Skip to content

MCP Server Governance for FSI

Last Updated: March 2026 Version: v1.4.0


Overview

The Model Context Protocol (MCP) is an open standard that enables Copilot Studio agents to connect to external data sources and tools through custom MCP servers. In Copilot Studio, organizations can create new MCP servers or connect agents to existing ones, allowing agents to retrieve real-time data from internal APIs, databases, and third-party services.

MCP servers surface as custom connectors within the Power Platform connector framework. This means they inherit the same DLP policy controls, environment scoping, and governance mechanisms that apply to any Power Platform connector — but they also introduce new risks specific to regulated environments.

Preview Feature — Custom MCP Servers

Custom MCP Servers in Copilot Studio are in Preview as of April 2026, with general availability planned for October 2026. Configuration options, authentication flows, and administrative controls may change before GA. Organizations should verify current capabilities against Microsoft Learn documentation before production deployment.

This playbook provides FSI-specific governance guidance for MCP server integration, covering DLP connector policy scoping, authentication governance, network isolation, and audit requirements.


FSI Risk Assessment

MCP server integration introduces governance considerations that require attention in regulated financial services environments:

Data Exfiltration Risk

MCP servers can expose internal APIs, trading systems, customer databases, and other regulated data sources to AI agents. Without proper governance:

  • Agents may access data beyond their intended scope
  • Sensitive customer information (PII, account data, trading records) could flow through unmanaged channels
  • Data may traverse network boundaries in ways that conflict with information barrier requirements

Unmanaged Connection Proliferation

Without connector governance, business users could create MCP servers that connect to:

  • Internal CRM and customer management systems
  • Market data feeds subject to exchange licensing agreements
  • Trade execution platforms subject to FINRA supervision
  • Document repositories containing material non-public information (MNPI)

Regulatory Implications

Regulatory Driver MCP Governance Requirement
FINRA 3110 Supervision of agent access to customer-facing data sources
FINRA 4511 Recordkeeping for agent-to-MCP-server interactions
SEC 17a-4 Retention of communications routed through MCP servers
GLBA 501(b) Safeguards for customer data accessed via MCP connections
OCC 2011-12 Model risk assessment for agents using external data sources
SOX 302/404 Internal controls over financial data accessed by agents

Implementation Caveat

Organizations should conduct their own risk assessment specific to the data sources exposed through MCP servers. The regulatory implications above are illustrative — actual requirements depend on the data types, business processes, and jurisdictions involved. Legal and compliance counsel should review MCP deployment plans before production use.


Architecture Overview

flowchart TB
    subgraph "Agent Layer"
        A[Copilot Studio Agent] -->|MCP Protocol| B[MCP Server]
        C[Multi-Agent Orchestration] -->|MCP Protocol| B
    end

    subgraph "MCP Server Layer"
        B --> D[Internal API Gateway]
        B --> E[Database Connector]
        B --> F[Third-Party Service]
    end

    subgraph "Governance Layer"
        G[DLP Connector Policy] -->|Scopes| B
        H[OAuth 2.0 / API Key] -->|Authenticates| B
        I[VNet Integration] -->|Routes| B
        J[Purview Audit] -->|Logs| A
    end

    subgraph "Data Sources"
        D --> K[CRM / Customer Data]
        E --> L[Trading Systems]
        F --> M[Market Data Feeds]
    end

DLP Connector Policy Scoping

MCP servers appear as custom connectors in the Power Platform environment. This means they fall under Advanced Connector Policies (ACP) and DLP policy enforcement — the same mechanisms used for all Power Platform connectors.

Connector Classification

When an MCP server is registered, classify it within your DLP connector policy:

Classification When to Use Example
Business Approved for use with business data in governed environments Internal knowledge base MCP server
Non-Business Approved for non-sensitive use cases only Public market data feed (read-only)
Blocked Not approved for any use Unapproved third-party MCP servers

Environment-Level Policy Configuration

Apply DLP connector policies at the environment level per Control 1.4 — Advanced Connector Policies:

# Example: Block unapproved MCP custom connectors in a Zone 3 environment
# Retrieve the environment-level DLP policy
$policy = Get-DlpPolicy -PolicyName "Zone3-Production-DLP"

# Add MCP custom connector to the blocked group
# Note: MCP connectors appear as custom connectors with a
# connector ID matching the MCP server registration
Add-CustomConnectorToPolicy `
    -PolicyName "Zone3-Production-DLP" `
    -ConnectorId "/providers/Microsoft.PowerApps/apis/shared_mcp-<server-id>" `
    -GroupName "Blocked"

Recommended Approach

Block all custom connectors by default and explicitly allowlist approved MCP servers. This prevents unauthorized MCP servers from being used in governed environments.

