Skip to main content
Skip to main content

Microsoft 365 Vendor Risk Assessment — Full Report

Before you share customer data with Microsoft 365, your compliance team needs documented proof they can be trusted. ThirdProof investigated Microsoft 365 across 27 intelligence sources — here's what we found.

✓ FedRAMP Status: Authorized (Moderate) — verified against marketplace.fedramp.gov

Risk Tier
Tier 2High Risk
SOC 2
— Not Found
FedRAMP
✓ Authorized
Last Assessed
Apr 17, 2026
🟢IP Reputation: Abuse score: 0%, 0 reports🟡SSL/TLS: TLSv1.3🟢Domain Age: 35 years🟢Infrastructure: 2 open ports, 0 CVEs
FedRAMP Status
Microsoft 365 is listed on the FedRAMP Marketplace as Authorized (Moderate) as of March 2026.
SOC 2 Status
Microsoft 365 has not had a SOC 2 claim detected on their trust page.
Sanctions Screening
Microsoft 365 returned no matches in OFAC SDN, EU Consolidated, and UN sanctions screening.
Risk Tier
ThirdProof assigned Microsoft 365 a High Risk tier with 100% confidence across 27 intelligence sources.

27 sources queried. 100% confidence. Every Microsoft 365 investigation produces both a risk report and an auto-filled security questionnaire — no vendor follow-up required.

Get Microsoft 365's Full Report Free →
5 free investigations|Risk report + auto-filled questionnaire|Avg. 7 minutes

Certification & Compliance Status

Need a complete vendor security questionnaire?

Run a full ThirdProof investigation to get 133 security questions auto-filled with source evidence — ready for your next audit or vendor onboarding review.

Get Microsoft 365's Full Report Free →
FedRAMP Authorized (Moderate)

Verified against FedRAMP Marketplace API as of March 2026

Verified against the official FedRAMP Marketplace API as of March 2026.

Microsoft 365 Government authorized at Moderate and High impact levels.

27 data sources queried per assessment
Reports generated in an average of 7 minutes
SHA-256 verified for audit integrity
Deterministic risk scoring — no AI guesswork
2Tier

High Risk

Microsoft 365

Vendor Risk Assessment

Confidence Score100%

Based on data availability and source coverage

27

Sources Queried

25

Sources With Data

April 17, 2026

Last Assessed

Executive Summary

AI-generated analysis for Microsoft 365

Microsoft 365 is a globally deployed enterprise productivity and collaboration platform operated by Microsoft Corporation, assessed here at a medium data access level. The rule engine has assigned this vendor a Tier 2 (High Risk) rating, driven primarily by recent adverse media coverage of ransomware and phishing-based attacks targeting the platform — a predictable but material risk profile for any service with over 400 million users. The platform presents a substantial array of positive security signals across infrastructure, compliance, and governance dimensions:

Key Findings

  • Domain reputation is clean across all blacklist and malware checks, with an IP abuse confidence score of 0/100.
  • A named CISO structure is in place, with Igor Tsyganskiy serving as Microsoft's CISO, supported by a Deputy CISO layer and weekly senior leadership security reviews.
  • Encryption at rest (AES-256) and in transit (TLS 1.3) are independently confirmed, with MFA mandated for all administrative accounts.
  • FedRAMP High authorization is independently verified via the FedRAMP Marketplace for Azure Commercial Cloud.
  • SOC 2 Type II compliance is claimed on the vendor's trust documentation page, and SOC 1 Type II audits are conducted regularly.
  • The platform carries a 99.9% uptime SLA and exposes only ports 80 and 443, indicating a tightly controlled public-facing attack surface.
  • Infrastructure exposure scanning returned zero known CVEs and zero active malware or phishing flags. The primary concerns driving the elevated tier center on platform-level attack surface and targeted threat activity. Adverse media identifies ransomware defense articles and a reported full-account breach vector via phishing and OAuth token vulnerabilities (covered in rf-1). The tech community has raised concerns about arbitrary data exfiltration via Microsoft 365 Copilot and a Swiss government advisory regarding encryption practices. Additionally, the vendor's subprocessor page was found but could not be automatically parsed, limiting supply chain visibility. Microsoft's privacy statement does not explicitly state whether AI-driven features (such as Copilot) train on customer data, leaving this policy area unresolved. Two HTTP security headers (Content-Security-Policy and X-Frame-Options) are absent from the primary domain. Automated questionnaire coverage reached 72% (96/133 questions), with 43 high-confidence answers — indicating strong external signal availability for this vendor. Overall, Microsoft 365 is a mature, heavily audited enterprise platform whose Tier 2 designation reflects the inherent attack surface of a service at global scale, not a fundamental governance deficiency. Procurement teams should obtain the current SOC 2 Type II report, clarify AI data training commitments for Copilot features, and implement the complementary user entity controls (CUECs) described in the compliance context below.

