9 min read
Managed IT Services for Community Banks: What to Look for in a Provider
In this article: Why Community Banks Need Specialized IT FFIEC, GLBA, and OCC: The Regulatory Stack What Your Managed IT Provider Must Deliver ...
7 min read
Justin Kirsch : Updated on February 27, 2026
In this article:
In February 2026, Marquis Software Solutions filed a federal lawsuit against SonicWall. Marquis builds compliance software for over 700 banks and credit unions. In August 2025, attackers breached Marquis through a vulnerability that SonicWall introduced into its own cloud backup system. The firewall was patched. MFA was enabled. None of it mattered. Eighty financial institutions affected. Over 824,000 consumers exposed.
According to the NCUA's own data, 73 percent of credit union cyber incidents trace back to third-party vendors. And the NCUA's response to that number? Six rounds of deregulation proposals in 11 weeks — including pulling cybersecurity guidance out of the Code of Federal Regulations and removing the requirement for written vendor contracts.
The National Credit Union Administration (NCUA) — the federal agency that regulates and insures credit unions — has pushed these six rounds of deregulation proposals since December 2025. Longer examination cycles. Shorter document request lists. The Financial Crimes Enforcement Network (FinCEN) just dropped redundant beneficial ownership verification for credit union business accounts. Credit union leaders are treating it as good news.
But deregulation doesn't mean what a lot of credit unions think it means for their cybersecurity programs. NCUA cybersecurity requirements in 2026 aren't getting lighter — they're getting harder to satisfy. "Risk-based" means the regulator is trusting your institution to manage risk on your own. That's not less oversight. That's different oversight. And it actually raises the bar for how you demonstrate your cybersecurity posture.
Here's what's shifted in the regulatory landscape for credit unions as of early 2026:
All of this is real, and most of it is welcome. The question is what it means for your cybersecurity program specifically.
Under a prescriptive model, the examiner tells you exactly what to produce. Check the boxes, hand over the documents, pass the exam. It's rigid, but it's clear. You know exactly what's expected because the regulator spelled it out.
Under a risk-based model, the examiner expects you to have defined your own risks, built controls around them, and produced evidence that those controls are working. The conversation shifts from "show me this specific document" to "show me how you identified this risk and what you did about it."
That's a harder conversation. Especially on the technology side.
If your IT environment is managed by a provider who runs the same playbook for every client, the same security template, same monitoring rules, same reports for a credit union as for a dental office, that approach breaks down under risk-based examination. The examiner will ask why your controls look identical to a non-financial business when your risk profile is fundamentally different.
Risk-based regulation rewards institutions that can demonstrate they actually thought about their specific threats and built defenses accordingly. It punishes institutions that were following the checklist only because the checklist was the exam.
Shorter document request lists don't mean less documentation overall. They mean the examiner is being more selective about what they ask for up front. The expectation is that you maintain comprehensive documentation whether they ask for it or not. When they do ask a follow-up question, you need to produce the answer quickly and with specificity.
Your NCUA examination preparation actually gets more complex under this model, not less. Meeting NCUA cybersecurity requirements now means being ready for any risk-based question the examiner might ask about your program — not just the ones on a predictable document request list.
NCUA's shift to risk-based examination is happening against a backdrop of credit union breaches — dozens of institutions across multiple states. Several connected to the Marquis Software supply chain breach that hit 80 financial institutions and exposed data on over 823,000 consumers.
NCUA is loosening the regulatory framework at the exact moment the threat landscape is intensifying. That's not contradictory. It's the regulator saying: we trust you to handle this. Prove it.
The credit unions that will thrive under this model are the ones that invested in real security controls, real monitoring, and real documentation before the examiner showed up. The ones that were only maintaining compliance because the examiner told them exactly what to maintain are about to find out what "risk-based" really means.
The credit unions we work with aren't treating deregulation as a reason to pull back on security spending. They're treating it as a signal to level up.
Not default templates. Login and device policies — what Microsoft calls Conditional Access — configured for credit union-specific risk scenarios. Data protection rules (Data Loss Prevention, or DLP) that know what member data looks like. Email authentication protocols that prevent attackers from spoofing your credit union's domain (SPF, DKIM, and DMARC) enforced at the domain level, not just enabled. Sensitivity labels applied to member data categories — Social Security numbers, account numbers, loan documents — that match your data classification policy.
Compliance drift is the silent killer under a risk-based model. You pass your exam in January. Your IT provider makes a change in March, maybe they adjust a Conditional Access policy because a user was having trouble signing in. By the time your next exam rolls around, you've drifted out of compliance and nobody flagged it.
Continuous monitoring catches drift the week it happens, not six months later during an examination. That's the difference between "we maintain compliance" and "we were compliant when the examiner was here."
When your examiner asks "walk me through your approach to vendor risk management," you want an answer that shows you evaluated your specific vendor relationships, identified the risk each one introduces, and built controls proportionate to that risk. Not a templated response about antivirus and firewalls.
The documentation that satisfies a risk-based examiner is different from the documentation that satisfies a checklist examiner. It requires evidence of analysis, not just evidence of compliance.
A generic managed service provider builds one security template and applies it to every client. Dental offices, law firms, credit unions: same Conditional Access policy, same monitoring rules, same reports.
