Sponsorship Lifecycle Workflows
Supplemental playbook for Control 1.2 — Agent Registry and Integrated Apps Management. This document specifies the human accountability layer that wraps every Microsoft 365 AI agent: the named sponsors, owners, backup owners, and compliance reviewers who carry regulatory responsibility for the agent across its lifecycle, and the Microsoft Entra ID Governance / Power Platform automation that makes that accountability machine-enforceable.
Companion playbooks (do not duplicate content from these — link to them):
- Portal Walkthrough — registry portal configuration
- PowerShell Setup — registry automation
- Verification Testing — registry test cases
- Troubleshooting — registry common issues
Cross-control dependencies:
- Control 3.1 — Agent Inventory and Metadata Management — authoritative lifecycle state machine
- Control 1.7 — Comprehensive Audit Logging and Compliance — sponsor signature capture and retention
- Control 1.10 — Communication Compliance Monitoring — sponsor approval correspondence supervision
- Control 2.1 implementation playbooks — DSPM for AI alerting that escalates to sponsors
- AI Incident Response Playbook — sponsor on-call obligations during incidents
1. Overview
Human sponsorship is a foundational requirement for Agentic Users in Microsoft Entra ID and a core supervisory expectation under FINRA Rule 3110, OCC Bulletin 2011-12, and Federal Reserve SR 11-7. An AI agent without a named, attested, currently employed sponsor is — for examination purposes — an unsupervised system, and the residual risk of unsupervised automation in a regulated FSI environment is the central concern this playbook addresses.
This playbook provides:
- The four sponsorship roles (Agent Sponsor, Agent Owner, Backup Owner, Compliance Reviewer) with duties, authority boundaries, and escalation paths.
- The lifecycle integration that aligns sponsor approvals with the Control 3.1 state machine (Draft → In Review → Approved → Active → Deprecated → Decommissioned).
- Zone-differentiated sponsorship requirements (Z1 informal, Z2 sponsor + backup mandatory, Z3 dual sponsor + backup + compliance).
- Attestation cadence (quarterly sponsor signature, annual external compliance review) with a working calendar.
- The departed sponsor / owner cascade workflow including manager-hierarchy fallback, AI Governance Lead escalation, and the emergency Decommissioned transition.
- Approval workflow integration unifying Entra admin consent, Entra agent approval, and Power Platform agent approval into a single signature flow.
- The sponsorship evidence pack specifying every artifact captured per attestation, including SHA-256 hash chaining for tamper-evidence.
- Examiner readiness framing mapping each artifact to specific regulations.
Preview features as of April 2026
Microsoft Entra Agent ID, Agentic User accounts, and Power Platform agent approval centers remain in preview or staged GA in many regions. Lifecycle Workflows for Agentic Users have a narrower task catalog than for human users; several integrations in this playbook depend on custom extensions (Logic Apps or Azure Functions) that organizations must deploy. Verify feature availability in your tenant before implementation.
Language and liability
This playbook helps meet — and is required for — supervisory expectations across FINRA, SEC, OCC, Federal Reserve, NYDFS, and FTC Safeguards regimes. It does not by itself constitute compliance. Implementation requires legal, compliance, and risk review tailored to your firm's business activities and regulatory profile. Organizations should verify every assertion against their own examination history.
2. Examiner Readiness Framing
Sponsorship is the artifact examiners look for first when evaluating AI agent governance. Each of the four sponsorship roles in this playbook maps to specific regulatory expectations:
| Regulation | Expectation | How sponsorship supports it |
|---|---|---|
| FINRA Rule 3110 (Supervision) | Written supervisory procedures with named supervisors | Agent Sponsor is the named supervisor of record for the agent's business use; quarterly attestation produces the written evidence |
| FINRA Rule 4511 (Books and Records) | Preservation of supervisory records in non-erasable, non-rewriteable form | Sponsorship evidence pack (Section 12) captures attestation in WORM-eligible form |
| FINRA Notice 25-07 (Generative AI) | Member firms remain responsible for compliance regardless of AI use; supervisory framework must address gen-AI specifically | Sponsor attestation explicitly references gen-AI risk categories (hallucination, inappropriate disclosure, unauthorized advice) |
| SEC Rule 17a-4(b)(4) | Retention of supervisory communications | Sponsor approval correspondence supervised under Control 1.10 and retained 7 years |
| SOX §302/§404 | Officer certification of internal controls; ICFR effectiveness | Compliance Reviewer sign-off feeds quarterly ICFR attestation packages for any Z3 agent touching financial reporting |
| GLBA §501(b) / FTC Safeguards 16 CFR §314.4(c) | Designated qualified individual; access controls; monitoring | Agent Owner is the designated technical custodian; attestation cadence aids continuous monitoring |
| OCC Bulletin 2011-12 (Model Risk Management) | Identified model owner; effective challenge; ongoing monitoring | Agent Owner = model owner of record; Compliance Reviewer performs effective challenge for Z3 agents |
| Federal Reserve SR 11-7 (Model Risk) | Model inventory with accountable parties; lifecycle controls | Sponsorship metadata feeds the Control 3.1 inventory; lifecycle approvals (Section 5) are the documented control points |
| NYDFS Part 500.07 / 500.16 (Access privileges; Incident response) | Documented access governance; defined incident roles | Backup Owner provides 24×7 incident reachability; departure cascade (Section 9) prevents orphaned privileged identity |
| NIST AI RMF GOVERN 1.4 / 1.6 | Roles, responsibilities, and lines of communication for AI risk | Section 3 role definitions are the framework's GOVERN 1.4/1.6 evidence |
What an examiner asks
"Show me the named supervisor for this agent, the date of their most recent attestation, the evidence package supporting that attestation, and what happens if that supervisor leaves the firm." Every section of this playbook helps you answer that question in under five minutes.
3. Sponsorship Role Definitions
The framework defines four sponsorship roles. Every agent — regardless of zone — must have at minimum an Agent Owner. Higher zones layer on Sponsor, Backup Owner, and Compliance Reviewer.
3.1 Agent Sponsor (Business Accountability)
Role summary. The named business executive who is accountable for the agent's existence, business value, and risk acceptance. The Sponsor is the person an examiner, auditor, or board committee will name when asking "who decided this AI agent should operate?"
Required role / seniority.
| Zone | Minimum seniority | Common titles |
|---|---|---|
| Z1 (Personal) | Not required | n/a — Owner-only model |
| Z2 (Team) | Manager (P5/M3 or equivalent) | Line of business manager, Director |
| Z3 (Enterprise) | Director or above; for agents touching financial reporting, customer funds, trading, or fiduciary advice: Managing Director / Executive Officer | LOB Head, Chief Risk Officer designate, Chief Compliance Officer designate |
Duties.
