9 min read
Microsoft 365 Compliance for GLBA and OCC Requirements: What Community Banks Must Configure
Your community bank runs on Microsoft 365. Email, SharePoint, Teams, OneDrive. Every loan document, every board packet, every customer...
11 min read
Justin Kirsch : Updated on March 3, 2026
In this article:
Your bank runs on Microsoft 365. Email, file storage, Teams collaboration, SharePoint intranets, identity management. Microsoft touches every employee, every branch, every transaction that doesn't go through your core banking system.
So when something breaks at the platform level, your IT provider calls Microsoft support. They wait. They get triaged to a generalist who has never heard of Conditional Access policies for banking environments. They explain the problem again. They wait some more. Meanwhile, your tellers cannot process transactions and your lending team cannot pull credit reports.
This is the difference between a generic managed service provider and a Tier-1 Microsoft Cloud Solution Provider. It is not a marketing label. It is a structural difference in how your IT provider relates to Microsoft, and it directly affects what happens when your bank needs help the most.
Microsoft organizes its Cloud Solution Provider program into two tiers. The distinction determines how your IT provider buys, bills, and supports your Microsoft licensing.
Tier-1 (Direct-Bill) partners have a direct relationship with Microsoft. They purchase licenses directly from Microsoft, manage billing themselves, and have access to direct engineering support and escalation paths. To maintain this status, Microsoft requires a minimum of $1 million in trailing-twelve-month CSP billed revenue, an active Solutions Partner designation, and an operational assessment covering billing accuracy, provisioning reliability, and security posture. Tier-1 partners must also hold an Advanced or Premier Support contract with Microsoft.
Tier-2 (Indirect) partners work through a distributor. They don't have a direct billing or support relationship with Microsoft. When they need help, they go through the distributor, who goes through Microsoft. This adds a layer between your bank and the people who built the platform your bank depends on.
Most generic MSPs are Tier-2 partners, or they're not in the CSP program at all. They buy licenses through a distributor, mark them up, and resell them. Their relationship with Microsoft is transactional. They don't have direct escalation paths, priority support queues, or access to Microsoft engineering teams.
For a retail business, this distinction barely matters. For a community bank running regulated operations on Microsoft 365, it matters every day your examiner is on-site and every minute your systems are down during an incident.
Generic MSPs serve law firms, medical offices, construction companies, and retail chains. Their service model is built for businesses that need email, file sharing, and a help desk. They deploy Microsoft 365 with default security settings, install antivirus, and respond to support tickets. That model works for a 50-person marketing agency. It fails a community bank.
Here is why. A community bank's Microsoft 365 environment is subject to examination by the OCC, FDIC, or state banking department. Examiners expect to see Conditional Access policies that restrict sign-ins by device, location, and risk level. They expect Data Loss Prevention rules that prevent account numbers and Social Security numbers from being emailed outside the organization. They expect audit logging, retention policies, and encryption controls calibrated for financial data.
A generic MSP has never read the OCC's Third-Party Risk Management Guide for Community Banks. They cannot map their services to the FFIEC Cybersecurity Assessment Tool maturity domains. They don't maintain the compliance documentation your examiner expects.
The problem compounds at the vendor management level. In June 2023, the OCC, FDIC, and Federal Reserve issued joint Interagency Guidance on Third-Party Relationships, establishing that banks must apply rigorous oversight to critical third-party providers. Your MSP is a critical third-party provider. If they cannot produce a SOC 2 Type II report, your examiner will flag it.
In September 2023, Microsoft experienced a widespread Exchange Online outage that affected organizations globally. Banks that relied on generic MSPs waited in the same support queue as every other business on the planet. Their MSP opened a standard ticket, received a standard acknowledgment, and waited for a standard resolution.
Banks with Tier-1 CSP partners had a different experience. Their provider escalated directly to Microsoft engineering, received real-time status updates from the product team, and communicated incident progress back to the bank within minutes rather than hours.
