11 min read
Microsoft 365 Security Audit Checklist for Community Banks
Microsoft 365 Security Audit Checklist for Community Banks Your community bank runs on Microsoft 365. Email, file sharing, Teams calls with loan...
9 min read
Justin Kirsch : Updated on March 3, 2026
Your community bank runs on Microsoft 365. Email, SharePoint, Teams, OneDrive. Every loan document, every board packet, every customer communication flows through it. But when OCC or FDIC examiners walk through your door, they are not asking whether you have Microsoft 365. They want to know how you configured it. And that distinction is where most community banks get caught.
GLBA compliance is not about buying the right software. It is about configuring the software you already own to meet specific regulatory requirements. The Gramm-Leach-Bliley Act Safeguards Rule, codified in 16 CFR Part 314, mandates that financial institutions implement administrative, technical, and physical controls to protect nonpublic personal information (NPI). For national banks, the OCC enforces these same standards through 12 CFR Part 30, Appendix B.
This article maps the specific Microsoft 365 configurations your community bank needs to satisfy GLBA and OCC examination requirements. No theory. No generalities. Configuration by configuration.
In This Article
The 2021 amendments to the FTC Safeguards Rule (effective June 2023) turned vague guidance into prescriptive requirements. While the FTC directly oversees non-bank financial institutions, banking regulators like the OCC and FDIC enforce equivalent standards through the Interagency Guidelines Establishing Information Security Standards.
Here is what your bank's information security program must include, and where Microsoft 365 fits into each requirement:
Someone must own your information security program. This person reports directly to the board at least annually on the program's status, risk assessments, and material incidents. If your bank outsources this role, the board remains responsible for oversight.
Annual risk assessments must identify internal and external threats to customer NPI across every system that stores, processes, or transmits it. Your Microsoft 365 tenant is one of those systems. The risk assessment needs to cover email (Exchange Online), file storage (SharePoint/OneDrive), collaboration (Teams), and identity management (Entra ID).
The Safeguards Rule requires multi-factor authentication for all users accessing customer information systems. Not just remote users. Not just admins. All users. In Microsoft 365 terms, that means Conditional Access policies enforcing MFA across every app and every sign-in scenario.
NPI must be encrypted both in transit and at rest. Microsoft 365 handles transport encryption by default (TLS 1.2+), but at-rest encryption requires proper configuration of sensitivity labels, BitLocker enforcement through Intune, and message encryption policies for outbound email containing sensitive data.
Annual penetration testing and semi-annual vulnerability assessments are now required. Your Microsoft 365 environment needs continuous monitoring through unified audit logs, sign-in logs, and anomaly detection in Microsoft Defender.
Your bank needs a written incident response plan. As of May 2024, the FTC requires non-bank financial institutions to report breaches affecting 500+ consumers within 30 days. Banking regulators have their own notification requirements under the Computer-Security Incident Notification Rule (effective April 2022), which requires banks to notify their primary regulator within 36 hours of a material security incident.
OCC examiners conduct IT assessments during every supervisory cycle. They use the FFIEC Uniform Rating System for Information Technology (URSIT) framework and the FFIEC IT Examination Handbook to evaluate your bank's ability to identify, measure, monitor, and control IT risks.
The OCC's FY2025 Bank Supervision Operating Plan lists operational resilience and cybersecurity as top priorities. Their examiners are specifically looking at:
The FFIEC sunset its Cybersecurity Assessment Tool (CAT) on August 31, 2025, after a decade of use. Banks that relied on the CAT for self-assessment must now map their controls to NIST Cybersecurity Framework 2.0, CIS Critical Security Controls, or equivalent frameworks. Examiners have shifted to risk-focused, institution-specific evaluations rather than standardized checklists. If your bank has not updated its cybersecurity self-assessment methodology since the CAT retirement, your next examination will be uncomfortable.
Examiners rate IT controls as strong, satisfactory, or weak. Deficiencies result in Matters Requiring Attention (MRAs) or, in serious cases, formal enforcement actions including cease-and-desist orders and civil money penalties. The OCC published 12 formal enforcement actions in October 2025 alone.
Here are the specific Microsoft 365 settings that map directly to GLBA and OCC requirements. This is not a feature tour. These are the configurations your examiner will ask about.
Conditional Access is the enforcement engine for your identity and access management program. You need, at minimum:
Every device accessing customer NPI needs to be enrolled, configured, and monitored. Key policies:
Examiners check your email authentication stack because phishing remains the top attack vector against financial institutions:
p=reject (not p=none) with aggregate reporting enabledDefender for Office 365, Defender for Endpoint, and Defender for Identity form your detection and response layer:
These three Purview features are where GLBA compliance either holds together or falls apart. Examiners specifically look for evidence that you can control data flow, retain records, and produce them on request.
Purview includes a built-in GLBA DLP template that detects financial data patterns including account numbers, credit card numbers, and Social Security numbers. Start there, then customize:
"The OCC uses a risk-based supervision process focused on evaluating banks' risk management, identifying material and emerging concerns, and requiring banks to take corrective action when warranted."