- Authorize the initial business case and risk acceptance for the agent.
- Approve every transition from Draft → In Review → Approved → Active (see Section 5).
- Sign quarterly attestation that the agent (a) remains required, (b) operates within scope, (c) has had no unmitigated incidents.
- Designate the Agent Owner and Backup Owner.
- Acknowledge material configuration changes (scope, data sources, sensitivity labels).
- Authorize Decommissioned transitions.
Authority boundaries.
- MAY approve Active operation of the agent within its registered scope.
- MAY authorize temporary scope changes up to the approved zone ceiling.
- MAY NOT approve zone elevation (Z2 → Z3) without dual sponsor + Compliance Reviewer.
- MAY NOT waive Control 1.7 audit logging or DSPM for AI policies.
- MAY NOT approve an agent for which they are also the Agent Owner (separation of duties for Z2/Z3).
Escalation path. Sponsor unreachable >5 business days → Backup Owner notifies Sponsor's manager → unresolved at 10 business days → AI Governance Lead → unresolved at 15 business days → emergency Decommissioned transition (Section 9.4).
3.2 Agent Owner (Technical Accountability)
Role summary. The named technical custodian responsible for the agent's configuration, monitoring, and day-to-day operation. The Agent Owner is the OCC 2011-12 "model owner" of record.
Required role / seniority.
| Zone | Minimum profile | Required training |
|---|---|---|
| Z1 | The user themselves (self-owned) | Recommended: AI Acceptable Use module |
| Z2 | Identified individual or shared mailbox-backed team alias mapped to ≥2 named technical staff | Required: Copilot Studio Maker fundamentals; Acceptable Use |
| Z3 | Named individual technical lead with backup | Required: Copilot Studio Maker fundamentals; FSI Agent Governance certification; tabletop incident response participation in last 12 months |
Duties.
- Build, configure, and maintain the agent in Microsoft 365 Admin Center, Copilot Studio, Power Platform, or Agent 365.
- Operate the agent within the scope authorized by the Sponsor.
- Triage and respond to alerts from Control 2.1 (DSPM for AI), Control 1.7, and Defender XDR within the Zone SLA.
- Maintain Control 3.1 inventory metadata (data sources, connectors, sensitivity, business owner).
- Execute the technical work authorized by the Sponsor's quarterly attestation (e.g., decommission, scope change).
- Co-sign material configuration changes with the Sponsor.
Authority boundaries.
- MAY make non-material configuration changes (UI/prompt copy, intent expansions within registered topics).
- MAY NOT add new data sources, connectors, or sensitivity-labeled content scopes without Sponsor approval.
- MAY NOT disable logging, audit, DSPM for AI, or Communication Compliance scoping.
- MAY NOT sign their own quarterly attestation — separation from Sponsor required for Z2/Z3.
Escalation path. Agent Owner unreachable >2 business days → Backup Owner assumes operational control automatically (Section 9.1) → if Owner status not resolved within 10 business days, the cascade workflow promotes Backup Owner to Agent Owner and Sponsor must designate a new Backup Owner within 5 additional business days.
3.3 Backup Owner (Continuity)
Role summary. Named secondary technical custodian who provides operational continuity when the Agent Owner is unavailable, departs, or is reassigned. Mandatory for Z2 and Z3.
Required role / seniority. Same profile as Agent Owner; must not report to the Agent Owner (independent reporting line for Z3 to maintain effective challenge per OCC 2011-12).
Duties.
- Maintain operational read access to the agent and its supporting infrastructure at all times.
- Receive duplicate copies of all alerts routed to the Agent Owner.
- Assume Agent Owner authority automatically per the cascade rules in Section 9.
- Participate in at least one tabletop incident exercise per year (Z3 only).
- Acknowledge quarterly attestation (witness signature, not approver).
Authority boundaries.
- MAY execute any action the Agent Owner may execute, but only after activation per Section 9.1.
- MAY NOT make material changes during routine periods (Owner present) without Owner consent.
3.4 Compliance Reviewer (Regulatory Sign-Off)
Role summary. Named compliance officer who provides independent regulatory review for Z3 agents and any agent processing customer non-public personal information (NPPI), MNPI, supervised electronic communications, or material relating to investment advice.
Required role / seniority. Designated officer within the Compliance department holding the Purview Compliance Admin or Purview Compliance Reader Entra role plus written delegated authority from the Chief Compliance Officer.
Duties.
- Sign off on initial Z3 agent risk assessment (In Review → Approved transition).
- Co-sign quarterly Sponsor attestation for Z3 agents.
- Conduct annual external compliance review — independent of Sponsor and Owner — producing a written assessment that feeds the firm's annual 3120 / Reg BI / Advisers Act compliance review.
- Authorize releases that change the agent's regulatory footprint (new data class, new jurisdiction, new customer-facing capability).
- Require Decommissioned transition for any agent that materially deviates from approved scope and cannot be remediated.
Authority boundaries.
- MAY veto any Approved or Active transition for a Z3 agent on regulatory grounds.
- MAY require an immediate move to Decommissioned for Section 9.4 emergency cases.
- MAY NOT also serve as Agent Owner or Sponsor for the same agent.
3.5 Role Separation Matrix
| Role pair | Z1 | Z2 | Z3 |
|---|---|---|---|
| Sponsor = Owner | Allowed (no formal sponsor) | Prohibited | Prohibited |
| Owner = Backup Owner | Allowed (no backup) | Prohibited | Prohibited |
| Sponsor = Compliance Reviewer | n/a | n/a | Prohibited |
| Owner reports to Sponsor | Allowed | Allowed | Allowed |
| Backup Owner reports to Owner | Allowed | Allowed | Prohibited |
| Compliance Reviewer reports to Sponsor | n/a | n/a | Prohibited |
4. Zone-Specific Sponsorship Requirements
This expands the registry-level zone matrix from Control 1.2 with sponsorship-specific rules. All sponsor / owner identities are persisted as Entra ID extension attributes on the Agentic User and mirrored to the Control 3.1 Dataverse inventory.
