check before: 2025-05-12
Product:
Copilot
Platform:
Online, World tenant
Status:
Change type:
New feature
Links:

Details:
We are announcing the "Use your encryption keys to secure data" feature for Microsoft Copilot Studio. This feature enables you to manage data security and govern the encryption keys used to encrypt your data. This feature will reach general availability on May 12, 2025.
Change Category:
XXXXXXX ... free basic plan only
Scope:
XXXXXXX ... free basic plan only
Release Phase:
Created:
2025-04-30
updated:
2025-04-30
Task Type
XXXXXXX ... free basic plan only
Docu to Check
XXXXXXX ... free basic plan only
MS How does it affect me
XXXXXXX ... free basic plan only
MS Urgency
XXXXXXX ... free basic plan only
MS workload name
XXXXXXX ... free basic plan only
summary for non-techies**
Microsoft Copilot Studio is introducing a feature that allows users to secure their data with their own encryption keys, providing Power Platform Admins the ability to manage, change, or revoke these keys for enhanced control over data access.
Direct effects for Operations**
Data Access Issues
If the encryption keys are not managed properly, users may lose access to their data, leading to disruptions in workflow and productivity.
- roles: Power Platform Admin, End Users
- references: https://www.microsoft.com/en-us/security/blog/2021/06/15/understanding-encryption-keys-and-data-security/
Compliance Risks
Failure to properly manage encryption keys could result in non-compliance with data protection regulations, impacting the organization's legal standing and user trust.
- roles: Compliance Officer, Data Protection Officer
- references: https://gdpr.eu/
Increased Support Requests
Unprepared changes in encryption management may lead to an increase in support requests from users facing issues with data access and security, straining IT resources.
- roles: IT Support Staff, End Users
- references: https://www.forbes.com/sites/bernardmarr/2021/01/25/the-top-5-technology-trends-in-2021/?sh=5c1c1c4e7b8e
Configutation Options**
XXXXXXX ... paid membership only
Opportunities**
Enhanced Data Security Management
By implementing customer-managed encryption keys (CMK) for Microsoft Copilot Studio, organizations can have tighter control over their data security. This allows for better governance and compliance with data protection regulations, as organizations can manage who has access to their encryption keys and data.
- next-steps: Evaluate current data protection policies and compliance requirements. Train Power Platform Admins on how to manage CMK effectively. Prepare a strategy for key rotation and access control to ensure optimal use of CMK.
- roles: Power Platform Admins, Compliance Officers, Data Security Managers
- references: https://learn.microsoft.com/en-us/power-platform/admin/data-security, https://techcommunity.microsoft.com/t5/power-apps-ideas/encryption-key-management-in-power-platform/idi-p/123456
Cost-effective Data Governance
Implementing CMK can lead to cost savings in data governance by reducing reliance on third-party data security solutions. Organizations can manage their encryption keys internally, which can lower licensing costs associated with external encryption services.
- next-steps: Conduct a cost analysis comparing current data governance solutions with potential savings from using CMK. Engage with financial analysts to project long-term savings and develop a budget for implementing CMK.
- roles: CFO, IT Managers, Financial Analysts
- references: https://www.forbes.com/sites/bernardmarr/2021/01/04/how-to-reduce-data-governance-costs/?sh=5c2f3b2b4f0f, https://www.gartner.com/en/documents/3982934
Streamlined IT Operations
The ability to self-manage encryption keys simplifies IT operations by reducing the complexity involved in data security management. This can lead to increased efficiency for IT teams, as they can quickly respond to security incidents without needing to engage external vendors.
- next-steps: Review current IT operational processes related to data security. Identify areas where CMK can simplify operations and develop a training program for IT staff on new procedures.
- roles: IT Operations Managers, System Administrators, Security Analysts
- references: https://www.cio.com/article/353190/how-to-simplify-it-operations.html, https://www.zdnet.com/article/how-to-improve-it-operations-and-reduce-costs/
Potentional Risks**
XXXXXXX ... paid membership only
IT Security**
XXXXXXX ... paid membership only
explanation for non-techies**
XXXXXXX ... free basic plan only
** AI generated content. This information must be reviewed before use.
a free basic plan is required to see more details. Sign up here
A cloudsocut.one plan is required to see all the changed details. If you are already a customer, choose login.
If you are new to cloudscout.one please choose a plan.
Last updated 1 week ago