Under a prescriptive examination model, that could work. The checklist was the checklist, and if the boxes were checked, you passed.
Under a risk-based model, the examiner asks why your security controls look the same as a business with a completely different risk profile. They ask how you determined that this specific set of controls addresses your specific risks. They ask for evidence that your IT provider understood the credit union threat landscape and configured your environment accordingly.
Your IT provider needs to understand the difference between a credit union's risk profile and a generic small business risk profile. That understanding shows up in the configuration, the monitoring rules, the documentation, and the way they talk to your examiner.
ABT's Security Grade Assessment evaluates your Microsoft 365 tenant against NCUA cybersecurity requirements — the financial services baseline your examiner would actually care about, not a generic one.
Get Your Security GradeNCUA deregulation reduces specific regulatory requirements through shorter document request lists and longer examination cycles for eligible credit unions. However, cybersecurity obligations remain because NCUA is shifting to risk-based examination. This means credit unions must demonstrate they independently identified risks and built appropriate controls, rather than simply following a prescribed checklist.
Prescriptive examination tells institutions exactly which documents to produce and which controls to implement. Risk-based examination expects institutions to define their own risks, build proportionate controls, and produce evidence those controls work. The examiner evaluates your risk analysis process and control rationale, not just whether specific boxes are checked.
No. NCUA deregulation reduces administrative burden but does not reduce cybersecurity expectations. Risk-based examination actually increases the standard for cybersecurity documentation and control specificity. Credit unions that reduce security investment based on deregulation may face examination findings when examiners evaluate whether their controls match their actual risk profile.
Compliance drift occurs when configuration changes gradually move a credit union out of its approved security baseline between examinations. A Conditional Access policy adjusted for user convenience or a monitoring rule disabled for troubleshooting can create gaps that go undetected until the next exam. Continuous compliance monitoring catches drift when it happens rather than months later.
Credit unions should document their specific risk assessment methodology, ensure security controls are tailored to their risk profile rather than generic templates, implement continuous compliance monitoring for configuration drift, and maintain evidence that their IT environment reflects deliberate risk-based decisions. Working with a managed IT provider experienced in credit union examinations accelerates this preparation.
Credit unions need Conditional Access policies that enforce device compliance, block legacy authentication, restrict access from unmanaged devices, and require multi-factor authentication for privileged accounts. DLP (Data Loss Prevention) rules should detect and block sharing of member PII including Social Security numbers, account numbers, and loan data outside the organization. Additional configurations include DMARC email authentication, sensitivity labels for document classification, and audit logging sufficient to produce evidence packages for NCUA examiners.
This section defines the regulatory and technical terms used throughout this article. These are the exact terms your NCUA examiner or IT auditor will reference.
| Term | Definition |
|---|---|
| NCUA | National Credit Union Administration. The independent federal agency that regulates, charters, and supervises federal credit unions and insures deposits at federally insured credit unions. |
| FFIEC | Federal Financial Institutions Examination Council. An interagency body that sets uniform standards for examining financial institutions, including the Cybersecurity Assessment Tool (CAT). |
| OCC | Office of the Comptroller of the Currency. Regulates national banks and federal savings associations. Moving toward the same risk-based examination model as NCUA. |
| FinCEN | Financial Crimes Enforcement Network. The U.S. Treasury bureau that combats money laundering and financial crimes. Issues beneficial ownership and anti-money laundering rules. |
| Executive Order 14192 | The federal directive that triggered NCUA's five rounds of deregulation proposals, requiring agencies to review regulations for unnecessary burden. |
| Risk-based examination | An examination approach where the regulator evaluates whether the institution has identified its own risks and built proportionate controls, rather than checking a fixed list of prescribed requirements. |
| Term | Definition |
|---|---|
| Compliance drift | Gradual movement away from an approved security baseline due to configuration changes made between examinations. Often caused by IT adjustments for user convenience that inadvertently weaken security controls. |
| Conditional Access | Microsoft 365 feature that controls who can sign in, from which devices, and under what conditions. Used to enforce login policies, device compliance, and location-based access restrictions. |
| DLP | Data Loss Prevention. Microsoft 365 policies that detect and prevent sensitive data (member account numbers, SSNs, loan documents) from being shared outside the organization. |
| DMARC | Domain-based Message Authentication, Reporting, and Conformance. An email security protocol that prevents attackers from spoofing your credit union's email domain. |
| Sensitivity labels | Microsoft 365 feature that classifies and protects documents and emails based on data sensitivity. Can automatically encrypt files containing member PII or restrict sharing based on content type. |
| SPF / DKIM | Sender Policy Framework and DomainKeys Identified Mail. Email authentication protocols that work alongside DMARC to verify that emails claiming to come from your domain are legitimate. |
9 min read
In this article: Why Community Banks Need Specialized IT FFIEC, GLBA, and OCC: The Regulatory Stack What Your Managed IT Provider Must Deliver ...
8 min read
In this article: What Happened With the Marquis Breach Why Vendor Risk Is Different for Financial Institutions What Went Wrong and What It Reveals
9 min read
In this article: What the FFIEC Cybersecurity Assessment Actually Measures Why "Baseline" Maturity Is a Red Flag Five Mistakes Community Banks...