| Requirement | Zone 1 (Personal) | Zone 2 (Team) | Zone 3 (Enterprise) |
|---|---|---|---|
| Agent Sponsor | Not required (owner self-sponsors) | Required: Manager+ | Required: Director+ (MD/EO for fiduciary scope) |
| Agent Owner | The user (self) | Named individual or 2-person team alias | Named individual + tabletop-trained |
| Backup Owner | Optional | Mandatory | Mandatory (separate reporting line) |
| Compliance Reviewer | Not required | Not required (recommended for regulated functions) | Mandatory |
| Dual Sponsor approval | n/a | n/a | Required for In Review → Approved |
| Maximum agents per Sponsor | n/a | 25 | 10 |
| Maximum agents per Owner | 10 | 5 | 3 |
| Sponsor training | n/a | Recommended: governance overview | Required: FSI Agent Governance certification + annual refresh |
| Owner training | Recommended: AUP module | Required: Maker fundamentals + AUP | Required: certification + tabletop participation |
| Quarterly attestation | Optional self-affirmation | Sponsor signature required | Sponsor + Compliance co-signature required |
| Annual external review | Not required | Spot-check sample (≥10%) | 100% of Z3 agents |
| Activity review cadence | Self-monitor | Monthly summary to Sponsor | Weekly summary; alert-driven escalation |
| Departure grace period | 30 days then auto-suspend | 14 days then auto-suspend | 0 days — immediate Decommissioned transition pending reassignment |
| Approval workflow | Self-approve | Single-stage Sponsor approval | Dual Sponsor + Compliance gate |
Z3 agents touching customer NPPI, MNPI, or fiduciary advice
For Z3 agents whose scope includes customer non-public personal information (GLBA), material non-public information, fiduciary investment advice (Advisers Act / Reg BI), or trading operations, the Sponsor must hold a registered principal designation under FINRA Rule 1220 where applicable. Verify with Compliance before authorizing the In Review → Approved transition.
5. Lifecycle Integration
This section binds sponsorship signatures to the Control 3.1 lifecycle state machine. Each transition has a required signature set, a captured evidence artifact, and a hash-chained audit record (Section 12).
5.1 State Machine Overview
┌────────┐ Owner submits ┌──────────┐ Sponsor + ┌──────────┐
│ Draft │ ───────────────► │In Review │ Compliance ──►│ Approved │
└────────┘ └──────────┘ (Z3) sign └─────┬────┘
│ Sponsor
│ activate
▼
┌──────────────┐ Owner+Sponsor ┌────────────┐ Sponsor ┌────────┐
│Decommissioned│◄──── decommission│ Deprecated │◄─ deprecate│ Active │
└──────────────┘ └────────────┘ └────────┘
▲ │
└────── emergency cascade (Section 9.4) ─────────────────┘
5.2 Required Signatures Per Transition
| Transition | Z1 signatures | Z2 signatures | Z3 signatures | Evidence captured |
|---|---|---|---|---|
→ Draft (creation) |
Owner | Owner | Owner | Initial registration record |
Draft → In Review |
Owner self-submit | Owner submit | Owner submit | Submission timestamp, intended scope |
In Review → Approved |
n/a (Z1 skips) | Sponsor | Sponsor + 2nd Sponsor + Compliance Reviewer | Risk assessment, approval record, dual approval chain |
Approved → Active |
Owner | Owner + Sponsor witness | Owner + Sponsor co-sign | Activation timestamp, configuration baseline hash |
Active → Active (material change) |
Owner | Owner + Sponsor | Owner + Sponsor + Compliance Reviewer | Change record, before/after config diff |
Active → Deprecated |
Owner | Sponsor | Sponsor + Compliance Reviewer | Deprecation rationale, sunset timeline |
Deprecated → Decommissioned |
Owner | Owner + Sponsor | Owner + Sponsor + Compliance Reviewer | Final activity export, identity revocation evidence |
* → Decommissioned (emergency) |
Owner or AI Governance Lead | AI Governance Lead | AI Governance Lead + on-call Compliance | Incident reference, emergency cascade record (Section 9.4) |
5.3 Material Change Definition
A configuration change is material (and therefore requires the signatures in row 5 above) when it does any of:
- Adds a new data source, connector, or knowledge index.
- Changes the agent's sensitivity-label scope.
- Adds an agent action with write-back to a system of record.
- Expands the agent to a new audience security group.
- Crosses a jurisdictional boundary (e.g., adds an EEA or APAC user audience).
- Touches customer NPPI, MNPI, or supervised-communications scope.
Non-material changes (UI copy, prompt refinements within registered topics, minor performance tuning) are owner-only and logged for the next quarterly attestation review.
5.4 Lifecycle Workflow Implementation
The technical Entra Lifecycle Workflows that drive the state transitions appear in Sections 7–9. The state attribute is persisted on the Agentic User as extension_LifecycleState and mirrored to the Control 3.1 Dataverse table agt_AgentInventory.statecode.
6. Attestation Cadence
6.1 Calendar
| Cadence | Activity | Performed by | Evidence |
|---|---|---|---|
| Daily | Automated DSPM for AI alert review | Agent Owner (or Backup) | Alert disposition log |
| Weekly (Z3) | Activity summary review | Agent Owner; Sponsor receives digest | Sponsor digest acknowledgment |
| Monthly (Z2) | Activity summary review | Agent Owner; Sponsor receives digest | Sponsor digest acknowledgment |
| Quarterly | Sponsor attestation (Q1: Apr 15 / Q2: Jul 15 / Q3: Oct 15 / Q4: Jan 15) | Sponsor sign; Owner + Backup Owner co-acknowledge; Compliance Reviewer co-sign for Z3 | Signed attestation artifact (Section 12) |
| Semi-annual | Backup Owner reachability test | AI Governance team | Test result log |
| Annual | External compliance review — Z3 100%, Z2 ≥10% sample | Compliance Reviewer; independent of Sponsor and Owner | Written review report retained 7 years |
| Annual | Sponsor and Owner training refresh | Learning & Development | Completion records |
| Triggered | On material change (Section 5.3) | Sponsor + Compliance (Z3) | Change attestation record |
| Triggered | On Sponsor / Owner / Backup departure | Cascade workflow (Section 9) | Cascade execution record |
6.2 Quarterly Attestation Procedure
The quarterly attestation is the workhorse evidence artifact examiners request first. It must be:
- Initiated automatically by the
FSI-Quarterly-Sponsor-Attestationworkflow (Section 7.2) on the cycle date. - Reviewed by the Sponsor against the auto-generated activity pack (last 90 days of agent activity, alerts, material changes, NPPI exposure summary).
- Signed within 14 calendar days of initiation. Late attestations escalate per Section 9.
- Co-signed by Compliance Reviewer for Z3 within 7 additional days.
- Archived to the WORM-eligible store under Control 1.7 retention rules with SHA-256 chain (Section 12).
6.3 Annual External Review
The annual review is a separate activity from quarterly attestation. The Compliance Reviewer evaluates each Z3 agent against:
- FINRA Notice 25-07 supervisory expectations for gen-AI.
- Reg BI / Advisers Act applicability where the agent influences customer recommendations.
- OCC 2011-12 / SR 11-7 effective challenge: was the model challenged by an independent party in the last 12 months?
- DSPM for AI policy alignment: are policies still calibrated to the agent's data sensitivity?
