Control 2.5: Data Minimization and Grounding Scope
Control ID: 2.5 Pillar: Security & Protection Regulatory Reference: GLBA 501(b), Data Minimization Principles Last Verified: 2026-02-17 Governance Levels: Baseline / Recommended / Regulated
Objective
Control and limit the scope of data that Microsoft 365 Copilot can access for grounding responses. By implementing Restricted SharePoint Search, site-level exclusions, and data access governance in Microsoft Purview, organizations can enforce the principle of least privilege for AI interactions — restricting Copilot to only the data sources appropriate for each user group. This control helps prevent oversharing amplification, where Copilot surfaces content that users have technical permissions to access but should not practically encounter in AI-generated responses.
Why This Matters for FSI
- GLBA 501(b) requires that safeguards be reasonably designed to protect customer information — limiting the data Copilot can access reduces the surface area for potential customer information exposure
- Data minimization principles (embedded in GLBA, state privacy laws, and prudential guidance) require that data processing be limited to what is necessary for the stated purpose — Copilot should only access data relevant to the user's legitimate business needs
- FFIEC IT Examination Handbook expects access controls that follow least privilege — Copilot's default behavior of searching all content a user can access may exceed least-privilege standards
- OCC 2011-12 (Model Risk Management) expects controls over model inputs — limiting grounding scope controls what data feeds into Copilot's AI model for response generation
- SEC Reg S-P requires protection of customer nonpublic personal information (NPI) — restricting Copilot's grounding scope helps prevent NPI from appearing in AI-generated responses outside its intended context
Control Description
Microsoft 365 Copilot grounds its responses by searching content across the Microsoft 365 tenant using the Microsoft Graph. By default, Copilot can access any content the authenticated user has permission to view. For financial institutions, this default scope is often too broad.
Grounding Scope Control Mechanisms
| Mechanism | Description | Scope Control |
|---|---|---|
| Restricted SharePoint Search (RSS) | Limits Copilot to a curated list of approved SharePoint sites | Org-wide: Copilot can only ground from allowed sites |
| Site-Level Exclusion | Excludes specific SharePoint sites from Copilot search | Targeted: Remove sensitive sites from Copilot grounding |
| Data Access Governance (Purview) | Visibility into overshared sites and recommendations | Monitoring: Identify and remediate oversharing |
| SharePoint Advanced Management (SAM) | Restrict access to sites, data access governance reports | Management: Control site-level permissions at scale |
| Microsoft Graph Permissions | User-level graph permissions that Copilot inherits | Foundation: Copilot can only access what user can access |
Restricted SharePoint Search (RSS)
RSS is the primary mechanism for controlling Copilot's grounding scope:
| Mode | Behavior | Use Case |
|---|---|---|
| Disabled (Default) | Copilot searches all SharePoint sites the user can access | Not recommended for FSI without other controls |
| Enabled — Allow List | Copilot can ONLY search sites on the approved list | Recommended for initial rollout — start with curated, clean sites |
| Transitioning to Disabled | After data hygiene is validated, gradually expand access | Target state after Pillar 1 readiness is confirmed |
RSS Configuration Flow
Admin enables RSS
│
▼
Define Allowed Sites
(curated, clean list)
│
▼
┌─────────────────────────┐
│ Copilot Grounding │
│ │
│ ✓ Allowed Site A │
│ ✓ Allowed Site B │
│ ✓ Allowed Site C │
│ ✗ All Other Sites │
└─────────────────────────┘
│
▼
Monitor via Data Access
Governance reports
│
▼
Gradually expand allowed
sites as hygiene improves
Data Access Governance Reports
Microsoft Purview Data Access Governance provides reports that identify:
| Report | Description | FSI Action |
|---|---|---|
| Overshared sites | Sites with broad permissions (e.g., "Everyone except external users") | Remediate before adding to RSS allow list |
| Inactive sites | Sites with no recent activity but active permissions | Archive or remove from Copilot scope |
