Information Barriers
Configure policies that restrict communication and collaboration between specific groups of users. Information barriers help prevent conflicts of interest, protect confidential information, and maintain regulatory compliance in financial services, legal, and other regulated industries.
Note: Information Barriers requires Microsoft 365 E5, Microsoft 365 E5 Compliance, or Office 365 E5 licensing for affected users.
How Information Barriers Work
Information barriers enforce communication restrictions across Microsoft 365:
Microsoft Teams
- Block 1:1 and group chats
- Prevent adding to teams/channels
- Block calls and meetings
SharePoint and OneDrive
- Block file sharing between segments
- Prevent site membership
- Restrict access to sites
Exchange Online
- Block email communication
- Hide from global address list
- Prevent calendar sharing
People Discovery
- Remove from people search
- Hide from org chart
- Block profile viewing
Segments
What are Segments?
Segments are groups of users defined by attributes like department, location, or custom attributes. Users can belong to only one segment. Segments are used as the building blocks for information barrier policies.
Segment Attributes
Define segments using these Azure AD/Entra ID attributes:
- Department — HR, Sales, Legal, etc.
- Job Title — Based on title attribute
- Member Of — Security group membership
- Office — Physical office location
- Company — Company name attribute
- Custom Attribute — ExtensionAttribute 1-15
Policies
Block Policy
Prevents communication between two segments. Users in Segment A cannot communicate with users in Segment B, and vice versa.
Example: Investment Banking cannot communicate with Research Analysts
Allow Policy
Explicitly allows communication between two segments. Use when you have a block policy but need exceptions.
Example: Compliance can communicate with all segments
Policy Combinations
Policies work in combination. Common patterns:
- Chinese Wall — Block between competing departments (e.g., M&A and Sales)
- Ethical Wall — Block between research and investment teams
- Hub and Spoke — Central team (Compliance) can talk to all, others are blocked
Creating Policies
- Define Segments — Create segments based on user attributes. Ensure users are properly categorized in Azure AD.
- Create Policies — Define block or allow rules between segments. Each policy has a source segment and target segments.
- Validate Configuration — Review the policy matrix to ensure no unintended blocking. Check for users not covered by any segment.
- Apply Policies — Start policy application. Takes up to 24 hours to fully apply across all Microsoft 365 services.
- Monitor and Adjust — Review audit logs for policy impacts. Address user complaints about blocked communications.
Policy Matrix
The policy matrix shows communication allowance between all segments:
| Sales | Research | Banking | Compliance | |
|---|---|---|---|---|
| Sales | Allowed | Blocked | Allowed | Allowed |
| Research | Blocked | Allowed | Blocked | Allowed |
| Banking | Allowed | Blocked | Allowed | Allowed |
| Compliance | Allowed | Allowed | Allowed | Allowed |
Use Cases
Financial Services (Chinese Wall)
Separate investment banking, trading, and research teams to prevent insider trading and conflicts of interest. Required by SEC and FINRA.
Legal (Matter Walls)
Separate legal teams working on opposing sides of a matter. Prevent inadvertent disclosure of privileged information.
Education (FERPA)
Separate student records access. Prevent staff from accessing records they don’t need for their role.
Government (Classification)
Separate users with different security clearances. Prevent communication of classified information.
Best Practices
- Plan segments carefully — Ensure Azure AD attributes are accurate before creating segments.
- Start with a pilot — Test policies with a small group before organization-wide deployment.
- Cover all users — Ensure every user belongs to exactly one segment to avoid gaps.
- Document business justification — Keep records of why each policy exists for audit purposes.
API Reference
GET /api/security/info-barriers/segments— List all segmentsGET /api/security/info-barriers/policies— List all information barrier policiesPOST /api/security/info-barriers/segments— Create a new segmentPOST /api/security/info-barriers/policies— Create a new policyPOST /api/security/info-barriers/apply— Apply policy changes