Output is a written report filed in the firm's compliance review repository, cross-referenced to FINRA Rule 3120 / Advisers Act Rule 206(4)-7 annual review packages where applicable.
7. Prerequisites and Lifecycle Workflow Foundations
7.1 Licensing and Prerequisites
| Requirement | Source |
|---|---|
| Microsoft Entra ID Governance (P2 / Governance SKU) | Required for Lifecycle Workflows and Access Reviews |
| Microsoft Entra Verified ID (optional but recommended for Z3) | Cryptographic sponsor signature (Section 12) |
| Lifecycle Workflows enabled in tenant | Entra admin center → Identity Governance |
| Power Platform admin center with approval centers enabled | Power Platform admin |
| Microsoft Purview Audit (Standard or Premium) | Sponsor approval audit trail |
| Microsoft Sentinel or Defender XDR with custom log table | Long-term sponsor signature retention and KQL query |
| Agent inventory metadata schema (Control 3.1) deployed | agt_AgentInventory Dataverse table with sponsor / owner / backup columns |
| Sponsor eligibility security groups | Created per Section 7.3 |
| AI Governance Lead role designated | Named individual with email + Teams reachability |
Required Entra roles (from role catalog):
- Entra Identity Governance Admin — to create and manage Lifecycle Workflows.
- Entra Agent ID Admin — to manage Agentic User attributes.
- Power Platform Admin — to configure agent approval workflows.
- Purview Compliance Admin — to scope attestation correspondence under Control 1.10.
- AI Administrator — to manage Copilot agent governance settings.
- Entra Privileged Role Admin — to configure PIM-eligible escalation for AI Governance Lead.
7.2 Enable Lifecycle Workflows
Portal path: Microsoft Entra admin center → Identity Governance → Lifecycle Workflows
- Sign in as Entra Identity Governance Admin.
- Navigate to Lifecycle Workflows → Workflow settings.
- Confirm "Email notifications" sender is
lifecycle-noreply@<your-tenant>(or your branded sender). - Set Workflow processing schedule to every 1 hour (default 3 — recommend tighter for FSI).
- Enable Access reviews integration so attestation tasks can chain to access review packages.
Screenshot description: Entra admin center Lifecycle Workflows landing page with three workflows visible (FSI-Quarterly-Sponsor-Attestation, FSI-Sponsor-Departure-Cascade, FSI-Owner-Departure-Cascade), each showing "Enabled" status pill and last run timestamp.
7.3 Create Sponsor and Owner Eligibility Groups
# Create role-based eligibility groups for sponsorship governance
Connect-MgGraph -Scopes "Group.ReadWrite.All","User.Read.All"
$groups = @(
@{ DisplayName = "sg-agent-sponsors-zone2"; Description = "Eligible Z2 sponsors (Manager+)"; MailNickname = "agent-sponsors-z2" },
@{ DisplayName = "sg-agent-sponsors-zone3"; Description = "Eligible Z3 sponsors (Director+)"; MailNickname = "agent-sponsors-z3" },
@{ DisplayName = "sg-agent-owners"; Description = "Trained agent owners (all zones)"; MailNickname = "agent-owners" },
@{ DisplayName = "sg-agent-backup-owners"; Description = "Trained backup owners (all zones)"; MailNickname = "agent-backup-owners" },
@{ DisplayName = "sg-compliance-reviewers"; Description = "Designated compliance reviewers (Z3)"; MailNickname = "agent-compliance-reviewers" },
@{ DisplayName = "sg-ai-governance-leads"; Description = "AI Governance Lead escalation group"; MailNickname = "ai-governance-leads" }
)
foreach ($g in $groups) {
New-MgGroup -DisplayName $g.DisplayName `
-Description $g.Description `
-MailNickname $g.MailNickname `
-MailEnabled:$false `
-SecurityEnabled:$true | Out-Null
Write-Host "Created $($g.DisplayName)"
}
Membership of sg-agent-sponsors-zone3 and sg-compliance-reviewers should be governed by Entra Identity Governance access reviews on a quarterly cadence. See Microsoft Learn — Access reviews.
8. Periodic Attestation Workflows
8.1 Zone 2 Quarterly Sponsor Attestation Workflow
Portal path: Lifecycle Workflows → + New workflow → Custom workflow.
| Setting | Value |
|---|---|
| Name | FSI-Z2-Quarterly-Sponsor-Attestation |
| Description | Quarterly Sponsor signature for Z2 agents (90-day cadence) |
| Category | Custom |
| Trigger | Time-based, every 90 days from extension_LastAttestationDate |
| Scope | (user.userType eq 'AgenticUser') and (user.extension_GovernanceZone eq 'Zone2') |
Tasks (in order):
| # | Task | Configuration summary |
|---|---|---|
| 1 | Generate activity pack | Custom extension → Logic App posts last 90 days summary to SharePoint |
| 2 | Send email to Sponsor | Subject: ACTION REQUIRED: Quarterly attestation — {{displayName}} |
| 3 | Send email to Owner + Backup Owner | Co-signature notification |
| 4 | Request approval (Sponsor) | Single-stage; 14-day deadline; escalate to Sponsor's manager at day 10 |
| 5 | Update extension_LastAttestationDate |
On approval |
| 6 | Capture signature artifact | Custom extension → write to evidence pack (Section 12) |
| 7 | On rejection / non-response | Trigger cascade — see Section 9 |
# Create the Z2 quarterly attestation workflow
$z2Workflow = @{
displayName = "FSI-Z2-Quarterly-Sponsor-Attestation"
description = "Quarterly Sponsor attestation for Zone 2 agents"
isEnabled = $true
isSchedulingEnabled = $true
category = "custom"
executionConditions = @{
"@odata.type" = "#microsoft.graph.identityGovernance.triggerAndScopeBasedConditions"
scope = @{
"@odata.type" = "#microsoft.graph.identityGovernance.ruleBasedSubjectSet"
rule = "(user.userType eq 'AgenticUser') and (user.extension_GovernanceZone eq 'Zone2')"
}
trigger = @{
"@odata.type" = "#microsoft.graph.identityGovernance.timeBasedAttributeTrigger"
timeBasedAttribute = "extension_LastAttestationDate"
offsetInDays = 90
}
}
tasks = @(
@{ taskDefinitionId = "<generate-activity-pack-extension>"; displayName = "Generate activity pack" },
@{ taskDefinitionId = "aab41899-9972-422a-9a53-f4bb8b36b8ae"; displayName = "Notify Sponsor"; arguments = @(
@{ name = "emailSubject"; value = "ACTION REQUIRED: Quarterly attestation — {{displayName}}" }
@{ name = "emailRecipients"; value = "{{manager}}" }) },
@{ taskDefinitionId = "22085229-5809-45e8-97fd-270d28d66910"; displayName = "Request Sponsor attestation"; arguments = @(
@{ name = "approvers"; value = "{{manager}}" }
@{ name = "escalationRecipients"; value = "sg-ai-governance-leads" }
@{ name = "escalationAfterDays"; value = "10" }) },
@{ taskDefinitionId = "<update-attestation-date-extension>"; displayName = "Update last attestation date" },
@{ taskDefinitionId = "<capture-signature-extension>"; displayName = "Capture signature artifact" }
)
}
New-MgIdentityGovernanceLifecycleWorkflow -BodyParameter $z2Workflow
8.2 Zone 3 Quarterly Attestation with Dual Sign-Off
The Z3 workflow extends Z2 with:
- A second-stage approval task targeting the Compliance Reviewer (
sg-compliance-reviewers) after Sponsor approval. - Tighter escalation (7-day Sponsor SLA, 7-day Compliance SLA).
