If Your Digital Bouncer Is Asleep, You’re in Trouble: 5 Conditional Access Rules You Need
Imagine you own an exclusive club. You've hired a bouncer, but instead of checking IDs or looking for dress code violations, he just sits on a stool...
7 min read
Justin Kirsch : Updated on February 23, 2026
In this article:
Your MSP keeps the lights on. Email works. The Wi-Fi stays connected. When someone forgets their password, they get it reset in a few hours. By most measures, they're doing their job.
Then your examiner arrives. They ask for your Conditional Access policy documentation. Your MSP doesn't know what that means. They ask how you're enforcing DLP rules to protect customer data. Your MSP set up antivirus and called it done. They ask about your incident response plan. Your MSP has a generic template they downloaded three years ago.
This is what happens when a financial institution hires a generic MSP. The day-to-day IT works fine. The compliance, security, and regulatory readiness doesn't exist. And you won't know it until an examiner, an auditor, or an attacker shows you.
Most managed service providers build their business around small and mid-size companies that need email, file sharing, and a help desk. Law firms, accounting practices, medical offices, construction companies. The core service is the same for all of them: set up Microsoft 365, deploy antivirus, manage the network, answer support tickets.
Financial institutions look like those companies from the outside. Same size, same software, same basic IT needs. So the MSP sells them the same package at the same price and assumes they're covered.
The gap shows up in three areas that generic MSPs don't have the expertise to address:
Microsoft 365 ships with powerful security and compliance features. Conditional Access, DLP, sensitivity labels, information barriers, retention policies, audit logging. Out of the box, almost none of these are turned on.
A generic MSP sets up mailboxes, configures basic MFA, and moves on. They don't create Conditional Access policies that block legacy authentication or restrict access from non-compliant devices. They don't configure DLP rules that prevent customer account numbers from being emailed to personal Gmail accounts. They don't set up sensitivity labels that automatically encrypt documents containing loan data.
The result: your examiner sees a Microsoft 365 environment with default security settings, and your institution gets findings. Not because you lack the technology, but because nobody configured it for financial services.
When your examiner asks how your IT controls align with the FFIEC cybersecurity maturity domains, your MSP should be able to answer. When your auditor asks which GLBA safeguards are implemented at the technical level, your MSP should produce a mapping document.
Generic MSPs work from their own service catalog, not your regulatory framework. They can tell you they installed antivirus on every endpoint. They can't tell you how that antivirus implementation satisfies the "cybersecurity controls" domain of the FFIEC CAT at the "evolving" maturity level. The gap between "we did IT stuff" and "here's how our IT work satisfies your compliance requirements" is where generic MSPs fail.
Most generic MSPs describe their security monitoring as "24/7" because they have a tool that collects logs. Collecting logs and actively monitoring for threats are two different things.
Financial institutions need active threat detection: real-time analysis of sign-in anomalies, impossible travel alerts, credential spray detection, unusual file access patterns on sensitive data stores. A generic MSP's monitoring typically catches obvious things like a server going offline. It doesn't catch an attacker who compromised a loan officer's credentials and is quietly exfiltrating borrower data through a personal OneDrive sync.
Every financial institution runs industry-specific software that generic MSPs have never touched:
These systems connect to Microsoft 365, to your network, and to each other. A misconfigured firewall rule can break wire transfers. A botched patch can take down your LOS. A security policy that's too restrictive can prevent tellers from processing transactions. Generic MSPs approach these systems cautiously at best and dangerously at worst, because they don't understand what they do or how they connect.
When a financial institution experiences a security incident, the response has dimensions that don't exist in other industries:
A generic MSP's incident response plan says "contain, eradicate, recover, notify." A financial services incident response plan specifies who gets notified at which regulator, in what order, within what timeframe, and what documentation must be preserved. If your MSP doesn't know the difference, you're exposed.
The cost of a generic MSP isn't the monthly invoice. It's what happens when the gaps they don't cover become problems:
The difference between a generic MSP and a financial services IT provider comes down to five things:
ABT has served over 750 financial institutions since 1999. The company was built specifically for regulated industries, not retrofitted for them.
Generic MSPs fail at financial services compliance because they build their services around general business IT needs, not regulatory requirements. They deploy Microsoft 365 with default security settings, lack experience with the FFIEC Cybersecurity Assessment Tool, cannot produce compliance documentation examiners require, and have no experience with core banking platforms or loan origination software.
An MSP serving financial institutions should hold SOC 2 Type II attestation at minimum, verifying their security controls work over a sustained period. Additional qualifications include Microsoft Cloud Solution Provider credentials, FFIEC cybersecurity assessment experience, GLBA Safeguards Rule familiarity, and incident response and business continuity plans meeting examiner standards.
Ask your current MSP three questions: Can you show me your SOC 2 Type II report? Can you describe how our IT controls map to the FFIEC cybersecurity maturity domains? Can you produce our compliance evidence package within 24 hours if our examiner requests it? If they cannot answer yes to all three, they are not operating at the level a financial institution requires.
A generic MSP provides standard IT management including email, help desk, antivirus, and network management. A financial services IT provider adds regulatory compliance support (FFIEC, GLBA, NCUA, OCC), configures Microsoft 365 for financial services security, maintains compliance documentation for examiners, understands core banking integrations, and carries certifications like SOC 2 Type II.
Some financial institutions split IT management between a local provider for hardware and on-site support and a specialized provider for security, compliance, and Microsoft 365 management. This can work if responsibilities are clearly documented and both providers coordinate on security policies. However, it introduces vendor management complexity, creates accountability gaps when security responsibilities overlap, and requires managing two vendor relationships for examiner reporting.
If you're not sure whether your current MSP is meeting financial services standards, the fastest way to find out is to test your environment against financial services benchmarks.
Imagine you own an exclusive club. You've hired a bouncer, but instead of checking IDs or looking for dress code violations, he just sits on a stool...
Remember when office security meant locking the front door at 5:00 PM? Those days are long gone. Today, your "office" is wherever your employees...
The Comforting Illusion of Security On a recent Monday morning, a mid-sized mortgage firm's IT director proudly reviewed his security dashboard. The...