivity increases risk of unintended data exchange and regulatory non-compliance
-
Configure environment security groups: In PPAC > Security > Identity and access > Environment Security Groups, assign a security group to each environment to control user access. Without security groups, environment access may default to broad access, increasing risk of unauthorized access to sensitive data and applications
Zone-Specific Requirements
| Zone | Requirement | Rationale |
|---|---|---|
| Zone 1 (Personal) | Apply baseline minimum; document exceptions for personal agents; environment creation restricted to admins | Reduces risk from personal use while keeping friction low |
| Zone 2 (Team) | Enable managed environment governance; require identified owner and approval trail; security groups required; tenant isolation enabled | Shared agents increase blast radius; controls must be consistently applied |
| Zone 3 (Enterprise) | Require strictest configuration enforced via policy; treat changes as controlled; security groups required; tenant isolation enforced; environment routing configured for data residency compliance | Enterprise agents handle most sensitive content and highest regulatory risk |
Roles & Responsibilities
| Role | Responsibility |
|---|---|
| Power Platform Admin | Configure environment settings, enable Managed Environment, set sharing limits |
| Environment Admin | Environment-level administration and user management |
| AI Administrator | Copilot settings governance within managed environments |
| Compliance Officer | Review usage insights, approve governance zone classifications |
| IT Governance | Define sharing limit policies and solution checker requirements |
| AI Governance Lead | Configure agent-specific sharing settings |
Related Controls
| Control | Relationship |
|---|---|
| 1.20 - Network Isolation | VNet support implementation for private connectivity |
| 2.2 - Environment Groups | Group-level governance rules that complement environment settings |
| 2.15 - Environment Routing | Automatic maker placement into governed environments |
| 1.4 - Advanced Connector Policies | Data policies enforced within managed environments |
| 2.3 - Change Management | Solution deployment controls using solution checker |
| 2.22 - Inactivity Timeout Enforcement | Inactivity timeout policies operate within managed environment framework |
Implementation Playbooks
Step-by-Step Implementation
This control has detailed playbooks for implementation, automation, testing, and troubleshooting:
- Portal Walkthrough — Step-by-step portal configuration
- PowerShell Setup — Automation scripts
- Verification & Testing — Test cases and evidence collection
- Troubleshooting — Common issues and resolutions
Advanced Implementation: Configuration Hardening Baseline
This control is covered by the Configuration Hardening Baseline, which consolidates SSPM-detectable settings across all 7 mapped controls into a single reviewable checklist with automation classification and evidence export procedures.
Verification Criteria
Confirm control effectiveness by verifying:
- Managed Environment status shows enabled in PPAC environment details
- Sharing limits block attempts to share beyond configured thresholds (test with non-admin user)
- Solution checker blocks non-compliant solution imports (if Block mode enabled)
- Weekly usage insights digest arrives at configured recipient addresses
- Maker welcome content displays for new users accessing the environment
- Environment creation is restricted to authorized admins only (PPAC > Tenant Settings > verify "Only specific admins" is set for Developer, Production, and Trial environment assignments)
- Environment routing is configured for correct region (PPAC > Tenant Settings > Environment Routing)
- Tenant isolation is enabled (PPAC > Security > Identity and access > Tenant Isolation > "Restrict Cross-Tenant Connections" is on)
- Security groups are assigned to all Zone 2/3 environments (PPAC > Environment details > Security group)
Additional Resources
- Microsoft Learn: Managed Environments Overview
- Microsoft Learn: Enable Managed Environment
- Microsoft Learn: Sharing Limits
- Microsoft Learn: Solution Checker Enforcement
- Microsoft Learn: Usage Insights
- Microsoft Learn: Cross-tenant Restrictions
Advanced Implementation: Environment Lifecycle Management
For automated environment provisioning with Managed Environment status enabled from creation, see Environment Lifecycle Management.
Deployable Solution: environment-lifecycle-management provides Python automation scripts for Dataverse schema creation, security roles, and evidence export.
Agent 365 Blueprint Lifecycle (Preview)
Preview Notice
Microsoft Agent 365 SDK and Agent Essentials are in limited preview (Frontier program). Verify feature availability and GA timelines before implementing production controls dependent on these capabilities. Expect changes before general availability.
Agent 365 Blueprints introduce 3-phase lifecycle management that aligns with Managed Environment promotion paths:
- Phase 1: Design - Define agent requirements and governance zone
- Phase 2: Build - Develop in development Managed Environment
-
Phase 3: Deploy - Promote to production Managed Environment via Blueprint registration
-
Microsoft Learn: Agent 365 Blueprint (Preview) - 3-phase deployment framework
Implementation Note
Organizations should verify that their implementation meets their specific regulatory obligations. This control supports compliance efforts but requires proper configuration and ongoing validation.
Updated: February 2026 | Version: v1.3 | UI Verification Status: Current