Control 2.13: Plugin and Graph Connector Security Governance
Control ID: 2.13 Pillar: Security & Protection Regulatory Reference: GLBA 501(b), FFIEC Last Verified: 2026-02-17 Governance Levels: Baseline / Recommended / Regulated
Objective
Establish a security governance framework for Microsoft 365 Copilot plugins (extending Copilot's capabilities with third-party actions) and Microsoft Graph connectors (ingesting external data into the Microsoft 365 index for Copilot grounding). Plugins and connectors expand Copilot's reach beyond native M365 data, introducing third-party code execution, OAuth consent flows, and external data ingestion that must be governed through security review, approval workflows, and ongoing monitoring. This control supports compliance with GLBA safeguard requirements and FFIEC expectations for third-party risk management.
Why This Matters for FSI
- GLBA 501(b) requires safeguards for customer information systems — plugins and connectors introduce third-party processing of data that flows through Copilot, expanding the safeguard boundary
- FFIEC IT Examination Handbook (Outsourcing) expects due diligence and ongoing monitoring of third-party service providers — plugin publishers and connector data sources are third-party processors requiring risk assessment
- FFIEC IT Examination Handbook (Information Security) expects controls over API access and OAuth permissions — plugins use OAuth for authentication, and excessive permissions create security risk
- OCC Bulletin 2013-29 (Third-Party Risk Management) requires risk management throughout the third-party relationship lifecycle — applies to plugin publishers and Graph connector vendors
- SEC guidance on outsourcing expects firms to maintain supervisory responsibility for outsourced functions — plugins that perform actions on behalf of users require supervisory controls
- Interagency AI Guidance (2023) expects institutions to understand and manage risks from AI tool extensibility, including third-party integrations
Control Description
Microsoft 365 Copilot can be extended through two primary mechanisms:
Plugin Types and Security Implications
| Plugin Type | Description | Data Flow | Security Concern |
|---|---|---|---|
| Message extension plugins | Teams message extensions used as Copilot plugins | User query → plugin service → response | Third-party sees user queries |
| API plugins | Custom API-based plugins with OpenAPI spec | User query → API endpoint → response | API may process sensitive data |
| Copilot Studio plugins | Plugins built in Copilot Studio | User query → Power Platform → response | Power Platform governance applies |
| Graph connector plugins | Plugins that query Graph connector data | User query → connector index → response | External data ingested into search |
Graph Connector Data Flow
External Data Source Microsoft 365 Copilot
┌──────────────┐ ┌─────────────────┐
│ ServiceNow │ Graph │ Microsoft Graph │
│ Salesforce │ Connector │ Index │
│ SAP │ ─────────────→ │ │ ──→ Copilot grounds
│ Jira │ (data │ Indexed external │ responses on
│ Custom DB │ ingestion) │ content │ Graph data
└──────────────┘ └─────────────────┘
OAuth Consent and Permission Model
| Permission Type | Description | Risk Level | FSI Governance |
|---|---|---|---|
| Delegated permissions | Plugin acts on behalf of the signed-in user | Medium | User consent may be acceptable for low-risk plugins |
| Application permissions | Plugin acts with its own identity | High | Admin consent only — never user consent for FSI |
| Graph connector permissions | Connector ingests data into the Graph index | High | Admin consent + security review required |
| Overprivileged permissions | Plugin requests more permissions than needed | Critical | Block — require least-privilege scoping |
Plugin Approval Workflow
Plugin Request
│
▼
┌──────────────────┐
│ Security Review │
│ │
│ ├─ Publisher │
│ │ reputation │
│ ├─ Permissions │
│ │ requested │
│ ├─ Data flow │
│ │ analysis │
│ ├─ SOC 2/ISO │
│ │ certification │
│ └─ Privacy │
│ assessment │
└────────┬─────────┘
│
┌────┴────┐
│ │
Approve Reject
│ │
Deploy Document
+ Monitor rationale
Plugin Security Assessment Criteria
| Criterion | Assessment Questions | Weight |
|---|---|---|
| Publisher trust | Is the publisher Microsoft-verified? SOC 2 certified? Known in FSI? | High |
| Permission scope | What permissions are requested? Are they least-privilege? | Critical |
