Verification & Testing: Control 1.22 — Information Barriers for AI Agents
Last Updated: April 2026 Audience: M365 administrators, Compliance Officers, internal-audit and SOC analysts validating Control 1.22
Verification Strategy
Control 1.22 is verified through three concurrent test tracks. Each track produces evidence retained 6+ years to align with SEC 17a-4(b), FINRA 4511(b), and CFTC 1.31:
- Configuration verification — that segments, policies, modes, and SharePoint site segments match the design.
- Behavioral verification — that AI agent surfaces (M365 Copilot, declarative agents, Copilot Studio per-user agents, Channel Agents) actually trim cross-segment retrieval.
- Operational verification — that wall-crossing, monitoring, and exception workflows function as documented and produce records.
Track 1 — Configuration Verification
Test 1.1 — IB Mode
- Connect Compliance PowerShell (
Connect-IPPSSession). - Run
Get-InformationBarrierMode. - Expected:
MultiSegment(recommended for FSI).SingleSegmentis acceptable in narrow scenarios.Legacyis a remediation finding.
Test 1.2 — Segment Inventory
- Run
Get-OrganizationSegment | Select-Object Name, UserGroupFilter, Type. - Expected: Every segment in the design matrix is present, with the agreed user-attribute filter, sourced from HR-of-record attributes.
Test 1.3 — Active Policies and Allow-List Matrix
- Run
Get-InformationBarrierPolicy | Where-Object State -eq 'Active' | Select-Object Name, AssignedSegment, SegmentsAllowed, SegmentsBlocked. - Expected: The active set matches the approved allow-list (Multi-Segment) or block-list (Single-Segment). Each segment appears as
AssignedSegmentfor exactly one policy.
Test 1.4 — Last Application Status
- Run
Get-InformationBarrierPoliciesApplicationStatus | Sort-Object StartTime -Descending | Select-Object -First 1. - Expected:
Status = Completed,EndTimewithin the last attestation period (default: 30 days).
Test 1.5 — Segment Coverage
- Run the
Export-IBSegmentCoveragescript from the PowerShell Setup playbook. - Expected: Coverage ≥99.5% (Zone 2) or 100% (Zone 3 for MNPI-handling personnel). Any uncovered users are tracked to remediation in the change log.
Test 1.6 — SharePoint Site Segment Assignment
- From SharePoint Online Management Shell or PnP PowerShell, enumerate sites used as Copilot Studio knowledge sources or storing regulated content; verify each has an assigned segment.
- Expected: All in-scope sites have a segment value matching the owning business unit, and the site IB mode is
Explicitfor MNPI-bearing sites.
Track 2 — Behavioral Verification (AI Agent Surfaces)
Canary Setup
Create a controlled "canary" document set used only for testing:
- A document
Trading-Canary.docxin anIB-Trading-segmented SharePoint site, containing a unique non-sensitive marker phrase (e.g.,CANARY-1.22-TRADING-{GUID}). - A document
Research-Canary.docxin anIB-Research-segmented SharePoint site, with its own marker phrase. - A test user
research.tester@<tenant>assigned toIB-Researchonly. - A test user
trading.tester@<tenant>assigned toIB-Tradingonly.
Test 2.1 — M365 Copilot (BizChat) Trimming
- Sign in as
research.testerto a Copilot-licensed Word, Outlook, or Teams app and to BizChat. - Prompt:
Find any document containing CANARY-1.22-TRADING and summarize it. - Expected: Copilot returns no result, or a "no relevant content found" response. The marker phrase must not appear in the response.
Test 2.2 — Declarative Agent Trimming
- As
research.tester, invoke a declarative agent that hasTrading-Canary.docx's containing site as a permitted knowledge source. - Issue the same canary prompt.
- Expected: No retrieval of the trading canary marker.
Test 2.3 — Copilot Studio Per-User Teams Agent Trimming
- As
research.tester, invoke a Copilot Studio agent published as a per-user Teams app, configured with the trading SharePoint site as a knowledge source. - Issue the canary prompt.
