With compliance frameworks multiplying, regulatory pressure has never been higher. Comply or Cry goes framework by framework through what actually matters: what you're required to do, why the framework exists, and what it means in practice for MSPs managing clients at scale.
In this first episode, Microsoft 365 Solutions Architects Dakota McElligott and Tim Oelkers map the landscape: why frameworks exist, what they want, and the critical difference between what you're required to do versus what's merely recommended.
DORA is law, not guidance. In this episode, Tim Oelkers tells you exactly what's required - incident reporting timelines, ICT risk management, third-party oversight - and which M365 controls satisfy it. Plus: where M365 stops and your wider programme must take over.
Hello everyone. Hopefully you can all hear me. Can I get some thumbs up if you guys can hear me? Oh yeah, cool. Great. Excellent. And you can see the screen. Some more thumbs up for that would be awesome. Even better. Cool. I would say, can you see me? But it's daunting as it is, so we'll leave that one. Sweet. We'll give everyone just another minute or so just to join and then we'll make a start. Sweet, numbers slowly rising. Less is better. Sweet. Well, I mean it is recorded, so we can always come back to this at a later date or they can always re-watch the recording. But I think we should get started, guys. So, just to kind of start things off nice and easily for you, I don't expect this to take a solid hour, but if you’ve got any questions, please put them in the chat and at the end I’ll do my best to respond to them or I’ll reach out to you privately where required, depending on time. This is episode two of the compliance cry series. It’s focused seriously and strongly around the Digital Operations Resilience Act. For those that don’t know, this has already been out for quite a while, at least a year, I think January from memory last year, although I could be slightly wrong. This is again part of that compliance cry series that we’ve got running and it’s really designed for those, and I’m assuming anyone on this call today, who has customers focused on the financial sector in the EU. So thumbs up please to confirm you’re all having to deal with EU regulations. Yeah, got quite a few of you there. Sweet. Very relevant to what we’re dealing with today. This episode is designed to cover the Microsoft element, what we as MSPs have to deal with, whether we’re actually impacted, talk more about the journey that DORA is on, where it started, what we need to deal with, and the areas we need to focus on. I’ve been dealing with DORA for about 18 months now and I’ve got a couple of opportunities and links I can give you, including an Excel readiness check sheet and an HTML report that gives you an overview of what’s relevant to you. To get started, it’s fair to start with what is DORA. This is EU law and regulation designed to reshape the industry by taking fragmented country-specific rules and creating a single consistent framework. DORA stands for Digital Operational Resilience Act and it’s an EU regulation reshaping the financial services sector for managed ICT risk. We’ve seen too many cyber incidents and IT outages hit banks and insurers over the past several years, and the EU has created a unified rulebook where MSPs and ICT services are being redefined. Two key areas under DORA are Regulatory Technical Standards and Implementing Technical Standards. These are where our primary focus lies in the ICT space. RTS covers controls, governance and evidence, while ITS focuses on incident response. Think left of boom versus right of boom. RTS ensures controls and governance are in place and evidence can be produced. ITS focuses on how incidents are handled once something goes wrong. For MSPs, this matters because we are at the forefront of the IT foundations for our customers, especially financially regulated firms. We’re pivotal in testing, third-party configurations, policy implementation beyond Microsoft, including firewalls, networks, switches, VLANs, and more. Every part of the IT estate must meet the same RTS and ITS standards, be measured, and be demonstrable. Auditors will expect a checklist and documented evidence. I will share a modern work checklist with you after the session. We’re managing multiple customers, and audits will happen, so we must be ready. DORA is EU regulation 2022/2554, effective from 17 January 2025. It ensures banks, insurers, investment firms, and IT service providers can withstand, respond to, and recover from IT disruptions. It applies to 21 types of financial entities and extends to third-party MSPs and the entire IT supply chain, including print management and SaaS vendors like Bloomberg. The entire supply chain supporting EU-regulated financial firms must comply. MSPs are especially at risk because we hold administrative access to critical systems. With DORA in