Control 2.12: External Sharing and Guest Access Governance
Control ID: 2.12 Pillar: Security & Protection Regulatory Reference: GLBA 501(b), SEC Reg S-P Last Verified: 2026-02-17 Governance Levels: Baseline / Recommended / Regulated
Objective
Govern external sharing and guest access settings across Microsoft 365 to control what content Copilot can surface to external guests and what externally shared content Copilot can reference for internal users. External sharing configurations directly impact Copilot's behavior: guests with access to shared sites can use Copilot to query that content, and internal users' Copilot responses may include content from sites shared with external parties. This control supports compliance with GLBA customer information safeguards and SEC Reg S-P privacy requirements.
Why This Matters for FSI
- GLBA 501(b) requires safeguards to protect customer information from unauthorized disclosure — external sharing configurations determine whether Copilot could expose customer data to guests, contractors, or third parties
- SEC Reg S-P (Rule 248.30) requires financial institutions to protect customer nonpublic personal information (NPI) — guest access to Copilot-accessible content must be governed to prevent NPI disclosure
- SEC Reg S-P (Rule 248.14-15) provides customers with opt-out rights for certain information sharing — Copilot must not circumvent these privacy choices by surfacing shared content to external parties
- FINRA Rule 3110 (Supervision) requires supervision of external communications — Copilot-generated content shared with external parties requires supervisory oversight
- OCC Third-Party Risk Management Guidance expects controls over third-party access to customer information — guest access to M365 represents third-party access that must be governed
- State privacy laws may restrict sharing of consumer financial information with third parties
Control Description
External sharing in Microsoft 365 determines how content can be shared with people outside the organization. These settings directly affect Copilot because:
- Guest users with Copilot licenses can use Copilot to query content they have access to
- Internal users' Copilot responses may include content from externally shared sites
- Copilot Pages and Loop components can potentially be shared externally
External Sharing Impact on Copilot
External Sharing Configuration
│
┌────────────┴────────────┐
│ │
Guest Access Internal User
to Copilot Copilot Behavior
│ │
┌──────┴──────┐ ┌──────┴──────┐
│ │ │ │
Guest has Guest has Content from Content from
Copilot no Copilot shared sites shared sites
license license included in excluded from
│ │ responses responses
│ │ │ │
Can query Cannot use May expose Reduced
shared Copilot sensitive grounding
content (no AI data context scope
access)
Sharing Levels in SharePoint/OneDrive
| Sharing Level | Description | Copilot Impact | FSI Recommendation |
|---|---|---|---|
| Disabled | No external sharing | No guest Copilot access to this content | Use for highest-sensitivity sites |
| Existing guests only | Only guests already in directory | Limited, controlled guest population | Recommended minimum for most FSI sites |
| New and existing guests | Guests can be invited and added | Expanding guest population with Copilot access | Use only where business need is documented |
| Anyone | Anonymous access via link | Anonymous users could access content referenced by Copilot | Never appropriate for FSI — disable org-wide |
Guest Access Governance Framework
| Governance Area | Control | Configuration |
|---|---|---|
| Guest invitation | Who can invite guests | Restrict to admins and guest inviter role |
| Guest Copilot access | Whether guests can use Copilot | Copilot license assignment controls |
| Guest site access | Which sites guests can access | Site-level sharing settings |
| Guest access review | Periodic review of guest permissions | Entra ID Access Reviews |
| Guest expiration | Automatic guest account expiration | Entra ID guest lifecycle |
| Guest MFA | MFA requirement for guest access | Conditional Access policies |
| B2B collaboration | Cross-tenant access settings | Entra ID Cross-Tenant Access |
External Sharing Configuration Matrix for FSI
| Content Type | Sharing Setting | Guest Copilot | Justification |
|---|---|---|---|
| Client data sites | Disabled | No | Customer NPI must not be accessible to guests |
| Regulatory/compliance sites | Disabled | No | Examination and regulatory content is internal only |
