This is an HTML version of an attachment to the Freedom of Information request 'FOI Disclosure Log - FOI 24/25-1356'.












FOI 24/25-1356 - DISCLOSURE LOG
OFFICIAL
System State
The Microsoft Copilot trial will enable NDIA to use the existing NDIA Operating environment 
to add the Microsoft Copilot 365 features. 
The following diagram Figure 1- Microsoft Copilot Architecture provides a high-level 
overview of the proposed Microsoft 365 service boundary
Diagram 1: Microsoft Copilot Architecture 
Steps of data flow:
1. The user enters a prompt or query.
2. Microsoft Copilot preprocess the prompt through an approach called grounding. 
3. Microsoft Copilot sends modified prompt to Large Language Model (LLM)
4. Microsoft Copilot receives the LLM response.
5. Microsoft Copilot access Microsoft Graph for compliance and purview. 
Access Management:
Data Protection: 
As per the information pack, Microsoft has confirmed that:
• Copilot for Microsoft 365 doesn’t store NDIA data outside of NDIA Azure tenancy.
• Copilot doesn’t train the LLM (the GPT AI engine of Copilot) with customer data.
• Unlike public generative AI tools, Microsoft Copilot is a paid product, designed to 
meet the needs of Australian Government Security Standards.
4
OFFICIAL
Page 6 of 189

FOI 24/25-1356 - DISCLOSURE LOG
OFFICIAL
Microsoft employs a permission model that prevents unintended data leaks between users, 
groups, and tenants. Microsoft Copilot 365 operates within the same access controls used 
by the other MS 365 services, ensuring it only uses data accessible to authorised staff.
The Semantic index adheres to the user identity-based access boundary, ensuring that its 
process only access content authorised for the current user.
Logical isolation2 of customer content within each tenant is implemented via Azure Active 
Directory authorisation and role- based access control.
Microsoft Copilot uses Azure OpenAI services for processing, not OpenAI’s publicly 
available services.
Encryption:  Microsoft Copilot encrypts3 data at rest and in transit. 
For customer data at rest, Microsoft Azure uses Bitlocker, Azure Storage Service Encryption, 
Distributed Key Manager (DKM) and Microsoft 365 service encryption. Microsoft utilises 256-
bit AES encryption to encrypt data at rest. 
For customer data in transit, Microsoft uses Transport Layer Security (TLS) 1.2 and Internet 
Protocol Security (IPsec) between user devices and Microsoft datacentres.
Information Overview:  Data used by this CoPilot will consist of NDIA data stored within the 
existing Microsoft 365 tenancy. CoPilot will apply the current access control and permissions 
that are in place within the existing NDIA data stores. CoPilot will not have access to PACE 
and will only process participant data that is stored in SharePoint.
Security and Compliance:
As per the information pack, Microsoft has confirmed that Copilot for Microsoft 365 and the 
Azure platform are both in the final stages of IRAP assessment with anticipated publication 
in January 2024.  Both Copilot for Microsoft 365 and Azure Open AI Service (the large 
language model (LLM) host platform) are in scope for the current IRAP assessments. The 
IRAP report will provide the technical assessment of the entire MS 365 products (including 
Copilot) against the Australian Signals Directorate’s (ASD) Information Security Manual 
(ISM).
Microsoft has mapped Australian Government Standards into their own security control set, 
including the ISM at PROTECTED, the Australian Privacy Principles (APP) and the PSPF. 
2 https://learn.microsoft.com/en-us/compliance/assurance/assurance-microsoft-365-isolation-controls
3 Encryption in the Microsoft Cloud | Microsoft Learn
5
OFFICIAL
Page 7 of 189

FOI 24/25-1356 - DISCLOSURE LOG
OFFICIAL
Risk Analysis
All assessment of must consider four critical aspects when determining ICT risk:
• The ASSET you are assessing.
• The THREAT environment for the NDIA and against the ASSET specifically
• The LIKELIHOOD of the THREAT being successful, and
• The CONSEQUENCE on the ASSET and the wider NDIA of a successful THREAT 
outcome.
Assets
Asset
Asset Type
Asset Criticality
 NDIA Participant Data
Information-PII
Critical 
NDIA Reputation
Intangible 
High
Table 5. Assets in relation to the product
OFFICIAL
Page 8 of 189