- Auto-trigger of Section 9.4 emergency cascade if either stage rejects or both stages lapse 7 days past escalation.
# Z3 dual-stage attestation tasks (replaces tasks 4-5 in Section 8.1)
$z3DualStage = @(
@{ taskDefinitionId = "22085229-5809-45e8-97fd-270d28d66910"
displayName = "Stage 1 — Sponsor attestation"
arguments = @(
@{ name = "approvers"; value = "{{manager}}" }
@{ name = "escalationRecipients"; value = "sg-ai-governance-leads" }
@{ name = "escalationAfterDays"; value = "7" }
) },
@{ taskDefinitionId = "22085229-5809-45e8-97fd-270d28d66910"
displayName = "Stage 2 — Compliance Reviewer co-sign"
arguments = @(
@{ name = "approvers"; value = "sg-compliance-reviewers" }
@{ name = "escalationRecipients"; value = "sg-ai-governance-leads" }
@{ name = "escalationAfterDays"; value = "7" }
) }
)
8.3 Backup Owner Reachability Test (Semi-Annual)
Workflow FSI-Backup-Owner-Reachability runs every 180 days. It sends a low-friction confirmation request to every Backup Owner of record. Non-response triggers a Sponsor notification and a 14-day window to designate a replacement Backup Owner before the agent moves to Deprecated.
9. Departed Sponsor / Owner Cascade Workflow
This is the highest-impact workflow in the playbook. A departed Sponsor or Owner without cascade handling produces an orphaned privileged identity — exactly the condition NYDFS Part 500.07 and FINRA Rule 3110 examiners look for.
9.1 Decision Tree
Sponsor / Owner / Backup
departure event detected
│
┌───────────────┴────────────────┐
│ │
Owner departed Sponsor departed
│ │
Backup Owner exists? Backup Owner exists?
├─ Yes ──► Promote Backup; ├─ Yes ──► Notify Backup;
│ Sponsor names new │ escalate to
│ Backup in 5 BD │ Sponsor's manager
│ │
└─ No ──► AI Governance Lead └─ No ──► AI Governance Lead
takes operational assumes Sponsor on
custody; Z grace period interim; Compliance
begins (Z1=30 / Z2=14 notified; Z grace
/ Z3=0 days) period begins
│
Reassignment within
grace period?
├─ Yes ──► Update inventory; new attestation cycle
└─ No ──► Emergency Decommissioned (Section 9.4)
9.2 Owner Departure Workflow
$ownerDeparture = @{
displayName = "FSI-Owner-Departure-Cascade"
description = "Cascade reassignment when an Agent Owner departs"
isEnabled = $true
category = "leaver"
executionConditions = @{
"@odata.type" = "#microsoft.graph.identityGovernance.triggerAndScopeBasedConditions"
scope = @{
"@odata.type" = "#microsoft.graph.identityGovernance.ruleBasedSubjectSet"
rule = "(user.memberOf any (group.displayName eq 'sg-agent-owners'))"
}
trigger = @{
"@odata.type" = "#microsoft.graph.identityGovernance.groupBasedTrigger"
triggerAttribute = "accountEnabled"
changeType = "delete"
}
}
tasks = @(
@{ taskDefinitionId = "<find-owned-agents-extension>"; displayName = "Find owned agents" },
@{ taskDefinitionId = "<promote-backup-owner-extension>"; displayName = "Promote Backup Owner to Owner" },
@{ taskDefinitionId = "aab41899-9972-422a-9a53-f4bb8b36b8ae"; displayName = "Notify Sponsor — designate new Backup within 5 BD" },
@{ taskDefinitionId = "<start-reassignment-timer-extension>"; displayName = "Start reassignment timer (per zone)" }
)
}
9.3 Sponsor Departure Workflow
The Sponsor departure workflow follows the same pattern as 9.2 but the cascade promotes the Sponsor's manager (resolved via Entra manager attribute) to interim Sponsor and notifies the AI Governance Lead. For Z3 agents, the workflow simultaneously notifies the Compliance Reviewer and opens a FSI-Z3-Sponsor-Vacant access review against the agent. Cascade completes only when:
- A new Sponsor is named and accepts (recorded as approval artifact).
- The new Sponsor signs an out-of-cycle attestation within the grace period.
- The agent's
extension_SponsorIdis updated and audit log entry written.
$sponsorDeparture = @{
displayName = "FSI-Sponsor-Departure-Cascade"
description = "Cascade Sponsor reassignment with manager-hierarchy fallback"
isEnabled = $true
category = "leaver"
tasks = @(
@{ taskDefinitionId = "<find-sponsored-agents-extension>"; displayName = "Find sponsored agents" },
@{ taskDefinitionId = "<resolve-manager-extension>"; displayName = "Resolve departing Sponsor's manager" },
@{ taskDefinitionId = "<notify-interim-sponsor-extension>"; displayName = "Notify interim Sponsor + AI Governance Lead" },
@{ taskDefinitionId = "<open-z3-access-review-extension>"; displayName = "Open Z3 vacant-Sponsor access review (Z3 only)" },
@{ taskDefinitionId = "<start-zone-grace-timer-extension>"; displayName = "Start zone-specific grace timer" }
)
}
9.4 Emergency Decommissioned Transition
Triggered when:
- Grace period expires without a successor Sponsor or Owner.
- Compliance Reviewer issues a regulatory veto.
- AI Governance Lead determines the agent represents an unmitigated risk.
- DSPM for AI (Control 2.1) raises a Severity 1 alert for which no Owner can be reached.
Behavior. The workflow:
- Sets
extension_LifecycleState = "Decommissioned"on the Agentic User. - Disables the Agentic User account (
accountEnabled = false). - Removes group memberships that grant data access.
- Removes the agent from active Copilot Studio / Power Platform / Agent 365 environments (preserves the artifact for forensic review per Control 1.7).
