Microsoft 365 Compliance Guide 2026: GDPR, HIPAA, SOC 2, and Every Framework Your Business Needs


Compliance isn't optional in 2026 — it's a business requirement. Whether you're handling patient health records under HIPAA, processing EU citizen data under GDPR, or pursuing SOC 2 certification for enterprise sales, Microsoft 365 includes more compliance capabilities than most organizations realize. The challenge isn't whether M365 can meet your compliance needs — it's knowing which features to enable, in what order, and at which license tier.
After configuring compliance frameworks across 300+ Microsoft 365 tenants, we've distilled everything into this guide. You'll find the specific M365 tools, settings, and license requirements for each major compliance framework — plus implementation timelines and the common gaps that cause audit failures.
Microsoft 365 Compliance Architecture Overview
Microsoft rebranded its compliance tools under Microsoft Purview in 2023. Here's how the compliance stack is organized:
| Purview Component | What It Does | License Required |
|---|---|---|
| Compliance Manager | Compliance posture scoring and recommendations | E3+ |
| Information Protection | Sensitivity labels, encryption, rights management | E3+ (basic), E5 (auto-labeling) |
| Data Loss Prevention (DLP) | Prevents unauthorized data sharing | E3+ (Exchange), E5 (all workloads) |
| Data Lifecycle Management | Retention policies and deletion schedules | E3+ |
| Records Management | Regulatory record-keeping with immutability | E5 Compliance add-on |
| eDiscovery | Legal hold, search, and export | E3 (standard), E5 (premium) |
| Audit | Activity logging and investigation | E3 (standard), E5 (premium — 10yr retention) |
| Communication Compliance | Monitor communications for policy violations | E5 Compliance add-on |
| Insider Risk Management | Detect and prevent insider threats | E5 Compliance add-on |
| Information Barriers | Prevent communication between groups | E5 Compliance add-on |
| Data Subject Requests | Process GDPR/privacy requests | E3+ |
Framework-by-Framework Configuration Guide
1. GDPR (General Data Protection Regulation)
Applies to: Any organization processing personal data of EU/EEA residents, regardless of where the organization is located.
Minimum M365 license: Business Premium (SMB) or E3 (Enterprise)
| GDPR Article | Requirement | M365 Tool | Configuration |
|---|---|---|---|
| Art. 5 — Data minimization | Collect only necessary data | Retention policies | Set auto-deletion for data past retention period |
| Art. 6 — Lawful processing | Legal basis for processing | Sensitivity labels | Label personal data with processing basis |
| Art. 15-20 — Data subject rights | Access, portability, erasure | Data Subject Requests (DSR) | Purview → Privacy → Subject Rights Requests |
| Art. 17 — Right to erasure | Delete personal data on request | Content Search + DSR | Search across all workloads, export/delete |
| Art. 25 — Privacy by design | Data protection by default | DLP policies | Block external sharing of PII by default |
| Art. 30 — Records of processing | Document processing activities | Compliance Manager | Use GDPR assessment template |
| Art. 32 — Security of processing | Appropriate technical measures | Conditional Access + MFA | Require MFA, block legacy auth, device compliance |
| Art. 33 — Breach notification | 72-hour notification to authority | Defender alerts + Audit log | Configure breach detection alerts |
| Art. 35 — Impact assessments | DPIA for high-risk processing | Compliance Manager | Document DPIAs in assessment templates |
| Art. 44-49 — Data transfers | Protect cross-border transfers | Data residency + encryption | Multi-Geo or EU data boundary |
GDPR implementation checklist:
- Enable Compliance Manager and run the GDPR assessment (provides a compliance score)
- Configure DLP policies to detect and protect EU personal data (national IDs, IBAN, passport numbers)
- Create sensitivity labels for personal data classification (Public, Internal, Confidential, Restricted)
- Set up retention policies aligned with your data retention schedule
- Enable audit logging (unified audit log in Microsoft Purview)
- Configure Data Subject Request workflows in Purview Privacy
- Deploy Conditional Access policies requiring MFA and compliant devices
- Review and configure data residency settings (EU data boundary if available)
- Train staff on GDPR obligations using Microsoft compliance training
- Document all processing activities in Compliance Manager
Timeline: 4-6 weeks for initial configuration, 2-3 months for full maturity.
2. HIPAA (Health Insurance Portability and Accountability Act)
Applies to: Healthcare providers, health plans, healthcare clearinghouses, and their business associates handling Protected Health Information (PHI).