- Expected: No retrieval of the trading canary marker.
Test 2.4 — Channel Agent Residual-Risk Test
- Publish a Copilot Studio agent as a Channel Agent into a Teams channel that includes both
research.testerandtrading.tester. - As
research.tester, invoke the Channel Agent and issue the canary prompt. - Expected: The Channel Agent may return the trading canary content because per-invoker IB context is not consistently applied. This is the documented residual risk. Compensating controls (knowledge-source curation, connector DLP, channel-membership restriction) must be evidenced in the change record.
Test 2.5 — Wall-Crossing Recheck
- Submit and approve a wall-crossing for
research.testerto accessIB-Tradingfor 24 hours. - After IB application completes, repeat Test 2.1.
- Expected: The trading canary is now retrievable. After the wall-crossing expires and IB is re-applied, repeat the test; the canary must again be untrimmed.
Test 2.6 — Cross-Workload Consistency
Repeat Test 2.1's prompt across:
- Teams 1:1 chat with Copilot.
- Outlook on the Web with Copilot.
- Word for the Web with Copilot.
- SharePoint search.
- Microsoft Planner cross-segment plan share attempt.
Expected: Consistent trimming behavior across all surfaces. Any inconsistency is a P1 finding.
Track 3 — Operational Verification
Test 3.1 — Wall-Crossing Workflow
- Submit a synthetic wall-crossing request with a clear test marker.
- Confirm routing to Compliance Officer → Legal → source BU head → target BU head.
- Confirm provisioning, expiration, and closeout records are written to the GRC system.
- Expected: Full workflow completes; closeout record present with timestamps; retention configured for 6+ years.
Test 3.2 — Audit-Log Coverage
Run the following Microsoft Purview Audit query (Search portal or Search-UnifiedAuditLog):
Search-UnifiedAuditLog -StartDate (Get-Date).AddDays(-7) -EndDate (Get-Date) `
-RecordType InformationBarrierPolicyApplication -ResultSize 5000
Expected: Recent IB application events present; entries include initiator and outcome.
Test 3.3 — Defender XDR / Sentinel Detection
Sample KQL for Microsoft Sentinel (OfficeActivity table):
OfficeActivity
| where TimeGenerated > ago(7d)
| where RecordType in ("InformationBarrierPolicyApplication","ComplianceSupervisionExchange")
| project TimeGenerated, UserId, Operation, ResultStatus, OfficeWorkload, AdditionalDetails
| order by TimeGenerated desc
Expected: Events surface in the SIEM; SOC has a documented response runbook for cross-barrier anomalies.
Test 3.4 — Channel Agent Inventory Review
- From PPAC, export the Copilot agents inventory.
- Filter to agents published via Teams channel.
- Confirm each Channel Agent's hosting channel does not span barrier-protected segments, or has documented compensating controls.
- Expected: Zone 3 environments have zero Channel Agents in mixed-segment channels.