FOI 24/25-1356 - DISCLOSURE LOG
OFFICIAL
Threat Actors
Threat
Level of Threat
Malicious Insider
Medium
Trusted Insider
Medium
Table 6. Threat actors in relation to the product
Risk from Design
 R1: Unauthorised Data Access: 
Associated to NDIA R5:
With elevated or misconfigured permissions, NDIA users may access a wide array of 
sensitive participant information. Misuse of the user access through Microsoft Copilot might 
lead to the unauthorised retrieval or viewing of confidential data beyond their intended 
scope, potentially violating confidentiality of information. 
R2: Improper use of Output
Associated to NDIA R5 &R2
Generative tools can produce output that is inaccurate or biased. Before sharing the 
information, NDIA users must validate the output fairly and accurately reflects the data.
Misuse or mishandling of Microsoft Copilot may result in unintentional sharing of NDIA 
participant information. Inaccurate outputs or accidental sharing of data generated through 
Microsoft Copilot might lead to the access of confidential details to unauthorised parties.
R3: Instability in Environment: 
Associated to NDIA R6
The integration of Microsoft Copilot might introduce instability within the NDIA environment, 
potentially causing disruptions or inconsistencies in the system’s functionality. 
Australian Government Security Framework (AGSF) 
Implications
The following are the relevant impacted areas from the Australian Government Information 
Security Manual with the implementation of the reporting functionality:
Guidelines
ISM Controls 
Access to Systems 
ISM- 1648: Privileged access to systems and 
applications is disabled after 45 days of inactivity.
ISM- 0407: A secure record is maintained for the life 
of each system covering the following for each user.
ISM-1865: Personnel agree to abide by usage 
policies associated with a system and its resources 
before being granted access to the system and its 
resources.
ISM – 0435:  Personnel receive any necessary 
briefings before being granted access to a system 
and its resources.
OFFICIAL
Page 9 of 189

FOI 24/25-1356 - DISCLOSURE LOG
OFFICIAL
 
Data Transfers
ISM- 0661: Users transferring data to and from 
systems are held accountable for data transfers they 
perform.
OFFICIAL
Page 10 of 189

FOI 24/25-1356 - DISCLOSURE LOG
OFFICIAL
Inherent Risk Rating
Proposed 
Associated 
Likelihood
Consequences
Rating
Risk
Treatment
Threats
R1
T1, T2, T3
TE1, TE2, 
3
A
LOW
R2
T1, T2, T3
TE4, TE5, 
2
B
LOW
R3
T4
TE7, TE8
1
C
MEDIUM
Table 7. Inherent risk rating
Overall Risk Rating
Likelihood 3 - POSSIBLE
Consequence C - MODERATE
Rating MEDIUM
Identified Treatments
Treatment
Associated 
Proposed Treatment
Implement Date
ID No.
NDIA Risks
T1
Process to manage 
R1, R2
End of January 2024
information exposure 
incidents.
CoPilot will make use of data 
that users have existing 
permissions to. This will have 
the potential to highlight issues 
where excessive permissions 
may exists. A process is to be 
developed that will provide 
users of the trial an avenue to 
report any incorrect or 
excessive permissions to data 
that are highlighted by CoPilot
T2
Restriction on any direct 
R1, R2
End of January 2024
import of participant data
For the duration of the trial a 
restriction is placed upon any of 
processing or importing of large 
volumes of participant data
T3
CoPilot User Awareness 
R1, R2
End of January
Training
All users participating in the trail 
are to undertake awareness 
training specifically on issues 
relating to the usage of CoPilot 
functions within a business 
context
T4
Incident Disengagement Plan
R3
End of January
A plan is to be developed to 
provide a process where 
disengagement of CoPilot can 
be undertaken in the event that 
security or performance issues 
is introduced into the NDIA 
environment
Table 8. Identified Treatments
OFFICIAL
Page 11 of 189