Minimum M365 license: Business Premium or E3 + Microsoft HIPAA BAA
Critical first step: Sign Microsoft's Business Associate Agreement (BAA). Without a BAA, you cannot use M365 for PHI regardless of configuration. Request the BAA through your Microsoft account manager or authorized CSP partner.
| HIPAA Rule | Requirement | M365 Tool | Configuration |
|---|---|---|---|
| §164.312(a) — Access control | Unique user IDs, emergency access | Entra ID + Conditional Access | MFA, emergency access accounts, RBAC |
| §164.312(b) — Audit controls | Record and examine access to PHI | Unified Audit Log | Enable audit logging, 10-year retention (E5) |
| §164.312(c) — Integrity controls | Protect PHI from alteration | Sensitivity labels + DRM | Encrypt and restrict editing of PHI documents |
| §164.312(d) — Authentication | Verify identity of users | Entra ID MFA | Require MFA for all users accessing PHI |
| §164.312(e) — Transmission security | Encrypt PHI in transit | TLS + Message Encryption | Force TLS 1.2+, configure OME for PHI emails |
| §164.310 — Physical safeguards | Device security | Intune MDM | Device encryption, remote wipe, compliance policies |
| §164.308 — Admin safeguards | Risk analysis, workforce training | Compliance Manager + Secure Score | Run HIPAA assessment, track remediation |
| §164.314 — BAA requirements | Business associate agreements | Microsoft BAA | Sign Microsoft HIPAA BAA |
| §164.530 — Breach notification | Notify within 60 days | Defender alerts | PHI breach detection and notification workflows |
For comprehensive HIPAA-compliant M365 deployments, our healthcare IT support team provides end-to-end configuration, training, and ongoing compliance monitoring.
Timeline: 6-8 weeks for initial configuration, 3-4 months for full compliance maturity.
3. SOC 2 (System and Organization Controls)
Applies to: SaaS companies, technology service providers, and any organization storing customer data that needs to demonstrate security controls to enterprise clients.
Minimum M365 license: E3 (E5 recommended for Trust Services Criteria coverage)
| SOC 2 Trust Criteria | M365 Controls | Evidence Sources |
|---|---|---|
| Security (CC6) | Conditional Access, MFA, Defender, DLP | Secure Score report, Conditional Access policies |
| Availability (CC7) | M365 SLA (99.9%), Service Health | Microsoft SLA documentation, uptime reports |
| Processing Integrity (CC8) | Audit logs, data validation controls | Unified audit log exports |
| Confidentiality (CC9) | Sensitivity labels, encryption, DLP | DLP policy reports, encryption configuration |
| Privacy (P1-P8) | Data Subject Requests, retention policies | DSR completion records, retention policy configs |
SOC 2 evidence collection from M365:
- Secure Score report — Screenshot monthly, shows control implementation status
- Conditional Access policies — Export policy list as evidence of access controls
- DLP incident reports — Shows data protection controls are active and functioning
- Audit log searches — Demonstrates monitoring and logging capabilities
- Compliance Manager score — Maps directly to SOC 2 Trust Services Criteria
- Intune compliance reports — Evidence of device security controls
4. PCI DSS (Payment Card Industry Data Security Standard)
Applies to: Any organization that stores, processes, or transmits credit card data.
Minimum M365 license: E3 with DLP enabled
| PCI DSS Requirement | M365 Control | Configuration |
|---|---|---|
| Req 1 — Network security | Conditional Access | Network-based access controls, block untrusted locations |
| Req 3 — Protect stored data | Sensitivity labels + DLP | Detect and encrypt credit card numbers in emails/files |
| Req 4 — Encrypt transmissions | TLS enforcement | Force TLS 1.2+ for all connections |
| Req 7 — Restrict access | RBAC + Conditional Access | Least-privilege access to cardholder data environments |
| Req 8 — Identify users | Entra ID + MFA | MFA for all CDE access, unique user IDs |
| Req 10 — Monitor access | Unified Audit Log | Log all access to cardholder data, retain per policy |
| Req 12 — Security policies | Compliance Manager | Document and track security policies |
Important: M365 alone cannot achieve full PCI DSS compliance. PCI DSS applies to your entire cardholder data environment (CDE), which typically includes payment processing systems, databases, and network infrastructure beyond M365. However, M365 controls are essential for email and document handling where card data might flow.
5. CMMC (Cybersecurity Maturity Model Certification)
Applies to: Organizations in the U.S. Department of Defense supply chain (DIB sector).