| M&A deal rooms | Existing guests only | No | Deal counterparties may need limited access |
| Vendor collaboration sites | Existing guests only | No | Vendor access to specific project content |
| Marketing/public content | New and existing guests | No | External collaboration on public materials |
| Intranet sites | Disabled | No | Internal communications only |
| Executive sites | Disabled | No | Strategic content is internal only |
Copilot Surface Coverage
| M365 Application | Guest Copilot Access | Sharing Controls | External Sharing Governance | Notes |
|---|---|---|---|---|
| Microsoft 365 Copilot Chat | Controlled | Yes | Yes | Guest Copilot Chat limited to accessible content |
| Word | Controlled | Yes | Yes | Co-authoring with guests governed |
| Excel | Controlled | Yes | Yes | Shared workbooks governed |
| PowerPoint | Controlled | Yes | Yes | Shared presentations governed |
| Outlook | N/A | Yes | Yes | Email sharing is separate from file sharing |
| Teams | Controlled | Yes | Yes | Guest access in Teams channels |
| OneNote | Controlled | Yes | Yes | Shared notebooks governed |
| Loop | Controlled | Yes | Yes | External Loop sharing governed |
| Copilot Pages | Controlled | Yes | Yes | Pages sharing with externals governed |
| SharePoint (Agents) | Controlled | Yes | Yes | Agent access for guests governed |
Governance Levels
| Level | Requirement | Rationale |
|---|---|---|
| Baseline | Set org-wide external sharing to "Existing guests only" maximum; disable "Anyone" links org-wide; disable external sharing for sites containing customer data; restrict guest invitations to admins; do not assign Copilot licenses to guest accounts; quarterly guest access review | Restricts the external sharing surface — prevents uncontrolled guest access to Copilot-accessible content |
| Recommended | All Baseline requirements plus: implement Entra ID Access Reviews for guest accounts (quarterly); configure cross-tenant access policies for B2B collaboration; site-level sharing overrides with business justification required; guest access expiration (90 days, renewable); guest MFA via Conditional Access; external sharing audit report monthly; DLP policies for externally shared content | Comprehensive external sharing governance with lifecycle management — suitable for firms that need external collaboration capabilities |
| Regulated | All Recommended requirements plus: external sharing requires compliance approval; all guest access logged and monitored; guest access reviews monthly; no Copilot access for any guest users; external sharing disabled by default (opt-in per site with documented approval); annual external sharing audit by compliance; guest access included in regulatory examination packages | Maximum restriction on external sharing — designed for firms where external access to any Copilot-accessible content is unacceptable without explicit approval |
Setup & Configuration
Step 1: Configure Org-Wide Sharing Settings
Portal: SharePoint Admin Center > Policies > Sharing
# Connect to SharePoint Online
Connect-SPOService -Url "https://contoso-admin.sharepoint.com"
# Set org-wide external sharing level
Set-SPOTenant -SharingCapability ExistingExternalUserSharingOnly
# Disable "Anyone" links
Set-SPOTenant -RequireAnonymousLinksExpireInDays 0
# Set default sharing link type to "Specific people"
Set-SPOTenant -DefaultSharingLinkType Direct
# Restrict guest invitations
Set-SPOTenant -SharingDomainRestrictionMode AllowList `
-SharingAllowedDomainList "partner1.com partner2.com"
Step 2: Configure Site-Level Sharing Overrides
# Disable external sharing for sensitive sites
Set-SPOSite -Identity "https://contoso.sharepoint.com/sites/ClientData" `
-SharingCapability Disabled
Set-SPOSite -Identity "https://contoso.sharepoint.com/sites/Compliance" `
-SharingCapability Disabled
Set-SPOSite -Identity "https://contoso.sharepoint.com/sites/Executive" `
-SharingCapability Disabled
# Allow limited sharing for collaboration sites
Set-SPOSite -Identity "https://contoso.sharepoint.com/sites/VendorProject" `
-SharingCapability ExistingExternalUserSharingOnly
Step 3: Configure Guest Invitation Restrictions
Portal: Microsoft Entra Admin Center > External Identities > External collaboration settings
- Set "Guest invite restrictions" to "Only users assigned to specific admin roles can invite guest users"
- Configure collaboration restrictions to allow specific domains only
- Enable email one-time passcode authentication for guests
Step 4: Configure Entra ID Access Reviews
Portal: Microsoft Entra Admin Center > Identity Governance > Access reviews