Policy Scoping by Zone

  • Zone 2 (Team): Allow only MCP servers that have completed security review and are classified as "Business" connectors
  • Zone 3 (Enterprise): Allow only MCP servers that have completed full governance review, penetration testing, and data classification assessment

See Control 1.5 — DLP and Sensitivity Labels for detailed DLP policy configuration guidance.


Authentication Governance

MCP servers in Copilot Studio support OAuth 2.0 and API key authentication. Authentication method selection has significant governance implications for FSI organizations.

OAuth 2.0 is the recommended authentication method for Zone 2 and Zone 3 MCP server deployments:

Capability FSI Benefit
Token refresh Reduces credential exposure window
Scope limitation Restricts agent access to specific API operations
Consent framework Supports delegated permission models
Token expiration Limits blast radius of credential compromise
Audit trail Token issuance and refresh events are logged in Entra ID

Configuration considerations:

  1. Register MCP server as an Entra ID application for centralized identity management
  2. Define granular OAuth scopes that align with the agent's intended data access
  3. Use delegated permissions where possible (agent acts on behalf of the user)
  4. Set token lifetime policies appropriate for the data sensitivity level
  5. Enable Conditional Access policies for the MCP server's app registration per Control 1.11

API Key Authentication

API keys are acceptable for internal development and Zone 1 (Personal Productivity) scenarios only:

Consideration Guidance
Rotation frequency Rotate per organizational policy (recommended: 90 days or fewer)
Storage Store in Azure Key Vault — never embed in agent configuration
Scope API keys typically grant broad access — compensate with network controls
Audit API key usage is harder to attribute to specific users
# Store MCP server API key in Azure Key Vault
$secretValue = ConvertTo-SecureString "<api-key-value>" -AsPlainText -Force
Set-AzKeyVaultSecret `
    -VaultName "kv-agent-governance" `
    -Name "MCP-Server-APIKey-<server-name>" `
    -SecretValue $secretValue `
    -Expires (Get-Date).AddDays(90) `
    -Tag @{
        Purpose = "MCP Server Authentication"
        Owner   = "agent-governance-team"
        Zone    = "Zone1"
    }

Authentication Decision Matrix

Factor OAuth 2.0 API Key
Zone 1 (Personal) Recommended Acceptable
Zone 2 (Team) Required Not recommended
Zone 3 (Enterprise) Required Not permitted
Accesses customer PII Required Not permitted
Accesses trading data Required Not permitted
Internal dev/test only Recommended Acceptable

VNet Integration

For Zone 3 (Enterprise) deployments handling regulated data, MCP server traffic should be routed through Azure Virtual Network (VNet) integration per Control 1.20 — Network Isolation and Private Connectivity.

Private Endpoint Configuration

Internal MCP servers that expose regulated data sources should be accessible only through private endpoints:

flowchart LR
    A[Copilot Studio Agent] -->|VNet Integration| B[Private Endpoint]
    B --> C[Internal MCP Server]
    C --> D[Regulated Data Source]

    style B fill:#f9f,stroke:#333
    style C fill:#bbf,stroke:#333

Network Governance Requirements

Requirement Description
Private DNS Configure private DNS zones for MCP server endpoints
NSG rules Restrict inbound access to MCP servers from Copilot Studio VNet subnets only
Traffic logging Enable NSG flow logs for MCP server traffic — aids in FINRA 4511 recordkeeping
No public endpoints Zone 3 MCP servers should not expose public endpoints
Egress controls Restrict MCP server outbound traffic to approved destinations only

Implementation Caveat

VNet integration for Copilot Studio is subject to Power Platform VNet support capabilities. Organizations should verify current VNet integration options with Microsoft documentation before designing network architectures. Capabilities may evolve between Preview and GA.


Audit and Compliance

MCP server interactions generate audit events that support FSI recordkeeping requirements. Organizations should configure audit capture to help meet regulatory retention obligations.