OCC Cybersecurity and Financial System Resilience Report, July 2025GLBA does not specify a single retention period, but your bank's record retention schedule (often dictated by state law, OCC guidance, and internal policy) typically requires:
When examiners request records, or when your bank faces litigation, you need to produce relevant communications and documents quickly:
After configuring Microsoft 365 environments for 750+ financial institutions over 25 years, we see the same gaps repeatedly. These are the configurations that trip up community banks during OCC and FDIC examinations.
The most common finding: MFA enforced for most users, but service accounts, break-glass accounts, or specific executive accounts exempted. Examiners check the Conditional Access policy report. Every exception needs documented justification, compensating controls, and regular review.
Legacy protocols (POP3, IMAP, SMTP AUTH) bypass MFA entirely. If any of these protocols are enabled in your tenant, your MFA deployment is incomplete. Block them in Conditional Access and migrate any remaining dependencies.
Some banks never enabled unified audit logging, or enabled it but kept the default 90-day retention. Examiners expect at least 1 year of searchable audit data. Without it, you cannot demonstrate continuous monitoring or investigate incidents that were not discovered immediately.
Deploying DLP policies in audit-only mode is a reasonable starting point, but leaving them there for months (or years) signals to examiners that data loss prevention is not a priority. Policies should move from audit to enforcement within 30-60 days of deployment.
Default SharePoint sharing settings allow external sharing with "Anyone" links. For a bank handling NPI, this needs to be restricted to "Specific people" or "Existing guests" at minimum. Many banks we audit have never changed the default.
Without sensitivity labels, your bank has no systematic way to classify and protect NPI. Examiners increasingly expect to see data classification as part of the information security program. Labels tie directly into DLP enforcement, encryption, and access controls.
Passing an OCC or FDIC IT examination is not about checking boxes the week before examiners arrive. It is about building a tenant configuration that generates its own evidence of compliance, continuously.
Every configuration listed in this article should produce auditable evidence:
Create a control mapping document that links each M365 configuration to the specific GLBA section, OCC guideline, or FFIEC handbook reference it satisfies. Microsoft Compliance Manager includes a GLBA assessment template that provides a starting framework, but customize it to your bank's specific risk profile and examiner expectations.
Run your own tabletop exercises quarterly. Can your team:
If the answer to any of these is "not sure," you have work to do before your next examination.
ABT has configured GLBA-compliant M365 environments for 750+ financial institutions. Our Security Grade Assessment evaluates your tenant against the exact controls OCC and FDIC examiners check.
Get Your Security GradeNo. Microsoft 365 provides the tools for GLBA compliance, but the default tenant configuration does not satisfy regulatory requirements. You must configure Conditional Access, DLP policies, retention policies, sensitivity labels, and audit logging specifically for your institution's compliance obligations.
Microsoft 365 Business Premium is the minimum tier for most community banks. It includes Conditional Access, Intune, Defender for Office 365, and basic DLP. Banks needing advanced eDiscovery, 10-year audit log retention, or insider risk management should evaluate E5 licensing or compliance add-ons.
The OCC typically issues Matters Requiring Attention with specific remediation timelines. Repeated or serious deficiencies can escalate to formal enforcement actions including cease-and-desist orders and civil money penalties. The OCC conducts periodic follow-up to verify your bank has corrected identified deficiencies.
GLBA itself does not mandate a specific email retention period. However, OCC examination standards and state banking regulations typically require 6 to 7 years for correspondence related to customer accounts. Your bank's record retention policy should define periods by content category, enforced through Microsoft Purview retention policies.
Most community banks do not need GCC or GCC High for GLBA compliance. Standard commercial Microsoft 365 with proper configuration meets GLBA requirements. GCC High is designed for organizations handling CUI under ITAR or CMMC requirements, which is a different compliance framework than GLBA.
The FFIEC Cybersecurity Assessment Tool was retired on August 31, 2025. Banks should transition their self-assessment methodology to NIST Cybersecurity Framework 2.0 or CIS Critical Security Controls. Microsoft Compliance Manager provides built-in assessment templates for NIST CSF that can replace the CAT for evaluating your M365 environment.

CEO, Access Business Technologies
Justin Kirsch has spent over two decades configuring Microsoft 365 environments to satisfy GLBA, OCC, and federal banking examination requirements. As CEO of Access Business Technologies, he works directly with community bank executives to build compliance-ready infrastructure that examiners approve on the first pass.
11 min read
Microsoft 365 Security Audit Checklist for Community Banks Your community bank runs on Microsoft 365. Email, file sharing, Teams calls with loan...
10 min read
In this article: Why Community Banks Need Specialized IT FFIEC, GLBA, and OCC: The Regulatory Stack What Your Managed IT Provider Must Deliver
11 min read
Your credit union runs Microsoft 365. Your IT team configured it when you migrated. But when was the last time anyone verified those...