FOI 24/25-1356 - DISCLOSURE LOG
OFFICIAL
Residual Risk Rating
Likelihood 2 - UNLIKELY
Consequence B - MINOR
Rating LOW
Recommendation/s
☒  ATO
☐  ATO with Conditions
Length of ATO with Conditions: 
☐  NOT RECOMMENDED
Justification of Recommendation
Based upon the identified risks and on the understanding that the CoPilot system has successfully 
undergone an IRAP assessment with no adverse findings, the level of risk to the NDIA is assessed as 
LOW
It is recommended granting an Authority to Operate (ATO) for the period of the trial outlined above. 
OFFICIAL
Page 12 of 189

FOI 24/25-1356 - DISCLOSURE LOG
OFFICIAL
OFFICIAL
Page 13 of 189

FOI 24/25-1356 - DISCLOSURE LOG
OFFICIAL
CYBER USE ONLY
System Owner Notified:
☐  YES
☐ 
NO
Detail:
ATO Register Updated:                                             ☐  YES
☐ 
NO
Detail:
Cyber Risk Register Updated:
☐  YES
☐ 
NO
Detail:
OFFICIAL
Page 14 of 189

FOI 24/25-1356 - DISCLOSURE LOG
OFFICIAL
Risk Assessment Guidance & Matrices
Threat Sources
No. 
Threat Source 
Description 
TS1 
Malicious 
NDIA end users or privileged users that seek to exploit vulnerabilities in 
Insider 
NDIA’s information systems and networks. 
TS2 
External 
Individuals, groups and organisations or nation states that seek to exploit 
Attacker 
vulnerabilities in NDIA’s information systems and networks. 
TS3 
Trusted Insider  NDIA’s end users or privileged users, erroneous actions taken by whom 
in the course of their everyday responsibilities exposes vulnerabilities in 
NDIA’s information systems and networks. 
TS4 
Structural 
Failures of equipment or software due to aging, poor design, resource 
depletion or other circumstances which exceed operating parameters. 
TS5 
Environmental  Natural disasters and failure of critical infrastructure on which NDIA’s 
information systems and networks depend but which are outside of 
controls of NDIA’s management. 
Table 3. Threat sources
Threat Events
No. 
Threat Event 
Threat Source 
TE1 
Malicious Insider deliberately allows or facilitates unauthorised access to  TS1 and TS2 
information by unauthorised entities. 
TE2 
Trusted Insider accidentally allows or facilitates unauthorised access to  TS3 
information by unauthorised entities. 
TE3 
External Attacker conducts targeted or untargeted activities to discover,  TS2 
reveal, exfiltrate or capture information that has not been publicly 
released. 
TE4 
Malicious Insider deliberately misuses their access or allows or facilitates TS1 and TS2 
unauthorised access to data, facilities or systems by unauthorised 
entities, resulting in their corruption or reliability coming into question.  
TE5 
Trusted Insider accidentally allows or facilitates unauthorised access to  TS3 
systems, processes or information by unauthorised entities, resulting in 
their corruption or reliability coming into question.  
TE6 
External attacker conducts targeted or untargeted activities to influence  TS2 
processing through injecting data, malicious code or configuration 
information or creating deception or deleting data.  
TE7 
Malicious Insider deliberately misuses their access or allows or facilitates TS1 and TS2 
unauthorised access to data, facilities or systems by unauthorised 
entities, to disrupt, damage or destroy.  
TE8 
Trusted Insider accidently allows or facilitates systems, processes or 
TS3 
information to be disrupted, damaged or destroyed.
 
TE9 
External Attacker conducts targeted or untargeted activities to disrupt 
TS2 
processing through denial of service injecting data, malicious code or 
configuration information or deleting data.  
Table 4. Threat events
Threat Level
The threat level for ICT is published on the GRC Confluence Page.  This is reflected in the 
Enterprise Risk Assessment and the Protective Security Risk Review.  The Threat Level will 
be reviewed Quarterly in line with Risk Reporting.
When calculating the Likelihood, it is essential to understand and incorporate the threat and 
threat level for planning purposes.
OFFICIAL
Page 15 of 189