Telemetry Capture

MCP server call events are captured through Copilot Studio agent telemetry:

Audit Signal Description Regulatory Mapping
MCP server invocation Agent called an MCP server FINRA 4511 — business records
Data source accessed Which data source the MCP server queried SEC 17a-4 — communication records
Authentication event OAuth token issuance or API key usage GLBA 501(b) — access safeguards
DLP policy evaluation Connector policy enforcement result SOX 404 — internal controls
Error / failure event MCP server call failures OCC 2011-12 — model performance

Purview Integration

Configure Microsoft Purview to capture and retain MCP-related audit events:

  1. Unified Audit Log (UAL): MCP server invocations appear as Copilot Studio activity events in the UAL
  2. Retention policies: Apply retention policies per Control 1.9 to meet regulatory minimums
  3. eDiscovery: MCP interaction records should be searchable via eDiscovery per Control 1.19

Retention Requirements

Regulation Minimum Retention Recommended
FINRA 4511 6 years 7 years
SEC 17a-4 6 years 7 years
SOX 404 7 years 7 years
GLBA 5 years 7 years

Recordkeeping Responsibility

MCP server governance aids in meeting recordkeeping obligations but does not by itself satisfy regulatory requirements. Organizations should verify that their end-to-end audit architecture — including MCP server logs, agent telemetry, and Purview retention — collectively supports compliance with applicable regulations. Legal and compliance teams should validate the completeness of the audit trail.


Zone-Specific Guidance

Governance Requirement Zone 1 (Personal) Zone 2 (Team) Zone 3 (Enterprise)
MCP server approval Self-service with guardrails Security review required Full governance review + pen test
DLP connector policy Tenant-level default Environment-level policy Environment-level + custom blocking
Authentication OAuth 2.0 recommended; API key acceptable OAuth 2.0 required OAuth 2.0 required
Credential storage Key Vault recommended Key Vault required Key Vault required + rotation policy
VNet integration Not required Recommended for sensitive data Required
Private endpoints Not required Not required Required for internal MCP servers
Audit retention 30 days (default) 90 days minimum 7+ years (regulatory minimum)
Data classification Not required Recommended Required before MCP server approval
Monitoring Basic telemetry Application Insights recommended Application Insights + Sentinel required
Multi-agent access N/A Scoped per orchestration Scoped + monitored per Control 2.17

Roles and Responsibilities

Role MCP Governance Responsibility
Power Platform Admin Manage DLP connector policies, approve MCP server registrations, configure environment-level controls
Entra App Admin Manage MCP server app registrations, configure OAuth scopes and consent
Purview Compliance Admin Configure audit retention, review MCP interaction records
Entra Security Admin Monitor MCP server security events, configure Conditional Access for MCP apps
AI Administrator Govern Copilot Studio agent-to-MCP bindings, manage agent feature access
Agent Sponsor Justify business need for MCP server connections, accept risk for data access

Control Integration Point
1.4 — Advanced Connector Policies (ACP) MCP connectors governed by ACP classification
1.5 — DLP and Sensitivity Labels DLP enforcement for MCP data flows
1.7 — Comprehensive Audit Logging Audit capture for MCP server invocations
1.9 — Data Retention and Deletion Retention policies for MCP interaction records
1.11 — Conditional Access and MFA Conditional Access for MCP server app registrations
1.19 — eDiscovery for Agent Interactions eDiscovery coverage for MCP interaction records
1.20 — Network Isolation and Private Connectivity VNet/private endpoint for MCP servers
2.3 — Change Management and Release Planning Change governance for MCP server deployments
2.7 — Vendor and Third-Party Risk Third-party MCP server risk assessment
2.17 — Multi-Agent Orchestration Limits Orchestration controls when multiple agents share MCP servers

Verification Checklist

  1. ☐ MCP server inventory documented with data classification for each connected data source
  2. ☐ DLP connector policies classify all MCP custom connectors (Business / Non-Business / Blocked)
  3. ☐ Unapproved MCP connectors blocked by default in Zone 2 and Zone 3 environments
  4. ☐ OAuth 2.0 configured for all Zone 2 and Zone 3 MCP servers
  5. ☐ API keys (if used) stored in Azure Key Vault with expiration and rotation policy
  6. ☐ VNet integration configured for Zone 3 MCP servers accessing regulated data
  7. ☐ Private endpoints configured for internal MCP servers in Zone 3
  8. ☐ Purview audit retention policies applied to MCP interaction records
  9. ☐ Conditional Access policies applied to MCP server app registrations
  10. ☐ Agent sponsor sign-off documented for each MCP server connection
  11. ☐ Data classification assessment completed for all MCP-accessible data sources
  12. ☐ Monitoring and alerting configured for MCP server error rates and unusual access patterns

Additional Resources


FSI Agent Governance Framework v1.4.0 — April 2026