| Sensitivity-labeled sites | Sites containing labeled content by classification | Verify label accuracy before Copilot access |
| External sharing sites | Sites shared with external guests | Exclude from Copilot grounding or restrict |
| Sites with overshared files | Individual files with broad access | File-level remediation |
Site Exclusion Strategy for FSI
| Site Category | Default Action | Justification |
|---|---|---|
| Executive/Board sites | Exclude | Board materials too sensitive for general Copilot access |
| HR/Compensation sites | Exclude | Employee PII and compensation data |
| Legal/Litigation hold sites | Exclude | Privileged information |
| Compliance/Regulatory sites | Exclude | SAR, examination correspondence |
| M&A deal rooms | Exclude | MNPI and deal-specific information |
| Archived client sites | Exclude | Stale permissions, historical data |
| Departmental collaboration | Include (curated) | Standard business content after hygiene review |
| Project sites (active) | Include (curated) | Active work product after permission review |
| Intranet/communication sites | Include | Generally safe, broadly shared by design |
Copilot Surface Coverage
| M365 Application | RSS Applies | Site Exclusion | Data Access Governance | Notes |
|---|---|---|---|---|
| Microsoft 365 Copilot Chat | Yes | Yes | Yes | Primary grounding scope concern |
| Word | Partial | Yes | Yes | Grounding from SharePoint/OneDrive |
| Excel | Partial | Yes | Yes | Data analysis from linked files |
| PowerPoint | Partial | Yes | Yes | Content suggestions from SharePoint |
| Outlook | No | No | Limited | Email grounding uses Exchange, not SharePoint |
| Teams | Partial | Yes | Yes | Teams-linked SharePoint sites |
| OneNote | Partial | Yes | Yes | Notebook sites in SharePoint |
| Loop | Partial | Yes | Yes | Loop workspaces in SharePoint |
| Copilot Pages | Yes | Yes | Yes | Pages grounding follows RSS |
| SharePoint (Agents) | Yes | Yes | Yes | Agent scope limited by RSS and site access |
Governance Levels
| Level | Requirement | Rationale |
|---|---|---|
| Baseline | Enable Restricted SharePoint Search with initial allow list of 10-50 curated sites; exclude executive, HR, legal, and compliance sites from Copilot grounding; run Data Access Governance reports monthly | Reduces grounding scope to known-clean sites — safest approach for initial Copilot deployment |
| Recommended | Expand RSS allow list based on Data Access Governance results; implement site-level exclusions for sensitive categories; use SharePoint Advanced Management for at-scale permission reviews; quarterly grounding scope reviews; document site inclusion/exclusion rationale | Balanced approach that expands Copilot utility while maintaining data boundary controls |
| Regulated | RSS allow list managed through formal change control process; every site addition requires data hygiene certification; real-time monitoring of grounding scope changes; integration with DSPM for AI to track sensitive data access patterns; annual grounding scope audit by compliance | Maximum control over data access — suitable for firms with highest regulatory scrutiny |
Setup & Configuration
Step 1: Enable Restricted SharePoint Search
Portal: Microsoft 365 Admin Center > Settings > Search & intelligence > Restricted SharePoint Search
- Toggle "Restrict SharePoint Search" to On
- This immediately limits Copilot's SharePoint grounding to only explicitly allowed sites
- Note: This setting applies org-wide — plan communication to users before enabling
Step 2: Build the Allowed Site List
# Connect to SharePoint Online
Connect-SPOService -Url "https://contoso-admin.sharepoint.com"
# Add sites to the RSS allowed list
Add-SPOTenantRestrictedSearchAllowedList -SiteUrl "https://contoso.sharepoint.com/sites/Department-A"
Add-SPOTenantRestrictedSearchAllowedList -SiteUrl "https://contoso.sharepoint.com/sites/Project-B"
# View current allowed list
Get-SPOTenantRestrictedSearchAllowedList
# Remove a site from the allowed list
Remove-SPOTenantRestrictedSearchAllowedList -SiteUrl "https://contoso.sharepoint.com/sites/OldSite"
Step 3: Configure Site-Level Exclusions
For sites that should never be accessible to Copilot, regardless of RSS status:
# Exclude a specific site from search (and therefore Copilot grounding)
Set-SPOSite -Identity "https://contoso.sharepoint.com/sites/LegalHold" `
