Control 4.2: Site Access Reviews and Certification - Portal Walkthrough
This playbook provides portal configuration guidance for Control 4.2.
Prerequisites
- SharePoint Admin role assigned
- Access to SharePoint Admin Center
- Access to Microsoft Entra Admin Center
- SharePoint Advanced Management Plan 1 license assigned to tenant
- Entra ID Governance (P2) license for access review workflows
- Site owners identified and documented for each team/enterprise site
Step-by-Step Configuration
Step 1: Assess Current Permissions with Data Access Governance Reports
Generate baseline permissions report:
- Navigate to SharePoint Admin Center
- Go to Reports > Data access governance
- Click Get started to run initial assessment (if first use)
- Click View reports under "Site permissions across your organization"
- Export report for analysis
- Identify sites with:
- "Everyone except external users" access
- Guest user access
- Broad sharing links
- Prioritize team/enterprise sites and agent knowledge sources
EEEU (Everyone Except External Users) Priority
Sites shared with "Everyone except external users" represent the highest oversharing risk for Copilot and should be prioritized for access review. EEEU-shared content is accessible to all internal users including Copilot, which can surface sensitive data in AI-generated responses. See Control 4.7 for EEEU risk assessment guidance.
Step 2: Configure Site Attestation Policies
Create attestation policy for regulated sites:
- Navigate to Policies > Site lifecycle management
- Click Open under "Site attestation policies"
- Click Create policy
- Configure scope:
- By sensitivity label: Confidential, Highly Confidential
- By site URL pattern: (optional)
- By site template: (optional)
- Set frequency:
- Quarterly: For enterprise-managed sites
- Annual: For team collaboration sites
- Configure notifications:
- Reminder before due date: 30, 14, 7 days
- Escalation to admin if overdue
- Set non-compliance action:
- Read-only: Recommended for regulated sites
- Archive: For long-term non-response
- Click Save and enable the policy
Step 3: Configure Access Reviews in Entra ID (for Groups)
Create access review schedule for M365 Groups/Teams:
- Navigate to Microsoft Entra Admin Center
- Go to Identity governance > Access reviews
- Click New access review
- Configure review:
- Review name: "FSI SharePoint Site Access Review - Quarterly"
- Description: Review and certify access to sensitive SharePoint sites
- Scope: Groups and Teams
- Review scope: Specific groups (select site-connected M365 groups)
- Configure reviewers:
- Group owners: Primary reviewer
- Fallback reviewers: Compliance team
- Configure settings:
- Duration: 14 days
- Recurrence: Quarterly
- Auto-apply results: Yes
- Default decision if no response: Deny
- Justification required: Yes
- Click Create
Step 4: Establish Review Process for Agent Knowledge Sources
Document access review procedures:
- Identify sites used as agent knowledge sources (from Agent Inventory)
- Document review requirements per zone:
- Zone 1: Annual review (site owner)
- Zone 2: Semi-annual review (owner + manager)
- Zone 3: Quarterly review (owner + compliance)
- Create checklist for reviewers:
- Is each user's access still needed?
- Are permissions appropriate for role?
- Are any external users present?
- Is agent access documented and approved?
Step 5: Monitor Compliance
Track attestation compliance:
- Navigate to Policies > Site lifecycle management
- Review "Site attestation policies" dashboard
- Check attestation completion rates
- Follow up on overdue attestations
- Export reports for governance documentation
Configuration by Governance Level
| Setting | Baseline | Recommended | Regulated |
|---|---|---|---|
| Access review frequency | Annual | Semi-annual | Quarterly |
| Attestation policy | None | Annual | Quarterly |
| Reviewers | Site owner | Owner + manager | Owner + compliance + legal |
| Auto-remediation | None | Archive if no response | Read-only + escalation |
| Justification required | No | Yes | Yes with documentation |
Service Account Access Reviews for AI Agents
For AI agents using service accounts or service principals:
- Identify agent service accounts from Agent Inventory
- Review API permissions granted to each service principal
- Validate least privilege:
- Prefer Sites.Selected over Sites.Read.All
- Document business justification for each permission
- Include service accounts in quarterly access review cycle
- Document findings using the Service Account Review Checklist
Validation
After completing these steps, verify:
- Data access governance reports accessible and current
- Site attestation policy configured for regulated sites
- Access review schedules created in Entra ID
- Notification templates configured
- Non-compliance actions set appropriately
- Review process documented and communicated to site owners
Back to Control 4.2 | PowerShell Setup | Verification Testing | Troubleshooting
Updated: January 2026 | Version: v1.2