Independence Statement

All evidence in this assessment was independently sourced from external data providers, public registries, and open-source intelligence without vendor participation or input; questionnaire answers were derived programmatically from public signals and were not submitted or reviewed by the vendor.

Investigation Findings

5 findings identified for Microsoft 365

1 critical1 high3 medium
critical

Adverse Media: security incident

Article from www.darkreading.com: "True Microsoft 365 ransomware defense: 11 essential steps"

high

Adverse Media: Full Microsoft 365 breach via phishing and OAuth vulnerabilities

1 article(s) reference security or regulatory concerns for "Microsoft 365": "Phishing and OAuth Token Vulnerabilities Lead to Full Microsoft 365 Breach" (gbhackers.com) https://news.google.com/rss/articles/CBMiVkFVX3lxTE9oN3VWMVRwZmRVWUw5NlpaQ2hzTl9Jajg0SFY4SG5UR3JEWTBXQXgyU0dTZ19DVXY2WFJHWHZLSzBzZTNzakR5VUlkbUh1TU40aGU2a3VB?oc=5

medium

Missing Security Headers

microsoft.com is missing 2 recommended security headers: Content-Security-Policy, X-Frame-Options.

medium

Tech Community Discussion: security

2 Hacker News stories about "Microsoft 365" related to security. Top story: "Microsoft 365 Copilot – Arbitrary Data Exfiltration via Mermaid Diagrams" (218 points).

medium

Multiple Certificate Issuers (29)

microsoft.com has certificates from 29 different Certificate Authorities. This may indicate inconsistent certificate management practices.

Security Strengths

25 positive signals verified

Low-Confidence Sanctions Matches Only

Sanctions & Watchlist Screening

No LEI Registry Match (Expected for Most Companies)

Business Registration

Sanctions Data Incomplete

Sanctions & Watchlist Screening

No Adverse Media Signals

Adverse Media Scan (Fallback)

Firmographic Data Available

Company Intelligence

Valid SSL Certificate

Domain Analysis

2 Open Ports Detected

Infrastructure Exposure

Established Domain (34+ years)

Domain Registration

Clean domain reputation

Threat Intelligence

Tech Community Discussion: legal

Tech Community Sentiment

HTTP Security Scan Unavailable

HTTP Security Scan

Large Certificate Footprint (3987 subdomains)

Certificate Transparency

Established Web Presence (29+ years)

Web Archive History

No Threat Intelligence Pulses

Threat Intelligence (OTX)

Clean IP Reputation

IP Reputation

Clean Safe Browsing Status

Malware & Phishing Check

Clean Website Security Scan

Website Security Scan

FedRAMP Authorization Independently Verified

Trust & Compliance Page Scan

Certification Claimed: GDPR

Trust & Compliance Page Scan

Subprocessor Page Found, No Entries Parsed

Supply Chain & Subprocessor Discovery

Not Found as FDIC-Insured Institution

FDIC Institution Check

No SEC Enforcement Filings Found

SEC Filing Search

SOC 2 Compliance Claimed on Trust Page

Certification Registry Verification

FedRAMP Authorization Confirmed (Cross-Source)

Certification Registry Verification

Deep Document Crawler Results

Deep Document Analysis

Recommended Actions

Steps to address findings for Microsoft 365

  1. 1

    Obtain Microsoft's current SOC 2 Type II report and bridge letter: visit the [Microsoft Service Trust Portal](https://servicetrust.microsoft.com) (login required with a Microsoft 365 organizational account), navigate to 'Audit Reports', and download the most recent SOC 2 Type II report. Confirm the audit period end date is within the last 12 months. File this with the present ThirdProof report as combined CC9.2 evidence.

  2. 2

    Clarify AI/Copilot data training commitments in writing: contact your Microsoft account team or review the Microsoft Products and Services Data Protection Addendum (DPA) to confirm whether Microsoft 365 Copilot features train on your organization's customer or employee data, and whether opt-out is available. Request a written confirmation and attach it to this assessment.

  3. 3

    Implement phishing-resistant MFA and disable legacy authentication: in your Microsoft 365 admin center, enable Conditional Access policies requiring FIDO2 or certificate-based MFA for all users, and block legacy authentication protocols (Basic Auth, SMTP AUTH where unused). This directly mitigates the OAuth and phishing breach vectors identified in rf-1. Target completion: within 30 days.

  4. 4

    Manually review and document the Microsoft subprocessor list: navigate to [microsoft.com/gdpr/subprocessors](https://microsoft.com/gdpr/subprocessors), export or screenshot the current list, and screen it against your organization's restricted-country or sanctions policy. Retain the dated copy as GDPR Article 28 supply chain evidence.