-DenyAddAndCustomizePages $true
# Use site-level settings to restrict Copilot
Set-SPOSite -Identity "https://contoso.sharepoint.com/sites/BoardMaterials" `
-RestrictedAccessControl $true
Step 4: Run Data Access Governance Reports
Portal: Microsoft Purview > Data Access Governance > Reports
- Generate "Sites shared with Everyone except external users" report
- Generate "Overshared files" report
- Review results and remediate before adding sites to RSS allow list
- Schedule monthly report generation
Step 5: Monitor and Expand
- Review Copilot usage analytics to identify user requests that hit RSS boundaries
- Evaluate requested sites for data hygiene readiness
- Add sites to allow list through documented change control process
- Track expansion progress against target state
Financial Sector Considerations
- Oversharing Amplification Risk: Financial firms often have years of SharePoint content with broad permissions established before data classification programs were mature. Copilot amplifies this risk by actively surfacing content users did not know they could access. RSS is the primary mitigation.
- M&A Deal Room Protection: Deal rooms must never be included in RSS allow lists. Even if information barriers are in place, the principle of defense in depth requires site-level exclusion as a secondary control.
- Regulatory Correspondence Sites: Sites containing examination correspondence, regulatory filings, and supervisory letters should be excluded from Copilot grounding to prevent inadvertent disclosure through AI-generated responses.
- Client Data Repositories: Sites containing client account information, portfolio data, and transaction records require careful permission review before inclusion in Copilot's grounding scope. Stale permissions from departed employees or reorganized teams are common in financial firms.
- Gradual Expansion Strategy: FSI firms should start with RSS enabled and a narrow allow list (critical collaboration sites only), then expand methodically as data hygiene improves. Most firms require 3-6 months to clean SharePoint permissions sufficiently for broad Copilot grounding.
- SAM Licensing: SharePoint Advanced Management (SAM) provides the most comprehensive data access governance reports but requires additional licensing. For Regulated-level implementations, SAM is strongly recommended.
- Documentation for Examiners: Maintain a log of RSS allow list changes (date, site added/removed, approver, hygiene certification status). This demonstrates proactive data governance to regulators examining AI deployment practices.
Verification Criteria
- RSS Status: Confirm Restricted SharePoint Search is enabled in the M365 Admin Center
- Allow List Accuracy: Verify the RSS allow list contains only sites that have passed data hygiene review
- Exclusion Enforcement: Query Copilot Chat for content known to exist on an excluded site — confirm no results are returned from that site
- Allow List Enforcement: Query Copilot Chat for content on an allowed site — confirm results are returned normally
- Data Access Governance Reports: Confirm monthly reports are generated and reviewed, with remediation actions tracked
- Sensitive Site Exclusion: Verify that executive, HR, legal, compliance, and M&A sites are excluded from Copilot grounding
- Change Control Process: Confirm a documented change control process exists for RSS allow list modifications
- User Communication: Verify that users understand Copilot's data access scope and any limitations imposed by RSS
- Permission Hygiene: Run the "Overshared sites" report and confirm that no sites on the RSS allow list appear as overshared
- Expansion Tracking: Confirm a documented plan exists for expanding the RSS allow list over time, with milestones and hygiene criteria
Additional Resources
- Restricted SharePoint Search for Copilot
- Data Lifecycle Management in Microsoft Purview
- SharePoint Advanced Management Overview
- Microsoft 365 Copilot Data Residency and Access
- SharePoint Advanced Management Overview
- Related Controls: 2.1 DLP Policies, 2.4 Information Barriers, 2.12 External Sharing, 3.10 SEC Reg S-P Privacy, 4.1 Admin Settings & Feature Management
- Playbooks: RSS Configuration Playbook, Data Access Governance Report Playbook, Site Hygiene Review Playbook