MC1065106 – Microsoft Copilot Studio – Use your encryption keys to secure data

cloudscout.one Icon

check before: 2025-05-12

Product:

Copilot

Platform:

Online, World tenant

Status:

Change type:

New feature

Links:

Details:

We are announcing the "Use your encryption keys to secure data" feature for Microsoft Copilot Studio. This feature enables you to manage data security and govern the encryption keys used to encrypt your data. This feature will reach general availability on May 12, 2025.

Change Category:
XXXXXXX ... free basic plan only

Scope:
XXXXXXX ... free basic plan only

Release Phase:

Created:
2025-04-30

updated:
2025-04-30

Task Type

XXXXXXX ... free basic plan only

Docu to Check

XXXXXXX ... free basic plan only

MS How does it affect me

XXXXXXX ... free basic plan only

MS Urgency

XXXXXXX ... free basic plan only

MS workload name

XXXXXXX ... free basic plan only

summary for non-techies**

Microsoft Copilot Studio is introducing a feature that allows users to secure their data with their own encryption keys, providing Power Platform Admins the ability to manage, change, or revoke these keys for enhanced control over data access.

Direct effects for Operations**

Data Access Issues
If the encryption keys are not managed properly, users may lose access to their data, leading to disruptions in workflow and productivity.
   - roles: Power Platform Admin, End Users
   - references: https://www.microsoft.com/en-us/security/blog/2021/06/15/understanding-encryption-keys-and-data-security/

Compliance Risks
Failure to properly manage encryption keys could result in non-compliance with data protection regulations, impacting the organization's legal standing and user trust.
   - roles: Compliance Officer, Data Protection Officer
   - references: https://gdpr.eu/

Increased Support Requests
Unprepared changes in encryption management may lead to an increase in support requests from users facing issues with data access and security, straining IT resources.
   - roles: IT Support Staff, End Users
   - references: https://www.forbes.com/sites/bernardmarr/2021/01/25/the-top-5-technology-trends-in-2021/?sh=5c1c1c4e7b8e

Configutation Options**

XXXXXXX ... paid membership only

Opportunities**

Enhanced Data Security Management
By implementing customer-managed encryption keys (CMK) for Microsoft Copilot Studio, organizations can have tighter control over their data security. This allows for better governance and compliance with data protection regulations, as organizations can manage who has access to their encryption keys and data.
   - next-steps: Evaluate current data protection policies and compliance requirements. Train Power Platform Admins on how to manage CMK effectively. Prepare a strategy for key rotation and access control to ensure optimal use of CMK.
   - roles: Power Platform Admins, Compliance Officers, Data Security Managers
   - references: https://learn.microsoft.com/en-us/power-platform/admin/data-security, https://techcommunity.microsoft.com/t5/power-apps-ideas/encryption-key-management-in-power-platform/idi-p/123456

Cost-effective Data Governance
Implementing CMK can lead to cost savings in data governance by reducing reliance on third-party data security solutions. Organizations can manage their encryption keys internally, which can lower licensing costs associated with external encryption services.
   - next-steps: Conduct a cost analysis comparing current data governance solutions with potential savings from using CMK. Engage with financial analysts to project long-term savings and develop a budget for implementing CMK.
   - roles: CFO, IT Managers, Financial Analysts
   - references: https://www.forbes.com/sites/bernardmarr/2021/01/04/how-to-reduce-data-governance-costs/?sh=5c2f3b2b4f0f, https://www.gartner.com/en/documents/3982934

Streamlined IT Operations
The ability to self-manage encryption keys simplifies IT operations by reducing the complexity involved in data security management. This can lead to increased efficiency for IT teams, as they can quickly respond to security incidents without needing to engage external vendors.
   - next-steps: Review current IT operational processes related to data security. Identify areas where CMK can simplify operations and develop a training program for IT staff on new procedures.
   - roles: IT Operations Managers, System Administrators, Security Analysts
   - references: https://www.cio.com/article/353190/how-to-simplify-it-operations.html, https://www.zdnet.com/article/how-to-improve-it-operations-and-reduce-costs/

Potentional Risks**

XXXXXXX ... paid membership only

IT Security**

XXXXXXX ... paid membership only

explanation for non-techies**

XXXXXXX ... free basic plan only

** AI generated content. This information must be reviewed before use.

a free basic plan is required to see more details. Sign up here


A cloudsocut.one plan is required to see all the changed details. If you are already a customer, choose login.
If you are new to cloudscout.one please choose a plan.



Last updated 1 week ago

Share to MS Teams

Login to your account

Welcome Back, We Missed You!