| Data handling | Where is data processed? Is data stored? What retention? | Critical |
| Authentication | How does the plugin authenticate? OAuth 2.0? Certificate? | High |
| Encryption | Is data encrypted in transit and at rest? | High |
| Compliance | Does the publisher have FSI-relevant compliance certifications? | Medium |
| Update cadence | How frequently is the plugin updated? Security patching? | Medium |
| Exit strategy | Can the plugin be removed cleanly? What happens to data? | Medium |
Copilot Surface Coverage
| M365 Application | Plugin Support | Graph Connector | OAuth Consent | Notes |
|---|---|---|---|---|
| Microsoft 365 Copilot Chat | Yes | Yes | Yes | Primary extensibility surface |
| Word | Limited | Yes | Yes | Document-focused plugins |
| Excel | Limited | Yes | Yes | Data analysis plugins |
| PowerPoint | Limited | Yes | Yes | Presentation plugins |
| Outlook | Yes | Yes | Yes | Email/calendar plugins |
| Teams | Yes | Yes | Yes | Full plugin support in Teams |
| OneNote | Limited | Yes | Yes | Limited plugin support |
| Loop | Limited | Yes | Yes | Limited plugin support |
| Copilot Pages | Yes | Yes | Yes | Plugins available in Pages |
| SharePoint (Agents) | Yes | Yes | Yes | Agents can use plugins and connectors |
Governance Levels
| Level | Requirement | Rationale |
|---|---|---|
| Baseline | Disable all third-party plugins for Copilot; restrict to Microsoft first-party plugins only; block user consent for OAuth apps; disable Graph connectors from external sources; document the restriction rationale | Maximum restriction during initial Copilot deployment — eliminates third-party extensibility risk entirely |
| Recommended | Enable Microsoft first-party plugins; create a plugin approval workflow requiring security review; allow approved Graph connectors with admin consent only; implement OAuth app governance via Entra ID; quarterly review of approved plugins; monitor plugin usage via audit logs | Controlled extensibility with formal approval process — suitable for firms that need selected third-party integrations |
| Regulated | All Recommended requirements plus: full third-party risk assessment for each plugin publisher; annual plugin security re-assessment; Graph connector data classification and labeling; plugin-specific DLP policies; real-time monitoring of plugin API calls; plugin governance committee with compliance representation; plugin inventory included in examination packages | Comprehensive extensibility governance — designed for firms where every third-party integration requires formal risk management |
Setup & Configuration
Step 1: Configure Integrated Apps Settings
Portal: Microsoft 365 Admin Center > Settings > Integrated apps
- Review current app deployment status
- Set default to "Block all third-party apps for Copilot" for Baseline
- For Recommended/Regulated, enable admin-managed deployment only
Step 2: Configure OAuth App Consent
Portal: Microsoft Entra Admin Center > Applications > Consent and permissions
- Set user consent to "Do not allow user consent" for enterprise applications
- Enable admin consent workflow
- Configure admin consent request notifications to security team
# Connect to Microsoft Graph
Connect-MgGraph -Scopes "Policy.ReadWrite.Authorization"
# Disable user consent for applications
Update-MgPolicyAuthorizationPolicy -DefaultUserRolePermissions @{
PermissionGrantPoliciesAssigned = @()
}
# Enable admin consent workflow
# Portal: Entra Admin Center > Enterprise applications > Consent and permissions > Admin consent settings
Step 3: Configure Plugin Deployment
Portal: Microsoft 365 Admin Center > Settings > Copilot > Plugins
- Review available plugins
- For Baseline: Disable all non-Microsoft plugins
- For Recommended: Enable approved plugins via admin deployment
- Configure which users can access each deployed plugin
Step 4: Configure Graph Connector Governance
Portal: Microsoft 365 Admin Center > Settings > Search & intelligence > Connectors
- Review Graph connector deployment requests
- Require security review before connector deployment
- Configure connector data ingestion scope
- Apply sensitivity labels to connector-ingested content
Step 5: Implement Plugin Approval Workflow
Create a formal plugin approval process:
| Step | Owner | Deliverable |
|---|---|---|
| 1. Business request | Requesting department | Business justification document |
| 2. Security review | Information Security | Security assessment report |
| 3. Privacy review | Privacy/Legal | Privacy impact assessment |