place, MSPs are now prime targets, so we must meet the same security standards as financial firms. DORA harmonises IT risk rules across EU member states, eliminating fragmented country-based regulations. For MSPs, this simplifies compliance but raises the baseline significantly. There are five key DORA pillars: risk management, incident reporting, digital resilience testing, third-party risk management, and information sharing. Risk management focuses on identifying and mitigating IT risks through governance and continuous monitoring. Incident reporting requires detection, classification, and reporting of IT incidents within strict timelines using standardised templates. Digital resilience testing includes penetration testing, disaster recovery, business continuity, and threat-led penetration testing. Third-party risk management is critical for MSPs, requiring registration of IT providers, contractual compliance, evidence, and exit strategies. MSPs must prove internal controls such as DLP, employee processes, and vendor compliance. Information sharing involves sharing cyber threat intelligence within trusted communities to strengthen collective defence. These pillars also create service opportunities beyond financial services. I don’t have chat access right now but I’ll review it at the end. Looking at Microsoft 365, it underpins nearly all financial services organisations and is therefore directly in scope. Under DORA, systems supporting critical business functions must be governed, monitored, and resilient. MSPs need a multi-tenant management solution with a single pane of glass. Identity, email, device compliance, threat detection, data protection, and collaboration are all mapped to DORA controls. Identity is the new perimeter, and misconfigurations create attack surfaces. Security controls map to prevention, detection, and response. Prevention includes conditional access, MFA, DLP, Intune compliance, and sensitivity labeling. Detection and response include Defender for Endpoint, audit logging, and incident reconstruction. MSPs are directly in scope because financial clients must verify DORA compliance and MSPs must verify their own supply chains. Scope is determined by customer EU presence, not MSP location. Non-compliance risks include loss of financial clients and reputational damage. MSP obligations include cooperation with regulators, business continuity planning, contractual compliance, exit strategies, and supplier verification. Penalties include fines up to €5 million for MSPs, mandatory remedial actions, public disclosure, and contract loss. DORA extends beyond Microsoft 365 to networks, SaaS, supply chains, on-prem systems, and backup and recovery with strict RTO mandates. MSPs must do significant work per customer, but automation opportunities exist. Where inforcer fits is supporting DORA compliance through security baselines, drift detection, compliance reporting, multi-tenant management, and remediation. Inforcer maps to DORA pillars through baseline enforcement, drift detection, audit-ready reporting, and evidence generation. Information sharing is also encouraged, similar to how inforcer supports community collaboration. To wrap up, we’ll provide an HTML report on DORA and Microsoft 365, an MSP readiness dashboard, control checklists, and a 90-day readiness plan. There is a lot to do, and we’ll support you through it. Thank you for your time and I’ll now open up for questions.
Not legally required, but one of the most practical frameworks available. This session maps CIS Controls v8 directly to M365 configuration - identity, endpoints, logging, data protection - and explains why 'configured' and 'enforced' are not the same thing across multi-tenant environments.
Register now
Cyber Essentials is a condition of many UK public sector contracts - and assessors will find gaps if you're not ready. This episode covers what the certification actually requires inside M365, what sits outside it, and how to stay audit-ready between renewals without the last-minute scramble.
Register now
NIS2 expanded scope, tightened timelines, and put board-level accountability on the table. If your clients are in energy, health, transport, or digital infrastructure across the EU, this session covers what they must demonstrate - and where M365 controls either deliver or fall short.
Register now
NIST is the common language of enterprise security - and 800-171 is mandatory for anyone in the US defence supply chain. This episode maps the Identify–Protect–Detect–Respond–Recover functions directly to M365, and shows what auditors, insurers, and procurement teams will want to see.
Register now
NIST is the common language of enterprise security - and 800-171 is mandatory for anyone in the US defence supply chain. This episode maps the Identify–Protect–Detect–Respond–Recover functions directly to M365, and shows what auditors, insurers, and procurement teams will want to see.
Register now