MC1218747 – Power Apps – Content Security Policy enforcement for Power Apps code apps

Power Apps Icon

check before: 2026-01-26

Product:

Microsoft 365 admin center, Power Apps, Power Platform, SharePoint

Platform:

Online, World tenant

Status:

Change type:

Admin impact

Links:

Details:

Starting on January 26, 2026, we will introduce strict Content Security Policy (CSP) enforcement for Power Apps code apps (preview). CSP is a security feature that protects apps from malicious content by restricting which external sources an app can access.

Change Category:
XXXXXXX ... free basic plan only

Scope:
XXXXXXX ... free basic plan only

Release Phase:

Created:
2026-01-17

updated:
2026-01-17

Task Type

XXXXXXX ... free basic plan only

Docu to Check

XXXXXXX ... free basic plan only

MS How does it affect me

XXXXXXX ... free basic plan only

MS Preperations

XXXXXXX ... free basic plan only

MS Urgency

XXXXXXX ... free basic plan only

MS workload name

XXXXXXX ... free basic plan only

summary for non-techies**

XXXXXXX ... free basic plan only

Direct effects for Operations**

CSP Enforcement Impact
Power Apps code apps will block requests to external assets by default, potentially breaking functionality for users relying on those assets.
   - roles: Power Apps Developer, End User
   - references: https://aka.ms/13661Link1, https://aka.ms/13661Link2

User Experience Degradation
Users may experience degraded functionality or errors in apps that depend on external resources, leading to frustration and decreased productivity.
   - roles: End User, Business Analyst
   - references: https://aka.ms/13661Link3, https://aka.ms/13661Link4

Increased Support Requests
The change may lead to an increase in support requests as users encounter issues with app functionality, straining IT support resources.
   - roles: IT Support, Power Apps Developer
   - references: https://aka.ms/13661Link1, https://aka.ms/13661Link2

Configutation Options**

XXXXXXX ... paid membership only

Opportunities**

Enhanced Security Posture
Implementing strict Content Security Policy (CSP) will enhance the security of Power Apps by preventing unauthorized access to external assets, thereby reducing the risk of data breaches and malicious attacks.
   - next-steps: Assess current app dependencies on external assets and configure CSP settings accordingly. Regularly review and update the allowlist as necessary.
   - roles: IT Security Manager, Power Apps Developer, Compliance Officer
   - references: https://docs.microsoft.com/en-us/power-platform/admin/content-security-policy, https://aka.ms/13661Link1

Improved User Experience
By proactively configuring CSP and allowlisting necessary external sources, users will experience fewer disruptions and smoother functionality in their Power Apps, leading to increased productivity.
   - next-steps: Conduct user testing to identify essential external assets, and configure the CSP settings to ensure they are allowlisted before the enforcement date.
   - roles: Business Analyst, Power Apps Developer, End Users
   - references: https://docs.microsoft.com/en-us/power-platform/admin/content-security-policy, https://aka.ms/13661Link2

Operational Efficiency in IT Management
Utilizing the reporting feature of CSP can provide insights into which external assets are frequently accessed, allowing for better resource management and future planning of app functionalities.
   - next-steps: Enable the reporting setting in CSP to gather data on policy violations and access patterns, then analyze this data to inform future app development and security policies.
   - roles: IT Operations Manager, Data Analyst, Power Apps Developer
   - references: https://docs.microsoft.com/en-us/power-platform/admin/content-security-policy, https://aka.ms/13661Link3

Potentional Risks**

XXXXXXX ... paid membership only

IT Security**

XXXXXXX ... paid membership only

explanation for non-techies**

Starting January 26, 2026, Microsoft will introduce a new security feature called Content Security Policy (CSP) for Power Apps code apps. Think of CSP as a security guard for your app, ensuring that it only interacts with trusted sources. This means that after January 30, 2026, if your app tries to access content from outside the Power Apps environment, those requests will be blocked unless you have specifically allowed them.

Imagine your app is like a restaurant, and CSP is the bouncer at the door. The bouncer's job is to make sure only approved suppliers (external sources) can deliver ingredients (content) to your restaurant. If a supplier isn't on the approved list, the bouncer won't let them in, ensuring that only safe and trusted ingredients are used.

To prepare for this change, you can use the Power Platform admin center to manage which external sources your app can access. If your app is crucial for your business, it's a good idea to temporarily turn off the strict enforcement of CSP and enable a reporting feature. This will help you identify which external sources your app is trying to access, so you can add them to your approved list before the enforcement date.

Once you've identified and approved the necessary sources, you can turn the strict enforcement back on. If your app doesn't need to access external content or isn't critical to your business, you can leave the CSP enforcement on and use the reporting feature to monitor any potential issues.

For more detailed guidance, you can refer to Microsoft's resources or contact their support for assistance.

** AI generated content. This information must be reviewed before use.

a free basic plan is required to see more details. Sign up here


A cloudsocut.one plan is required to see all the changed details. If you are already a customer, choose login.
If you are new to cloudscout.one please choose a plan.



Leave a Reply

Share to MS Teams

Login to your account

Welcome Back, We Missed You!