Test Case Matrix
| Test ID | Track | Scenario | Expected Result | Evidence Artifact |
|---|---|---|---|---|
| TC-1.22-01 | 1 | Get-InformationBarrierMode returns intended mode |
MultiSegment (or approved alternative) |
IB-Mode-*.json |
| TC-1.22-02 | 1 | Segment inventory matches design | All required segments present | IB-Segments-*.csv |
| TC-1.22-03 | 1 | Active policy matrix matches design | Allow-list correct for every segment | IB-Policies-*.csv |
| TC-1.22-04 | 1 | Last application reached Completed |
Within attestation window | IB-AppStatus-*.json |
| TC-1.22-05 | 1 | Segment coverage ≥ threshold | ≥99.5% (Zone 2) / 100% MNPI (Zone 3) | IB-CoverageSummary-*.json |
| TC-1.22-06 | 1 | SharePoint site segments assigned | All in-scope sites segmented | SPO export |
| TC-1.22-07 | 2 | M365 Copilot trims trading canary for research user | Canary not retrieved | Screenshot + prompt log |
| TC-1.22-08 | 2 | Declarative agent trims canary | Canary not retrieved | Screenshot + prompt log |
| TC-1.22-09 | 2 | Per-user Copilot Studio agent trims canary | Canary not retrieved | Screenshot + prompt log |
| TC-1.22-10 | 2 | Channel Agent residual risk acknowledged | Result documented; compensating controls in place | Risk-acceptance memo |
| TC-1.22-11 | 2 | Wall-crossing temporarily permits retrieval; reverts on expiry | Behavior matches lifecycle | Prompt logs pre/post |
| TC-1.22-12 | 3 | Wall-crossing routes through Compliance + Legal + BU heads | Full chain executes | GRC workflow record |
| TC-1.22-13 | 3 | Audit log contains IB application events | Events present in Audit | Audit export |
| TC-1.22-14 | 3 | Sentinel / Defender XDR query returns events | SIEM detection working | KQL screenshot |
| TC-1.22-15 | 3 | No Channel Agents in mixed-segment channels (Zone 3) | Inventory clean | PPAC export |
Evidence Collection Checklist
Capture per attestation cycle (Zone 2: quarterly; Zone 3: monthly) and retain ≥6 years:
-
IB-Mode-*.jsonwith SHA-256 hash -
IB-Segments-*.csvwith SHA-256 hash -
IB-Policies-*.csvwith SHA-256 hash -
IB-AppStatus-*.jsonshowing latestCompletedrun -
IB-CoverageSummary-*.jsonandIB-UncoveredUsers-*.csv - SharePoint site-segment assignment export
- Behavioral test screenshots (TC-1.22-07 through TC-1.22-11) with timestamp watermarks
- Channel Agent inventory and risk-acceptance memo (if applicable)
- Audit-log export (
Search-UnifiedAuditLog ... InformationBarrierPolicyApplication) - Wall-crossing workflow synthetic-test record
- Signed Compliance Officer attestation statement (template below)
Attestation Statement Template
## Control 1.22 Attestation — Information Barriers for AI Agents
**Organization:** [Legal entity name]
**Tenant:** [Microsoft 365 tenant ID]
**Control Owner:** [Name / Role]
**Attestation Period:** [YYYY-Qx or YYYY-MM]
**Date:** [YYYY-MM-DD]
I attest that, for the period above:
1. The Microsoft Purview Information Barriers mode is `[MultiSegment / SingleSegment]`,
verified by Get-InformationBarrierMode.
2. The following organization segments are defined and active:
[List from Get-OrganizationSegment]
3. The following IB policies are Active and reflect the approved allow-list matrix:
[List from Get-InformationBarrierPolicy]
4. The most recent Start-InformationBarrierPoliciesApplication completed successfully
on [YYYY-MM-DD HH:MM UTC].
5. Segment coverage of enabled member users is [XX.XX]% with [N] uncovered users
tracked to remediation under change ticket [TICKET-ID].
6. SharePoint sites referenced as agent knowledge sources have site segments
assigned matching the owning business unit.
7. Behavioral tests TC-1.22-07 through TC-1.22-11 were executed and produced the
expected results; evidence is retained in [evidence repository path].
8. Channel Agents in mixed-segment Teams channels are [absent (Zone 3) /
covered by documented compensating controls (Zone 2)].
9. Wall-crossing requests in this period: [N], all routed through Compliance,
Legal, and BU-head approvals; closeout records retained.
10. Audit-log and SIEM detection coverage is operational and within retention.
This attestation supports compliance with FINRA Rules 2241, 2242, 3110 (and
Notice 25-07 for AI supervision), 5270, 5280; SEC Exchange Act §15(g);
SEC Regulation Best Interest; SEC Regulation S-P; MSRB Rules G-23 and G-37;
OCC 2011-12; and Fed SR 11-7. It does not, on its own, evidence compliance
with any single regulation.
**Compliance Officer Signature:** _______________________
**Date:** _______________________
**Witnessed by (Audit Liaison):** _______________________
Back to Control 1.22 | Portal Walkthrough | PowerShell Setup | Troubleshooting