- Create access review for all guest users
- Frequency: Quarterly (Recommended) or Monthly (Regulated)
- Reviewers: Site owners or designated business sponsors
- Auto-apply results: Remove access for guests not confirmed
Step 5: Configure Guest Account Lifecycle
Portal: Microsoft Entra Admin Center > External Identities > External collaboration settings
- Set guest account expiration (90 days recommended)
- Configure notification to sponsors before expiration
- Require re-invitation for expired guest accounts
Step 6: Copilot License Governance for Guests
- Verify that Microsoft 365 Copilot licenses are NOT assigned to guest accounts
- Create a license assignment policy that excludes guest user types
- Monitor license assignments to detect accidental guest licensing
# Check for guest users with Copilot licenses
Get-MgUser -Filter "userType eq 'Guest'" -All |
ForEach-Object {
$licenses = Get-MgUserLicenseDetail -UserId $_.Id
if ($licenses.SkuPartNumber -contains "Microsoft_365_Copilot") {
Write-Output "WARNING: Guest $($_.DisplayName) has Copilot license"
}
}
Financial Sector Considerations
- Client Data Protection: Customer NPI must never be accessible to guest users via Copilot. This means sites containing client data must have external sharing disabled entirely, not just restricted. A guest user with Copilot access to a client data site could use AI to rapidly aggregate and extract client information.
- Vendor Access Management: Financial firms frequently collaborate with external vendors (auditors, consultants, technology providers). Vendor access should be scoped to specific project sites with external sharing enabled only for those sites, and vendor guest accounts should never have Copilot licenses.
- M&A Transaction Access: During M&A transactions, deal counterparties may need access to data rooms. These sites should have external sharing configured to "Existing guests only" with specific named guests, and must be excluded from Copilot grounding scope (see Control 2.5).
- Regulatory Examination Access: Regulators (FINRA, SEC, OCC, state regulators) may request access to firm systems during examinations. Provide examination access through controlled, temporary guest accounts with explicit site-level access — never through Copilot.
- B2B Collaboration with Other Financial Institutions: Cross-institutional collaboration (e.g., syndicated lending, joint ventures) requires careful sharing governance. Use Entra ID cross-tenant access policies to control B2B collaboration boundaries.
- Guest Access Audit Trail: Maintain comprehensive logs of guest account creation, access patterns, and account removal. This audit trail supports GLBA safeguard monitoring and provides examination evidence.
- Annual Sharing Policy Review: Review the organization's external sharing policy annually in the context of Copilot capabilities. As Copilot features expand, the risk profile of external sharing may change.
Verification Criteria
- Org-Wide Sharing Level: Verify the org-wide external sharing level is set to "Existing guests only" or more restrictive
- Anonymous Links Disabled: Confirm "Anyone" links are disabled org-wide
- Sensitive Site Sharing: Verify that sites containing client data, regulatory content, and executive materials have sharing set to "Disabled"
- Guest Copilot Licensing: Confirm no guest accounts have Microsoft 365 Copilot licenses assigned
- Guest Invitation Restriction: Attempt to invite a guest as a standard user — verify the invitation is blocked
- Access Reviews Active: Confirm Entra ID Access Reviews for guest accounts are configured and running on schedule
- Guest Account Expiration: Verify guest account expiration is configured and functioning
- Domain Restrictions: Verify that allowed domain lists are configured and only approved domains can receive sharing invitations
- Audit Logging: Confirm external sharing events appear in the Unified Audit Log and are monitored
- Policy Documentation: Verify that external sharing policies are documented, approved by compliance, and reviewed annually
Additional Resources
- External Sharing Overview in SharePoint
- Manage External Collaboration in Entra ID
- Access Reviews for Guest Users
- Cross-Tenant Access Settings
- SEC Reg S-P — Privacy of Consumer Financial Information
- Related Controls: 2.5 Data Minimization, 2.11 Copilot Pages, 2.3 Conditional Access, 3.10 SEC Reg S-P Privacy, 4.1 Admin Settings & Feature Management
- Playbooks: External Sharing Configuration Playbook, Guest Access Review Playbook, B2B Collaboration Playbook