This is not a theoretical advantage. Consider what happens during a security incident at a community bank. An employee's credentials are compromised. An attacker accesses the bank's SharePoint environment and begins downloading loan files. Your IT provider needs to:
A Tier-2 MSP goes through their distributor to reach Microsoft. The distributor triages it. Microsoft receives the ticket. Response time: unknown. A Tier-1 CSP picks up the phone, reaches their assigned Microsoft support contact, and gets engineering-level help immediately. When your bank's data and regulatory obligations are at stake, that difference between hours and minutes is not a premium. It is a requirement.
Community banks operate under multiple overlapping regulatory frameworks. The FFIEC IT Examination Handbook. The GLBA Safeguards Rule. OCC vendor management expectations. FDIC examination procedures. State banking department requirements. Each has specific expectations for how IT controls are documented, tested, and maintained.
A generic MSP sells IT services. They do not sell compliance readiness. The gap shows up in three specific places:
Microsoft 365 ships with security and compliance features that are off by default. Conditional Access policies, DLP rules, sensitivity labels, retention policies, audit logging, email authentication (SPF/DKIM/DMARC). A financial-services-aware Tier-1 CSP configures these for banking from day one because they've done it hundreds of times. They know which Conditional Access policies block legacy authentication, which DLP templates catch account numbers in outbound email, and which sensitivity labels automatically encrypt documents containing borrower data.
A generic MSP turns on MFA and calls it done.
When your OCC examiner arrives, they don't ask "Is your IT secure?" They ask for specific evidence: Conditional Access policy configuration, DLP rule effectiveness reports, encryption verification, endpoint compliance status, administrator access logs, and incident response test results. A qualified financial services IT provider maintains this documentation continuously because they know what examiners expect across different regulatory frameworks.
A generic MSP scrambles to produce documentation they've never maintained.
In 2025, the OCC issued a Request for Information specifically examining how community banks manage relationships with core service providers and other critical third parties. The message is clear: regulators are tightening oversight of the vendors banks depend on. Your IT provider needs to understand this regulatory trajectory, not learn about it when your examiner raises it.
In August 2025, Marquis Software Solutions, a fintech vendor serving over 700 banks and credit unions, was breached through a SonicWall firewall vulnerability. Attackers accessed data from 74 financial institutions, exposing 788,000 individuals' Social Security numbers, account details, and taxpayer IDs. Notification took nearly four months. The banks' own systems were never compromised. Their vendor's supply chain failed. If a specialized financial services vendor can suffer this kind of breach, a generic MSP with commodity tools and no banking-specific security controls is carrying even greater risk.
Most community banks buy their IT services piecemeal. Microsoft licensing from one vendor. Managed IT support from a second. Cybersecurity monitoring from a third. Compliance consulting from a fourth. Each vendor knows their own piece. None of them knows the whole picture.
This fragmented approach creates gaps that no individual vendor is responsible for filling. The licensing reseller doesn't know how the security settings affect compliance. The security vendor doesn't understand how the core banking integration works. The compliance consultant recommends policies that the MSP doesn't know how to implement in Microsoft 365.
A converged Tier-1 CSP eliminates these gaps by owning the entire stack: licensing, configuration, security, monitoring, and compliance readiness, all from a single provider who understands how each layer affects the others.
For community banks, this convergence means:
"A banking organization can be exposed to adverse impacts, including substantial financial loss and operational disruption, if it fails to appropriately manage the risks associated with third-party relationships."
OCC, FDIC, Federal Reserve Joint Interagency Guidance on Third-Party Relationships, June 2023"Tier-1" is a specific Microsoft designation, not a marketing claim. Here is how to verify it and assess whether your provider operates at the level a community bank requires.
Community banks choose generic MSPs because they are cheaper. The monthly invoice is lower. The sales pitch is simpler. The onboarding is faster. But the total cost of ownership includes everything that happens when the gaps become visible.
The monthly invoice from a converged Tier-1 CSP is higher than a generic MSP. The total cost of ownership, after you factor in examination preparation, vendor management, incident response, insurance requirements, and remediation risk, is lower.
ABT's free Microsoft 365 Security Assessment evaluates your tenant configuration against the benchmarks that OCC, FDIC, and NCUA examiners expect. See the gaps. Understand the risk. Fix them before your next exam.