- Files an emergency-cascade record with the AI Incident Response Playbook intake queue.
- Notifies AI Governance Lead, on-call Compliance, Sponsor's chain of command, and Security Operations.
$emergencyDecom = @{
displayName = "FSI-Emergency-Decommission"
description = "Emergency Decommissioned transition for unrecoverable cases"
isEnabled = $true
category = "custom"
tasks = @(
@{ taskDefinitionId = "<set-state-decommissioned-extension>"; displayName = "Set lifecycle state to Decommissioned" },
@{ taskDefinitionId = "1dfdfcc7-52fa-4c2e-bf3a-e3919cc12950"; displayName = "Disable Agentic User account" },
@{ taskDefinitionId = "<remove-data-access-groups-extension>"; displayName = "Remove data-access group memberships" },
@{ taskDefinitionId = "<file-incident-record-extension>"; displayName = "File emergency cascade record" },
@{ taskDefinitionId = "aab41899-9972-422a-9a53-f4bb8b36b8ae"; displayName = "Notify AI Governance Lead + Compliance + SecOps" }
)
}
Emergency cascade is reversible only via re-onboarding
Once an agent is in Decommissioned state, restoration requires returning it to Draft and walking the full lifecycle again, including a new In Review → Approved gate with fresh signatures. This is intentional and supports the supervisory expectation that an agent without a current responsible party cannot resume operation without renewed risk acceptance.
9.5 Manager Hierarchy Fallback
The cascade resolves successor identities via Entra manager chain with these rules:
| Scenario | Successor resolution |
|---|---|
Sponsor departed; manager is also a member of sg-agent-sponsors-zone2/3 |
Manager becomes interim Sponsor |
| Sponsor departed; manager is not sponsor-eligible | Walk up to first eligible manager; cap at 3 hops |
| 3 hops with no eligible successor | AI Governance Lead becomes interim Sponsor; opens 14-day designation window |
| Owner departed; Backup Owner is active and reachable | Backup auto-promotes |
| Owner departed; Backup unreachable for 48h | AI Governance Lead assumes operational custody; emergency cascade timer starts |
10. Approval Workflow Integration
This section unifies three otherwise-disjoint Microsoft approval surfaces into a single Sponsor signature flow with one audit trail.
10.1 The Three Approval Surfaces
| Surface | What it gates | Native admin |
|---|---|---|
| Entra Admin Consent Workflow | App registration permission grants consumed by an agent's connected app | Entra App Admin / Global Admin |
| Entra Agent Approval Workflow (Agentic User governance) | Creation, scope changes, decommission of an Agentic User | Entra Agent ID Admin |
| Power Platform Agent Approval (Copilot Studio / Power Apps) | Publishing, sharing, or environment-promoting Copilot Studio agents | Power Platform Admin / Environment Admin |
By default these emit independent approval requests with independent audit trails. The unified flow funnels all three to a single approval record signed by the Sponsor.
10.2 Unified Flow Architecture
┌────────────────────────────────────────────────────────────┐
│ Trigger source (any of): │
│ • Entra admin consent request raised │
│ • Agentic User scope change requested │
│ • Copilot Studio publish requested │
└───────────────┬────────────────────────────────────────────┘
│
▼
┌────────────────────────────────────────────────────────────┐
│ Power Automate orchestration flow │
│ • Resolves agent ID │
│ • Reads Sponsor + Compliance from Control 3.1 inventory │
│ • Builds unified approval card │
│ • Sends single Approvals action via Teams / Outlook │
└───────────────┬────────────────────────────────────────────┘
│
▼
┌────────────────────────────────────────────────────────────┐
│ Sponsor approves once → │
│ • Approves the originating Entra / Agent / PP request │
│ • Writes signature artifact to evidence pack │
│ • Updates Control 3.1 inventory │
│ • Notifies Owner + Backup + (Z3) Compliance Reviewer │
└────────────────────────────────────────────────────────────┘
10.3 Implementation Outline
- Power Automate cloud flow
flow-fsi-unified-agent-approvaltriggers on:- Microsoft Graph subscription to
directory/auditLogsforConsentToApplicationevents scoped to the agent app pattern. - Dataverse trigger on
agt_AgentApprovalRequesttable. - Power Platform Connector Approval Center webhook.
- Microsoft Graph subscription to
- The flow looks up the agent in
agt_AgentInventory(Control 3.1) to resolve current Sponsor, Backup Owner, and Compliance Reviewer. - The flow posts a single Adaptive Card to the Sponsor with all change details and a single Approve/Reject action.
- On Sponsor approval, the flow writes back to:
- The Entra admin consent request (via Microsoft Graph
appConsentRequestsAPI). - The Agent ID change request (via Microsoft Graph identity governance API).
- The Power Platform request (via Power Platform admin API).
- The signature artifact store (Section 12).
- The Entra admin consent request (via Microsoft Graph
- For Z3, the same flow chains a second Adaptive Card to the Compliance Reviewer.
Why unify
Examiners ask "show me the supervisor's approval" — singular. A unified flow lets you produce one signed artifact per change rather than three correlated artifacts. This matches the FINRA Rule 3110 expectation that supervision is a documented decision, not a series of disjoint clicks.
10.4 Configuration Reference
Detailed Power Automate flow JSON, Adaptive Card schema, and Microsoft Graph API call examples live in PowerShell Setup. This playbook owns the policy, signatures, and evidence semantics; the technical scaffolding lives in the peer playbooks.
11. Sponsorship Evidence Pack
Every attestation, every cascade execution, and every emergency decommission produces a sponsorship evidence pack. Examiners and internal audit consume these packs directly; the format is therefore deliberately rigid.