| 4. Compliance review | Compliance | Regulatory risk assessment |
| 5. Architecture review | IT Architecture | Integration architecture review |
| 6. Approval decision | Plugin governance committee | Approval/denial with rationale |
| 7. Deployment | IT Operations | Controlled deployment with monitoring |
| 8. Ongoing monitoring | Information Security | Quarterly usage and security review |
Step 6: Monitor Plugin Activity
# Search audit logs for plugin-related activities
Search-UnifiedAuditLog -StartDate (Get-Date).AddDays(-30) -EndDate (Get-Date) `
-Operations "AppConsented","CopilotPluginUsed" -ResultSize 5000
# Monitor OAuth consent events
Search-UnifiedAuditLog -StartDate (Get-Date).AddDays(-7) -EndDate (Get-Date) `
-Operations "Consent to application" -ResultSize 5000
Financial Sector Considerations
- Third-Party Risk Management: Financial regulators (OCC, FFIEC) have specific expectations for third-party risk management. Each plugin publisher and Graph connector vendor should be assessed using the firm's third-party risk management framework. This includes due diligence, contract review, ongoing monitoring, and exit planning.
- Data Residency for Plugins: Plugins may process data outside the firm's M365 tenant geography. Assess whether plugin data processing locations comply with the firm's data residency requirements (see Control 2.7).
- Sensitive Data Exposure: When a user asks Copilot a question and a plugin processes the query, the plugin's service receives context from the user's prompt. This may include sensitive business context or customer information. Assess this data exposure risk for each plugin.
- Graph Connector Data Classification: Data ingested via Graph connectors into the M365 index becomes available to Copilot for grounding. This data must be classified and labeled appropriately. Unclassified external data in the Graph index could be surfaced by Copilot without proper sensitivity controls.
- SOC 2 Requirements: For Recommended and Regulated governance levels, require SOC 2 Type II reports from plugin publishers. This provides assurance about the publisher's security controls, availability, and data handling practices.
- Regulatory Notification: Some regulatory frameworks require notification when new third-party services are engaged for processing customer data. Evaluate whether plugin deployment triggers notification requirements.
- Plugin Inventory for Examinations: Maintain a current inventory of all deployed plugins and Graph connectors, including publisher information, permissions granted, data flows, and last security review date. Examiners may request this during IT examinations.
Verification Criteria
- Third-Party Plugin Status: Verify that third-party plugins are disabled (Baseline) or restricted to approved plugins only (Recommended/Regulated)
- User Consent Blocked: Confirm that users cannot consent to OAuth applications — attempt user consent and verify it is blocked
- Admin Consent Workflow: Verify that admin consent requests are routed to the security team and that a documented review process exists
- Plugin Inventory: Confirm a current inventory of deployed plugins exists with publisher, permissions, and last review date
- Graph Connector Governance: Verify that Graph connector deployment requires admin approval and that ingested data is classified
- Plugin Approval Workflow: Confirm a documented plugin approval workflow exists with security, privacy, and compliance review steps
- Permission Scoping: For approved plugins, verify that granted permissions follow the principle of least privilege
- Plugin Usage Monitoring: Verify that plugin usage events are captured in audit logs and monitored
- Third-Party Risk Assessment: Confirm that plugin publishers have been assessed under the firm's third-party risk management framework
- Periodic Review: Confirm that approved plugins are re-assessed at least annually (Recommended) or quarterly (Regulated)
Additional Resources
- Microsoft 365 Copilot Extensibility Overview
- Manage Copilot Agents in Microsoft 365 Admin Center
- Microsoft Graph Connectors Overview
- OAuth App Consent in Entra ID
- OCC Bulletin 2013-29 Third-Party Risk Management
- Related Controls: 2.3 Conditional Access, 2.5 Data Minimization, 2.14 Declarative Agents, 4.13 Extensibility Governance
- Playbooks: Plugin Security Review Playbook, Graph Connector Deployment Playbook, OAuth Consent Governance Playbook