FOI 24/25-1356 - DISCLOSURE LOG
OFFICIAL

unavailable or  Possible political  impact on 
$500,000 
degraded for 
referral
the 
whichever 
4 – 8 hours 
Corporate 
is less
Loss of 
Plan or ICT 
confidence by 
Strategy
CEO/ELT
D
Major
41 – 60% 
=> 1000 but 
Critical 
Significant 
Will disrupt 
TCO or 
<=10,000 
services 
Media Attention
the 
$500,001 
Participants/NDIA  unavailable or 
Corporate 
to $1M or 
Users impacted
degraded for 
Potential Loss of  Plan or ICT 
whichever 
1 business 
Confidence by 
Strategy
is less
day 
Minister
Potential Loss of 
Confidence by 
participants
Potential Loss of 
Public 
confidence
Loss of 
Confidence by 
the Board
E
Extreme
=>61% 
>10,000 
Critical 
Significant 
May require 
TCO 
Participants 
services 
Media Attention
adjustment 
or >$1M 
impacted/NDIA 
unavailable or 
of the ICT 
whichever  Users impacted
degraded 
Loss of 
Strategy or 
is less
for > 1 
Confidence by 
could require 
business day  Minister
advice to the 
Minister on 
Loss of 
the 
Confidence by 
Corporate 
participants
Plan
Loss of Public 
confidence
Table 7. Consequences ratings
Risk Heat Map
Likelihood
Consequence
1
2
3
4
5
E
E/1
E/2
E/3
E/4
E/5
D
D/1
D/2
D/3
D/4
D/5
C
C/1
C/2
C/3
C/4
C/5
B
B/1
B/2
B/3
B/4
B/5
A
A/1
A/2
A/3
A/4
A/5
Risk Level
LOW
MEDIUM
HIGH
CRITICAL
Table 8. Risk heat map
OFFICIAL
Page 17 of 189

FOI 24/25-1356 - DISCLOSURE LOG
OFFICIAL
OFFICIAL
Page 18 of 189













OFFICIAL
FOI 24/25-1356 - DISCLOSURE LOG
the primary production tenancy of participating agencies which has been available 
for deployment since January 2024.
What were the Minimum requirements for trial participation?
The terms and minimum commitment for trial participation are an Agency commitment of:
• 300 Copilot for Microsoft 365 licences from agencies with 2,000 Microsoft 365
Qualified Users or more; or
• The greater of 15% of users or 10 Copilot for Microsoft 365 licences for agencies
with fewer than 2,000 Microsoft 365 Qualified Users
• Commitment for the term of trial.
The overall benefit from Copilot for Microsoft 365 will be impacted by how heavily invested 
agencies are in their usage of Microsoft 365. 
Agencies may opt to extend the term of their Copilot for Microsoft 365 licences after the 
trial for a further 12 months. The DTA will be contacting agencies with more information 
about extending their commitments as part of the annual licence reconciliation process.
Key steps and timeline
OFFICIAL
Page 24 of 189


OFFICIAL
FOI 24/25-1356 - DISCLOSURE LOG
Training and Support
• The DTA and Microsoft will be working with participating agencies to support them,
through onboarding and readiness workshops, and additional training.
• Readiness workshops and training will be at no extra cost to agencies.
• An information pack containing FAQs addressing whole-of-government guardrails,
possible use cases, evaluation approach and other information about the trial will be
provided to trial participants early in the trial process.
Useful information
The following resources have been developed to assist implementing AI in the APS
Interim guidance on government use of public generative AI tools | aga (digital.gov.au)
Australia’s AI Ethics Principles | Australia’s Artificial Intelligence Ethics Framework - 
Department of Industry, Science and Resources
How might artificial intelligence affect the trustworthiness of public service delivery  - 
PM&C (pmc.gov.au)
Product information
Copilot for Microsoft 365
Microsoft Copilot Copyright Commitment Security Information
Data, Privacy, and Security for Copilot for Microsoft 365
Microsoft Purview data security and compliance protections for Microsoft Copilot
Support and Feedback on the trial
The NDIA project team responsible for conducting the trial can be contacted via: 
s47E(d) - certain operations of agencies  
OFFICIAL
Page 25 of 189