Minimum M365 license: GCC or GCC High (depending on CUI level)
| CMMC Level | Requirements | M365 Environment Needed | Key M365 Controls |
|---|---|---|---|
| Level 1 (Foundational) | 17 practices (basic cyber hygiene) | M365 Commercial or GCC | MFA, antivirus, access controls |
| Level 2 (Advanced) | 110 practices (NIST SP 800-171) | M365 GCC High | Full Purview suite, Defender, Intune, audit logging |
| Level 3 (Expert) | 130+ practices (NIST SP 800-172) | M365 GCC High + additional controls | Advanced threat protection, continuous monitoring |
Critical note: CMMC Level 2+ requires M365 GCC High, which is a separate environment with data residency in U.S. government data centers. Standard M365 commercial tenants do not meet CMMC Level 2 requirements regardless of configuration.
6. ISO 27001 (Information Security Management System)
Applies to: Organizations seeking internationally recognized information security certification.
Minimum M365 license: E3 (E5 recommended for Annex A control coverage)
| ISO 27001 Annex A Domain | M365 Controls |
|---|---|
| A.5 — Information security policies | Compliance Manager policy templates |
| A.6 — Organization of info security | Entra ID roles, admin unit delegation |
| A.7 — Human resource security | Lifecycle workflows, access reviews |
| A.8 — Asset management | Intune device inventory, sensitivity labels |
| A.9 — Access control | Conditional Access, MFA, PIM (E5) |
| A.10 — Cryptography | BitLocker (Intune), message encryption, TLS |
| A.12 — Operations security | Defender for Endpoint, Secure Score |
| A.13 — Communications security | DLP, email encryption, information barriers |
| A.14 — System acquisition | Intune app deployment, app protection policies |
| A.16 — Incident management | Defender incidents, automated investigation |
| A.18 — Compliance | Compliance Manager, audit logs |
Cross-Framework Priority Matrix
Most organizations need to comply with multiple frameworks. Here's which M365 controls cover the most ground across frameworks:
| M365 Control | GDPR | HIPAA | SOC 2 | PCI DSS | ISO 27001 | Priority |
|---|---|---|---|---|---|---|
| MFA + Conditional Access | ✅ | ✅ | ✅ | ✅ | ✅ | Critical |
| Unified Audit Logging | ✅ | ✅ | ✅ | ✅ | ✅ | Critical |
| DLP Policies | ✅ | ✅ | ✅ | ✅ | ✅ | Critical |
| Sensitivity Labels | ✅ | ✅ | ✅ | ✅ | ✅ | Critical |
| Retention Policies | ✅ | ✅ | ✅ | — | ✅ | High |
| Intune MDM/MAM | ✅ | ✅ | ✅ | ✅ | ✅ | High |
| Compliance Manager | ✅ | ✅ | ✅ | ✅ | ✅ | High |
| eDiscovery | ✅ | ✅ | ✅ | — | — | Medium |
| Communication Compliance | — | — | ✅ | — | — | Low-Medium |
| Information Barriers | — | — | ✅ | — | ✅ | Low |
Key insight: Implementing the top 7 controls covers 80%+ of requirements across all major frameworks. Start with these before moving to framework-specific controls.
License Comparison: What You Get at Each Tier
| Compliance Feature | Business Premium | E3 | E5 | E5 Compliance Add-on |
|---|---|---|---|---|
| Compliance Manager | Basic | ✅ | ✅ | ✅ |
| Manual sensitivity labels | ✅ | ✅ | ✅ | ✅ |
| Auto-apply sensitivity labels | — | — | ✅ | ✅ |
| DLP (Exchange) | ✅ | ✅ | ✅ | ✅ |
| DLP (SharePoint, OneDrive, Teams) | — | — | ✅ | ✅ |
| Endpoint DLP | — | — | ✅ | ✅ |
| Standard eDiscovery | — | ✅ | ✅ | ✅ |
| Premium eDiscovery | — | — | ✅ | ✅ |
| Standard audit (180 days) | ✅ | ✅ | ✅ | ✅ |
| Premium audit (1-10 years) | — | — | ✅ | ✅ |
| Retention policies | Basic | ✅ | ✅ | ✅ |
| Records management | — | — | — | ✅ |
| Communication compliance | — | — | — | ✅ |
| Insider risk management | — | — | — | ✅ |
| Information barriers | — | — | — | ✅ |
| Customer Lockbox | — | — | ✅ | ✅ |
| Privileged Access Management | — | — | — | ✅ |
Implementation Roadmap: 90-Day Compliance Configuration
| Phase | Timeline | Actions | Frameworks Covered |
|---|---|---|---|
| Phase 1: Foundation | Weeks 1-2 | Enable MFA, Conditional Access, unified audit logging, block legacy auth | All frameworks |
| Phase 2: Data Protection | Weeks 3-4 | Configure DLP policies, create sensitivity labels, enable email encryption | GDPR, HIPAA, SOC 2, PCI DSS |
| Phase 3: Governance | Weeks 5-6 | Set retention policies, configure Compliance Manager assessments | GDPR, HIPAA, ISO 27001 |
| Phase 4: Device Security | Weeks 7-8 | Deploy Intune MDM, device compliance policies, app protection | HIPAA, SOC 2, ISO 27001 |
| Phase 5: Advanced | Weeks 9-10 | eDiscovery configuration, advanced audit, DSR workflows | GDPR, HIPAA, SOC 2 |
| Phase 6: Validation | Weeks 11-12 | Test controls, run compliance assessments, document evidence | All frameworks |
Common Compliance Audit Failures in M365 Environments
