Skip to content

Template: Agent Inventory & Registration Entry (AIR)

Purpose: Standardize the metadata captured for every agent so governance controls (zones, approvals, logging, data policy, escalation, vendor risk) can be applied consistently.
Applies to: All zones (Zone 1–3).
Microsoft grounding: Microsoft 365 admins can manage Copilot agents (deploy/assign/block/remove) through the Microsoft 365 admin center, treating agents as manageable assets at tenant scope.
Audit grounding: Microsoft Purview audit logs for Copilot/AI interactions include details like accessed resources (including sensitivity label IDs) and policy restriction details, which can be correlated back to an agent inventory.
Related controls (examples): 3.1 Agent Inventory and Registration, 2.3 Change management, 2.12 Supervision/oversight, 1.7 Audit logging.


1) Identity

  • Agent name:
  • Agent ID (unique):
  • Agent type: (M365 Copilot agent / Copilot Studio agent / other)
  • Tenant/environment: (Prod / Test / Sandbox)
  • Primary surfaces: (Teams / Outlook / Word / M365 Copilot chat / other)
  • Owner (business):
  • Owner (technical):
  • Backup owner:
  • Approver (Compliance/Risk):
  • Status: (Draft / Pilot / Production / Retired)
  • Go-live date:
  • Last modified date:
  • Change record / PR / ticket link:

2) Zone + governance level assignment

  • Zone: Zone 1 / Zone 2 / Zone 3
  • Governance level: Baseline / Recommended / Regulated
  • Justification (one paragraph):
  • Data sensitivity:
  • Autonomy/actionability:
  • Blast radius:
  • Customer/consequential impact:

3) Use case and constraints

  • Business use case:
  • User population: (groups/roles)
  • In-scope tasks: (bullets)
  • Out-of-scope tasks: (bullets)
  • Customer-facing? (Yes/No)
  • Consequence-bearing decision? (Yes/No; if yes, describe)

4) Data access profile (high-level)

Link to the agent’s detailed Per-Agent Data Handling Policy.

  • Per-agent data policy link: per-agent-data-policy.md
  • Allowed sensitivity labels: (bullets)
  • Prohibited sensitivity labels: (bullets)
  • Primary repositories: (SharePoint sites, Dataverse envs, etc.)

5) Actions, tools, and connectors

“Actions” should be constrained via an Action Authorization Matrix (AAM) for any agent that can initiate workflows or modify records.

  • Action Authorization Matrix link: ../governance-operations/action-authorization-matrix.md
  • Allowed connectors/tools: (bullets)
  • Denied connectors/tools: (bullets)
  • Key permissions/RBAC groups: (bullets)

6) Logging + evidence

Purview audit logs for Copilot/AI interactions can include AccessedResources and sensitivity label IDs, and PolicyDetails when access is blocked/restricted, supporting evidence of data protection and policy enforcement.

  • Audit logging enabled? (Yes/No)
  • Audit search query saved? (link or description)
  • Decision log schema used? (Yes/No; link)
  • Retention tag for logs: (e.g., 7 years)

7) Escalation + incident response

  • Escalation matrix link: ../governance-operations/escalation-matrix.md
  • On-call route: (Teams channel / DL)
  • SLA: (e.g., 15 min for S1)

  • Model/agent risk assessment: (link)
  • Bias/fairness testing (if applicable): (link)
  • Threat model / security review: (link)
  • Vendor/supply chain register entry: (link)
  • BC/DR assessment: (link)

9) Compliance mapping

  • Primary regulatory lenses: (FINRA / SEC / GLBA / SOX / OCC / SR 11-7, etc.)
  • Records obligations: (what retention/regulatory recordkeeping applies)
  • Disclosures/communications constraints: (if customer-facing)

10) Approvals

  • Business owner approval: (name/date)
  • Compliance approval: (name/date)
  • Security approval: (name/date)
  • Go-live authorization: (name/date)

11) Review cadence

  • Zone 1: (recommended: semiannual)
  • Zone 2: (recommended: quarterly)
  • Zone 3: (recommended: quarterly + post-change review)

12) Notes

Free-form notes for anything unusual (exception approvals, known limitations, roadmap).