Episode Details

Back to Episodes
How Copilot, Power Automate, and Graph Permissions Quietly Expand Your Attack Surface

How Copilot, Power Automate, and Graph Permissions Quietly Expand Your Attack Surface

Season 1 Published 4 months, 1 week ago
Description
(00:00:00) The Shadow in the Machine
(00:00:24) The Rise of Shadow Agents
(00:00:31) The Mess We've Created
(00:01:09) The Hidden Dangers of Unmanaged Agents
(00:02:01) The True Cost of Shadow Data
(00:04:00) The Case for Governed Agents
(00:07:05) The Real-World Impact of Poor Agent Management
(00:10:39) The Blueprint for Governed Agents
(00:10:48) The Importance of Identity and Least Privilege
(00:12:17) Data Protection and Monitoring

Shadow IT didn’t die — it automated. Your “helpful” AI agents are quietly moving data like interns with keys to the vault while you assume Purview, Entra, and Copilot Studio have you covered. Spoiler: they don’t. In this episode of m365.fm, Mirko Peters exposes how agents become Shadow IT 2.0, why delegated Graph permissions blow open your attack surface, and how to redesign your governance before something breaks silently at 2 a.m. Stay to the end for a single policy map that cuts agent blast radius in half — and a risk scoring rubric you can deploy this month.

THE MESS: HOW AGENTS BECOME SHADOW IT 2.0

Business urgency meets IT backlog, and the result is bots stitched together with broad Graph scopes and “temporary” exceptions that never get cleaned up. Agents impersonate humans, bypass conditional access, and run with rights no one remembers granting. Browser-based tools and MCP bridges create hidden exfiltration paths your legacy allowlist never sees. Overshared SharePoint data fuels “leakage by summarization,” and third‑party endpoints mask destinations, leaving you blind in an incident. The outcome is autonomous smuggling tunnels disguised as productivity.

THE CASE FOR AGENTS (WHEN THEY’RE BUILT RIGHT)

Agents are not the enemy — unmanaged freedom is. Done correctly, agents crush toil and stay inside guardrails:
  • They have narrow scope, clear triggers, and explicit missions.
  • They run under dedicated Entra Agent IDs, never human identities.
  • They operate only on labeled data with Purview DLP enforcing the boundaries.
  • They are monitored with runtime visibility through Global Secure Access and SIEM.
  • They live inside solution-aware Power Automate environments with proper ALM.
In that world, agents behave like reliable junior staff: fast, predictable, auditable.

THE CASE AGAINST AGENTS (HOW THEY BREAK IN REAL LIFE)

In the real tenant, things look different:
  • Delegated Graph quietly turns into effective tenant‑wide read.
  • Shadow data in old SharePoint sites surfaces through Copilot grounding.
  • Unmanaged browsers bypass your DLP completely.
  • Zombie flows run under departed users with no owner.
  • Third‑party connectors hide data egress and kill investigations.
  • No access reviews means identity drift across agents and flows.
Every one of these expands your blast radius — silently and cumulatively.

REFERENCE ARCHITECTURE: GOVERNED AGENTS ON MICROSOFT 365

Mirko lays out a concrete reference architecture so agents become infrastructure, not shadow IT:Identity
  • Every agent gets an Entra Agent ID, never a shared “service user.”
  • Permissions follow blueprint-based templates by agent type.
  • Conditional Access rules per agent category (interactive, backgro
Listen Now

Love PodBriefly?

If you like Podbriefly.com, please consider donating to support the ongoing development.

Support Us