Get Your Security GradeA Tier-1 Microsoft Cloud Solution Provider is a Direct-Bill partner that purchases Microsoft licenses directly from Microsoft, manages billing independently, and holds Advanced or Premier Support contracts for direct escalation to Microsoft engineering teams. Microsoft requires Tier-1 partners to maintain at least $1 million in annual CSP billed revenue, hold an active Solutions Partner designation, and pass an operational assessment. This is distinct from Tier-2 Indirect partners who work through distributors and lack direct Microsoft support access.
Community banks depend on Microsoft 365 for daily operations and face regulatory examination of their IT controls by the OCC, FDIC, or state banking departments. Tier-1 CSP status means the IT provider has direct access to Microsoft engineering for incident escalation, operates at a scale that demonstrates proven technical capability, and meets Microsoft's own security and operational standards. During outages or security incidents, a Tier-1 provider resolves issues in minutes rather than waiting hours or days in standard support queues.
Ask your IT provider to show you their Microsoft Partner Center dashboard confirming Direct-Bill CSP authorization. Verify they hold an active Solutions Partner designation and either Advanced Support for Partners or Premier Support for Partners. You can also check the Microsoft Partner Directory for their listed capabilities and designations. A legitimate Tier-1 CSP will readily provide this information because they invested significantly to earn and maintain the status.
A CSP (Cloud Solution Provider) is a Microsoft designation that determines how a company purchases and supports Microsoft licensing. An MSP (Managed Service Provider) is a broader term for companies that manage IT infrastructure. Most generic MSPs are not CSPs at all, or they are Tier-2 Indirect CSPs who buy licenses through distributors. A community bank ideally wants a provider that is both a Tier-1 CSP and a managed service provider with financial services expertise, combining direct Microsoft access with regulatory compliance capability.
A community bank's IT provider should demonstrate fluency with the FFIEC IT Examination Handbook and Cybersecurity Assessment Tool, the GLBA Safeguards Rule, OCC Third-Party Risk Management guidance, FDIC examination procedures, and applicable state banking department requirements. They should also understand the Interagency Guidance on Third-Party Relationships issued jointly by the OCC, FDIC, and Federal Reserve in June 2023, which establishes expectations for how banks manage critical vendor relationships.
ABT is the largest Tier-1 Microsoft Cloud Solution Provider primarily dedicated to financial services. ABT serves over 750 financial institutions, including hundreds of community banks, credit unions, and mortgage companies. As a converged provider, ABT handles Microsoft licensing, tenant hardening, managed IT, security monitoring, and compliance readiness through a single relationship. ABT holds SOC 2 Type II attestation and has supported financial institutions through regulatory examinations for more than 25 years.
Under the 2023 Interagency Guidance on Third-Party Relationships, banks must apply risk management throughout the lifecycle of critical vendor relationships, including planning, due diligence, contract negotiation, ongoing monitoring, and termination. For IT providers, this means banks should verify SOC 2 Type II attestation, assess the provider's security controls, monitor ongoing performance, and maintain documentation for examiner review. The OCC's 2024 Guide for Community Banks provides specific examples of how smaller institutions can implement these requirements proportionally.
If you are not sure whether your current IT provider operates at the level your bank's regulators expect, the fastest way to find out is to test your Microsoft 365 environment against financial services benchmarks.
CEO, Access Business Technologies
Justin Kirsch built Access Business Technologies into the largest Tier-1 Microsoft Cloud Solution Provider dedicated primarily to financial institutions. With more than 750 financial institutions relying on ABT, he understands the operational gap between generic MSP support and the compliance-aware, banking-focused infrastructure that community banks require from their IT partner.
9 min read
Your community bank runs on Microsoft 365. Email, SharePoint, Teams, OneDrive. Every loan document, every board packet, every customer...
11 min read
Microsoft 365 Security Audit Checklist for Community Banks Your community bank runs on Microsoft 365. Email, file sharing, Teams calls with loan...
10 min read
In this article: What Microsoft's Security Team Published Copilot's Security Track Record The Risks That Matter Most for Financial...