11.1 Pack Contents
| Artifact | Format | Source | Required for |
|---|---|---|---|
| Attestation request record | JSON | Lifecycle Workflows audit | All quarterly attestations |
| Sponsor signature | JWS or Entra Verified ID VC (Z3) | Approval action | All quarterly attestations |
| Compliance Reviewer co-signature (Z3) | JWS or Verified ID VC | Approval action | Z3 attestations and material changes |
| Activity pack snapshot | PDF + raw JSON | Generated by Section 8.1 task 1 | All quarterly attestations |
| DSPM alert summary (last 90d) | CSV | DSPM for AI export | Z2 + Z3 attestations |
| Communication Compliance disposition (last 90d) | CSV | Control 1.10 export | Z3 attestations and any agent under supervised-comms scope |
| Material change log (last 90d) | CSV | Control 3.1 inventory diff | All attestations |
| Approval timestamp chain | JSON | Lifecycle Workflows + Power Automate | All attestations |
| Audit trail correlation IDs | JSON | Purview Audit + Sentinel custom table | All attestations |
| SHA-256 hash of pack contents | Text file pack.sha256 |
Computed at pack close | All attestations |
| SHA-256 of previous pack (chain) | Text file previous.sha256 |
Read from previous pack | All attestations after the first |
11.2 Hash Chaining for Tamper Evidence
Each pack contains the SHA-256 of the prior pack for the same agent, producing a per-agent hash chain that supports SEC 17a-4(f) WORM-equivalent verification:
# Generate sponsorship evidence pack with hash chain
function New-SponsorshipEvidencePack {
param(
[Parameter(Mandatory)] [string] $AgentId,
[Parameter(Mandatory)] [string] $AttestationCycle, # e.g. "2026-Q2"
[Parameter(Mandatory)] [string] $PackOutputPath
)
$packDir = Join-Path $PackOutputPath "$AgentId-$AttestationCycle"
New-Item -ItemType Directory -Path $packDir -Force | Out-Null
# 1. Collect artifacts (placeholder calls — implementations live in powershell-setup.md)
Export-AttestationRecord -AgentId $AgentId -Cycle $AttestationCycle -OutFile (Join-Path $packDir "attestation.json")
Export-SponsorSignature -AgentId $AgentId -Cycle $AttestationCycle -OutFile (Join-Path $packDir "sponsor-signature.jws")
Export-ActivityPack -AgentId $AgentId -DaysBack 90 -OutFile (Join-Path $packDir "activity-pack.pdf")
Export-DspmAlertSummary -AgentId $AgentId -DaysBack 90 -OutFile (Join-Path $packDir "dspm-alerts.csv")
Export-MaterialChangeLog -AgentId $AgentId -DaysBack 90 -OutFile (Join-Path $packDir "material-changes.csv")
Export-ApprovalTimestampChain -AgentId $AgentId -Cycle $AttestationCycle -OutFile (Join-Path $packDir "timestamps.json")
# 2. Read previous pack hash if present
$prevHashFile = Get-PreviousPackHash -AgentId $AgentId
if ($prevHashFile) {
Copy-Item $prevHashFile -Destination (Join-Path $packDir "previous.sha256")
}
# 3. Compute pack hash over sorted file list
$files = Get-ChildItem $packDir -File | Sort-Object Name
$sha256 = [System.Security.Cryptography.SHA256]::Create()
$stream = New-Object System.IO.MemoryStream
foreach ($f in $files) {
$bytes = [System.IO.File]::ReadAllBytes($f.FullName)
$stream.Write($bytes, 0, $bytes.Length)
}
$stream.Position = 0
$hash = [BitConverter]::ToString($sha256.ComputeHash($stream)).Replace("-","").ToLower()
Set-Content -Path (Join-Path $packDir "pack.sha256") -Value $hash
# 4. Write to WORM-eligible store (Purview Records Management with retention label)
Publish-EvidencePackToWorm -PackPath $packDir -RetentionLabel "FSI-Agent-Sponsorship-7yr"
return $hash
}
11.3 Cryptographic Sponsor Signatures (Recommended for Z3)
For Z3 agents, the framework recommends Microsoft Entra Verified ID-issued AgentSponsorAttestation verifiable credentials rather than plain audit-log entries. The Verified ID issuance flow:
- The Sponsor authenticates with Entra ID using a phishing-resistant method (FIDO2 or Windows Hello for Business).
- The Verified ID issuer (configured under your tenant) issues a credential containing:
agentId,cycleId,sponsorObjectId,attestationStatement,issuedAt,expiresAt = issuedAt + 100 days. - The credential is captured into the evidence pack as
sponsor-signature.jws. - Verification at examination time uses the Entra Verified ID verifier API or the open
did:webresolver — the artifact does not require Microsoft to be reachable to validate.
See Microsoft Learn — Entra Verified ID and the framework's identity architecture.
11.4 Retention
| Artifact | Retention | Authority |
|---|---|---|
| Z1 attestations | 3 years | Internal policy |
| Z2 attestations | 7 years | FINRA Rule 4511, SEC 17a-4(b)(4) |
| Z3 attestations | 7 years | FINRA Rule 4511, SEC 17a-4(b)(4); 10 years recommended for SOX-scoped agents |
| Annual external review reports | 7 years | FINRA Rule 3120; Advisers Act Rule 204-2 |
| Cascade execution records | 7 years | NYDFS Part 500.06 |
| Emergency Decommissioned records | 10 years | Internal policy aligned with longest applicable retention |
Retention is implemented via Purview Records Management labels published under Control 1.7.
12. Verification, Reporting, and KQL
12.1 Quarterly Compliance Report
function Get-SponsorshipAttestationReport {
[CmdletBinding()]
param(
[int] $DaysBack = 95,
[ValidateSet("Zone1","Zone2","Zone3","All")] [string] $Zone = "All"
)
$filter = "userType eq 'AgenticUser'"
if ($Zone -ne "All") { $filter += " and extension_GovernanceZone eq '$Zone'" }
$agents = Get-MgUser -Filter $filter -All -ConsistencyLevel eventual -CountVariable c
foreach ($a in $agents) {
$ext = (Get-MgUser -UserId $a.Id -Property "extension_LastAttestationDate,extension_SponsorId,extension_BackupOwnerId,extension_ComplianceReviewerId,extension_GovernanceZone,extension_LifecycleState").AdditionalProperties
$required = switch ($ext.extension_GovernanceZone) {
"Zone3" { 90 }
"Zone2" { 90 }
default { 365 }
}
$lastAttest = if ($ext.extension_LastAttestationDate) { [datetime]$ext.extension_LastAttestationDate } else { [datetime]"1900-01-01" }
$daysSince = ((Get-Date) - $lastAttest).Days
[pscustomobject]@{
AgentId = $a.Id
AgentName = $a.DisplayName
Zone = $ext.extension_GovernanceZone
LifecycleState = $ext.extension_LifecycleState
SponsorId = $ext.extension_SponsorId
BackupOwnerId = $ext.extension_BackupOwnerId
ComplianceReviewer = $ext.extension_ComplianceReviewerId
LastAttestation = $lastAttest
DaysSinceAttest = $daysSince
RequiredCadenceDays = $required
Overdue = ($daysSince -gt $required)
HasBackup = [bool]$ext.extension_BackupOwnerId
Z3CompletelyStaffed = ($ext.extension_GovernanceZone -ne "Zone3") -or ($ext.extension_SponsorId -and $ext.extension_BackupOwnerId -and $ext.extension_ComplianceReviewerId)
}
}
}
# Examiner-ready dashboard CSV
Get-SponsorshipAttestationReport |
Sort-Object Overdue, Zone -Descending |
Export-Csv "SponsorshipReport-$(Get-Date -Format yyyy-MM-dd).csv" -NoTypeInformation
12.2 KQL — Attestation Audit Trail
// Sponsor + Compliance attestation events for the current quarter
AuditLogs
| where TimeGenerated > startofday(ago(120d))
| where Category == "LifecycleWorkflows"
| where OperationName has_any ("FSI-Z2-Quarterly-Sponsor-Attestation",
"FSI-Z3-Quarterly-Sponsor-Attestation",
"FSI-Sponsor-Departure-Cascade",
"FSI-Owner-Departure-Cascade",
"FSI-Emergency-Decommission")
| extend agentId = tostring(TargetResources[0].id),
agentName = tostring(TargetResources[0].displayName),
actorId = tostring(InitiatedBy.user.id),
actorUpn = tostring(InitiatedBy.user.userPrincipalName),
outcome = tostring(Result),
workflowId = tostring(AdditionalDetails[0].value)
| project TimeGenerated, OperationName, agentId, agentName, actorUpn, outcome, workflowId, CorrelationId
| order by TimeGenerated desc
12.3 KQL — Overdue Attestations Alert
// Agents whose last attestation is past the zone cadence by >7 days
let now = now();
AgentInventory_CL // Control 3.1 mirrored table
| where LifecycleState_s == "Active"
| extend cadenceDays = case(GovernanceZone_s == "Zone3", 90,
GovernanceZone_s == "Zone2", 90,
365)
| extend daysSince = datetime_diff('day', now, todatetime(LastAttestationDate_t))
| where daysSince > cadenceDays + 7
| project AgentId_g, AgentName_s, GovernanceZone_s, SponsorUpn_s, LastAttestationDate_t, daysSince, cadenceDays
| order by daysSince desc
This KQL feeds a Sentinel scheduled analytics rule that creates an incident routed to AI Governance Lead and the agent's Sponsor.