Based on our experience supporting organizations through compliance audits, here are the most frequent M365-related findings:
| Audit Finding | Frequency | Root Cause | Fix |
|---|---|---|---|
| MFA not enforced for all users | 45% | Security defaults disabled, CA policies have gaps | Implement CA policies covering all users and apps |
| Legacy authentication not blocked | 60% | Conditional Access gap or legacy apps in use | Block legacy auth in CA, migrate apps to modern auth |
| Audit logging not enabled | 35% | Assumed it's on by default (it's not always) | Verify unified audit log is active in Purview |
| No DLP policies configured | 55% | Feature available but never implemented | Deploy DLP for sensitive info types relevant to your industry |
| No data retention policies | 70% | Retention not configured, data kept indefinitely | Create retention policies aligned with regulatory requirements |
| Guest access uncontrolled | 50% | Default Teams/SharePoint guest settings too permissive | Restrict guest access, implement access reviews |
| Admin accounts without MFA | 25% | Break-glass accounts or service accounts exempted | MFA for all admins, monitor break-glass usage |
| No device compliance policies | 40% | Intune not deployed or not enforced | Deploy Intune with compliance policies, block non-compliant devices |
Frequently Asked Questions
Can Microsoft 365 Business Premium meet HIPAA requirements?
Yes, for small to mid-sized healthcare organizations. Business Premium includes Intune, Defender for Office 365, Conditional Access, and DLP for Exchange. You'll need to sign Microsoft's HIPAA BAA and properly configure all security controls. For larger organizations or those needing advanced eDiscovery and audit capabilities, E3 or E5 is recommended. Our healthcare IT team specializes in HIPAA-compliant M365 deployments.
What's the difference between E5 and the E5 Compliance add-on?
E5 includes everything in E3 plus Defender for Endpoint P2, Defender for Office 365 P2, Entra ID P2, Power BI Pro, Teams Phone, and advanced compliance features (premium audit, premium eDiscovery, auto-labeling). The E5 Compliance add-on ($12/user/month) adds only the compliance features (records management, communication compliance, insider risk) to E3 — useful if you need compliance but not the security or voice features.
How does Compliance Manager scoring work?
Compliance Manager assigns points to improvement actions based on their impact and complexity. Your compliance score is calculated as (points achieved / total points) × 100. Microsoft manages some actions (infrastructure-level controls), while you manage others (tenant configuration). A score above 70% indicates good compliance posture; above 85% is excellent. The score is relative to the assessment templates you've activated.
Does M365 meet data residency requirements for GDPR?
Yes, with configuration. Microsoft's EU Data Boundary commitment ensures core customer data for EU M365 tenants stays within the EU. For organizations needing granular control, Multi-Geo (paid add-on) allows specifying data locations per user. Microsoft also participates in the EU-U.S. Data Privacy Framework for transatlantic transfers.
Can we use M365 compliance tools as evidence in audits?
Yes. Compliance Manager reports, Secure Score exports, DLP incident reports, audit log searches, and Conditional Access policy exports are all accepted as evidence in SOC 2, ISO 27001, and HIPAA audits. We recommend exporting these monthly and storing them in a compliance evidence repository.
Get Expert Compliance Configuration
Configuring Microsoft 365 compliance correctly requires deep knowledge of both the regulatory frameworks and the M365 platform. Misconfiguration doesn't just risk audit failure — it can result in data breaches, regulatory fines, and loss of customer trust.
Contact Medha Cloud for a compliance readiness assessment. Our team will evaluate your current M365 configuration against your applicable frameworks, identify gaps, and provide a prioritized remediation plan. We support organizations across healthcare, finance, SaaS, and government with compliant Microsoft 365 deployments.
Related Resources
Advanced security and device management for businesses that need more than the basics.
Microsoft 365 Premium LicensingTopics

Sreenivasa Reddy G
Founder & CEO • 15+ years
Sreenivasa Reddy is the Founder and CEO of Medha Cloud, recognized as "Startup of the Year 2024" by The CEO Magazine. With over 15 years of experience in cloud infrastructure and IT services, he leads the company's vision to deliver enterprise-grade cloud solutions to businesses worldwide.


