Control 1.2: SharePoint Oversharing Detection (DSPM for AI) — Verification & Testing
Test cases and evidence collection for validating SharePoint oversharing detection and remediation.
Test Cases
Test 1: DSPM Activation and Unified Experience Verification
- Objective: Confirm DSPM is enabled and the unified experience is accessible from both Purview and MAC
- Steps:
- Navigate to Microsoft Purview > Data Security Posture Management > Overview
- Verify the service status shows "Active"
- Confirm the last scan date is within the past 7 days
- Check that the scan scope includes all SharePoint Online sites
- Verify AI observability section is accessible
- Navigate to Microsoft 365 Admin Center > Copilot > Overview > Security tab and confirm DSPM security controls are accessible from this path
- Expected Result: DSPM is active with current scan coverage; both access paths (Purview and MAC) are functional
- Evidence: Screenshots of DSPM overview from Purview portal and MAC Security tab with timestamps
Test 2: Oversharing Detection Accuracy
- Objective: Verify that DSPM correctly identifies overshared sites
- Steps:
- Create a test SharePoint site with "Everyone except external users" access
- Upload a document with a Confidential sensitivity label to the test site
- Wait for the next DSPM scan cycle (or trigger a manual assessment)
- Check that the test site appears in the oversharing report
- Clean up the test site after verification
- Expected Result: The test site with sensitive labeled content and broad access appears as a Critical or High finding
- Evidence: DSPM finding showing the test site with correct risk classification
- Objective: Confirm that remediated sites no longer appear as overshared
- Steps:
- Select a site that was previously flagged and remediated
- Verify the sharing capability has been restricted via
Get-SPOSite -Identity <url>
- Wait for the next DSPM scan to process the change
- Confirm the site no longer appears in the oversharing findings or shows as remediated
- Expected Result: Remediated sites are marked as resolved in subsequent scans
- Evidence: Before and after DSPM reports showing finding resolution
Test 4: Oversharing Policy Alert Functionality
- Objective: Verify that oversharing policies generate alerts when triggered
- Steps:
- Create or identify an active oversharing detection policy
- Simulate the policy condition (e.g., share a sensitive document broadly)
- Wait for the alert generation cycle (up to 24 hours)
- Verify the alert appears in Purview > Alerts and email notification is received
- Reverse the simulated oversharing action
- Expected Result: Alert is generated and delivered to configured recipients within the expected timeframe
- Evidence: Alert record from Purview and email notification screenshot
Test 5a: Shadow AI Discovery Functional Verification
- Objective: Verify Shadow AI discovery is detecting unsanctioned AI tool usage
- Steps:
- Navigate to Microsoft Purview > Data Security Posture Management > AI Observability
- Confirm Shadow AI discovery section is enabled and populated with data
- Verify the governance team has reviewed Shadow AI findings in the past 30 days
- Confirm alert configurations exist for new Shadow AI tool detections
- Expected Result: Shadow AI discovery is active and governance team has a process to review findings
- Evidence: Screenshot of Shadow AI findings dashboard; alert configuration screenshot
Test 6: Copilot Access Validation Post-Remediation
- Objective: Confirm Copilot respects remediated permissions and does not surface overshared content
- Steps:
- Identify a user who previously had unintended access to sensitive content via oversharing
- After remediation, have the user query Copilot for content from the restricted site
- Verify Copilot does not return results from the restricted site
- Document the Copilot response
- Expected Result: Copilot only returns content the user has legitimate access to post-remediation
- Evidence: Copilot interaction log showing no results from restricted content
Evidence Collection
| Evidence Item |
Format |
Storage Location |
Retention |
| DSPM activation screenshot |
PNG/PDF |
Compliance evidence repository |
7 years |
| Oversharing assessment export |
CSV |
Compliance evidence repository |
7 years |
| Remediation log |
CSV |
Compliance evidence repository |
7 years |
| Alert notification records |
PDF |
Compliance evidence repository |
7 years |
| Copilot access validation results |
PDF |
Compliance evidence repository |
7 years |
Compliance Mapping
| Regulation |
Requirement |
How This Control Supports It |
| FINRA Rule 3110 |
Supervisory procedures for information access |
Oversharing detection supports compliance with information barrier requirements |
| SEC Regulation S-P |
Protection of customer information |
Detecting and remediating oversharing helps meet customer data protection obligations |
| GLBA Safeguards Rule |
Access controls for NPI |
Reduces risk of unauthorized access to non-public personal information |
| SOX Section 404 |
Internal controls over financial reporting |
Helps prevent unauthorized access to financial data through Copilot |