12.4 Verification Checklist
- Each Active agent has a populated
extension_SponsorId(Z2/Z3) andextension_BackupOwnerId(Z2/Z3). - Each Z3 Active agent has a populated
extension_ComplianceReviewerId. extension_LastAttestationDateis within cadence + 14-day grace.- Lifecycle Workflows
FSI-Quarterly-Sponsor-Attestation,FSI-Sponsor-Departure-Cascade,FSI-Owner-Departure-Cascade,FSI-Emergency-Decommission,FSI-Backup-Owner-Reachabilityexist and reportIsEnabled = true. - Last 90 days contain at least one successful workflow run per Active Z2/Z3 agent.
- Sponsorship evidence pack count = expected count (per cycle × per agent).
- SHA-256 chain validates end-to-end for sampled agents.
- No agent in Active state has an Owner whose Entra account is disabled.
- No agent in Active state has a Sponsor whose Entra account is disabled.
- Annual Compliance Reviewer report exists for each Z3 Active agent.
Detailed test cases live in Verification Testing.
13. Troubleshooting
| Symptom | Likely cause | Resolution |
|---|---|---|
Workflow shows IsEnabled = true but never runs |
Scope filter does not match any user | Verify extension_GovernanceZone and userType populated on Agentic Users |
| Sponsor not receiving email | Sponsor's mailbox routes via on-prem; Lifecycle email sender blocked | Allow-list lifecycle-noreply@<tenant> in Exchange Online transport rules (Exchange Online Admin) |
| Approval action received but signature artifact missing | Custom extension Logic App returned non-200 | Inspect Logic App run history; verify managed identity has Group.Read.All and User.Read.All |
| Cascade promoted Backup Owner but inventory not updated | Dataverse write-back step lacks Power Platform connection auth | Refresh service principal credentials in flow-fsi-unified-agent-approval |
| Z3 attestation stuck at Compliance stage | Compliance Reviewer group is empty or members lack Purview Compliance Admin role | Populate sg-compliance-reviewers; verify role assignments |
| Emergency Decommission did not disable account | User.ReadWrite.All consent missing on workflow service principal |
Re-consent via admin consent workflow |
| Hash chain breaks at cycle N | Pack N–1 missing or modified after publication | Investigate Records Management retention label drift; restore from immutable archive |
| Manager-hierarchy fallback walks past 3 hops | No Sponsor-eligible manager in chain (rare in flat orgs) | AI Governance Lead assumes interim Sponsor automatically — confirm escalation alert delivered |
| Sponsor departure not detected | Trigger fires on group membership delete; user's accountEnabled may flip first | Add secondary trigger on user.accountEnabled change to false |
| Workflow run history shows ContinueOnError swallowing failures | Default false but may have been changed | Audit each task's ContinueOnError; for sponsorship workflows, all signature tasks must be false |
Refer to Troubleshooting for registry-level issues and the AI Incident Response Playbook for cascade-driven incident response.
14. Related Resources
Framework and controls
- Control 1.2 — Agent Registry and Integrated Apps Management
- Control 3.1 — Agent Inventory and Metadata Management
- Control 1.7 — Comprehensive Audit Logging and Compliance
- Control 1.10 — Communication Compliance Monitoring
- Control 2.1 implementation playbooks
- Agent Identity Architecture
- AI Incident Response Playbook
Peer playbooks (Control 1.2)
Microsoft Learn (verified April 2026)
- Microsoft Entra Identity Governance — Lifecycle Workflows overview
- Microsoft Entra Identity Governance — Access reviews
- Microsoft Entra ID Governance — Custom workflow tasks
- Microsoft Entra Verified ID — Overview
- Microsoft Entra Agent ID — Overview (preview)
- Power Platform — Approval centers and connector consent
- Microsoft Purview — Records Management and retention labels
- Microsoft Purview — Audit (Standard and Premium)
- Microsoft Sentinel — Custom log tables and analytics rules
Regulatory references
- FINRA Rule 3110 — Supervision
- FINRA Rule 3120 — Supervisory control system
- FINRA Rule 4511 — General requirements for books and records
- FINRA Notice 25-07 — Generative AI member firm responsibilities
- SEC Rule 17a-4(b)(4) and 17a-4(f) — Records preservation
- SOX §302 / §404 — Officer certification and ICFR
- GLBA §501(b) and FTC Safeguards 16 CFR §314.4(c) — Information security program
- NYDFS 23 NYCRR Part 500.07 (access privileges) and 500.16 (incident response)
- OCC Bulletin 2011-12 — Sound practices for model risk management
- Federal Reserve SR 11-7 — Guidance on model risk management
- NIST AI Risk Management Framework — GOVERN 1.4 and GOVERN 1.6
Back to Control 1.2 · Portal Walkthrough · PowerShell Setup · Verification Testing · Troubleshooting
Updated: April 2026 | Version: v1.4.0 | Maintained by: AI Governance Team