주요 콘텐츠로 건너뛰기

Configure and Apply Agent Lifecycle Management

Implementation Effort: Medium – Requires defining lifecycle policies and applying them to agent instances, with cross-team coordination between security and agent owners for compliance reviews.
User Impact: Medium – Agents that fail compliance review may be blocked or deleted, affecting users who depend on them.

Overview

Agent lifecycle management combines two activities: configuring the policies that define how agents are governed over time, and applying those policies to individual agent instances through actions like blocking, deleting, or triggering compliance reviews. These are inseparable in practice — a lifecycle policy without enforcement is a document, and enforcement without a policy is ad-hoc decision-making.

Lifecycle policies define the rules agents must meet to remain active: what happens when an agent's owner leaves the organization, how long an inactive agent persists before automatic deactivation, what triggers a compliance review, and under what conditions an agent is blocked from interacting with users. The Microsoft 365 admin center provides controls to configure these policies at the tenant level, ensuring consistent treatment across all registered agents regardless of who built them or which department owns them.

Applying these policies means taking concrete action on agent instances. When an agent fails a compliance review, administrators block it from further user interactions. When an agent is identified as redundant or abandoned, they delete it from the registry. When an ownership change occurs, they reassign the agent and trigger a fresh review. This operational discipline supports Use Least Privilege Access by ensuring agents do not retain permissions indefinitely — inactive or non-compliant agents lose access rather than accumulating stale entitlements.

This activity also supports Assume Breach by reducing the attack surface over time. Every unmanaged agent instance is a potential entry point for threat actors — an abandoned agent with active permissions is particularly dangerous because no one is monitoring its behavior. Lifecycle management ensures the agent population stays current: only agents that meet governance requirements remain active, and the rest are deactivated or removed.

Without lifecycle management, agent populations grow monotonically. Agents are created but rarely retired, permissions accumulate but are not reviewed, and owners leave the organization without their agents being reassigned. This creates an expanding surface of unmonitored, over-privileged entities that threat actors can exploit.

Reference