  5. 5

    Document your tenant-level CUECs (Complementary User Entity Controls): your SOC 2 auditor will expect evidence that you have implemented the access control, MFA, and data classification controls that Microsoft's SOC 2 report places in scope for customer tenants. Prepare a one-page CUEC matrix mapping Microsoft's shared responsibility model to your implemented controls — this is typically requested during SOC 2 fieldwork.

Intelligence Sources Queried

27 sources in this assessment

25of 27 sources returned data
IP Reputation
AI Data Usage Policy
Threat Intelligence (OTX)
Adverse Media Scan
Certification Registry Verification
Certificate Transparency
Deep Document Analysis
Domain Analysis
FDIC Institution Check
Business Registration
Historical Media Search
Tech Community Sentiment
Company Intelligence
Adverse Media Scan (Fallback)
Sanctions & Watchlist Screening
Malware & Phishing Check
SEC Filing Search
Infrastructure Exposure
SSL/TLS Analysis
Supply Chain & Subprocessor Discovery
Trust & Compliance Page Scan
Website Security Scan
Threat Intelligence
Web Archive History
Domain Registration
HTTP Security Scan
AI Research Agent

Data Coverage Notes

Some data sources may have had limited availability during this assessment. This does not reflect negatively on the vendor.

  • The HTTP Security Scan (HTTP security scanner) was unavailable during this assessment; HTTP security header posture is therefore based solely on direct domain analysis, which identified two missing headers (Content-Security-Policy and X-Frame-Options).
  • The subprocessor page at microsoft.com/gdpr/subprocessors was located but could not be automatically parsed — no individual subprocessor names, countries, or data categories were extracted for this assessment.
  • The AI data usage policy scan identified Microsoft's privacy statement at microsoft.com but could not determine a specific training commitment, retention policy, or third-party AI provider list for Microsoft 365 Copilot features; these fields returned 'not_stated' and require direct vendor inquiry.
  • ISO 27001 certification status was returned as 'not_found' by the IAF CertSearch registry. Microsoft does publish Azure ISO/IEC 27001 documentation via its Service Trust Portal, but this could not be independently verified through the public registry during this assessment cycle.
  • HITRUST certification was not found in the HITRUST certified entity directory; this may reflect registry coverage limitations rather than absence of certification, and should be verified directly with the vendor for healthcare-context deployments.
183+
Vendors assessed
98%
Average confidence
<2 min
Time to report
What a ThirdProof assessment covers

Sanctions Screening

Is Microsoft 365 on any OFAC, EU, or UN sanctions list? Are any officers or affiliates flagged?

Cyber Risk Assessment

What is Microsoft 365's security posture? Threat intelligence scanning, known vulnerabilities, and security header analysis.

Business Registration

Is Microsoft 365 a legitimately registered business entity? Corporate status, jurisdiction, and officer verification.

Adverse Media Analysis

Has Microsoft 365 appeared in negative news coverage? Data breaches, lawsuits, regulatory actions, and complaints.

Domain & Infrastructure

Is Microsoft 365's website secure? TLS configuration, DNS hygiene, security headers, and domain age analysis.

Company Intelligence

What are Microsoft 365's firmographics? Employee count, industry classification, technology stack, and corporate structure.

Trust & Compliance Verification

Does Microsoft 365 claim SOC 2, ISO 27001, HITRUST, or FedRAMP? ThirdProof scans trust pages for certification claims and cross-references the FedRAMP public registry for independent verification.

Supply Chain & Subprocessor Discovery

Who does Microsoft 365 depend on? ThirdProof discovers subprocessors from vendor-published pages and runs sanctions screening and safe browsing checks against each one.

Regulatory & Financial Filings

Has Microsoft 365 appeared in SEC enforcement filings? Is it associated with any FDIC bank failures? ThirdProof searches regulatory databases with entity verification to confirm attribution.

Full methodology, rule engine, and AI disclosure: /methodology

Seeing this in an audit? ThirdProof lets you investigate Microsoft 365 and every other vendor in your stack — average report time: 7 minutes. Get Microsoft 365's Full Report Free →

Frequently asked about Microsoft 365

Is Microsoft 365 FedRAMP authorized?+
Yes, Microsoft 365 holds FedRAMP Moderate authorization as of April 2026.
Does Microsoft 365 have SOC 2 Type II?+
No SOC 2 found. Microsoft 365 rated High Risk — recent breach reported. See all 3 findings →
Is Microsoft 365 on the OFAC sanctions list?+
Microsoft 365 returned no matches in ThirdProof's OFAC SDN, EU Consolidated, and UN sanctions screening as of April 2026.
What is Microsoft 365's vendor risk tier?+
ThirdProof assigned Microsoft 365 a risk tier of High Risk with 100% confidence based on assessment across 27 intelligence sources as of April 2026.
Can I get an auto-filled security questionnaire for Microsoft 365?+
Yes. Every ThirdProof investigation of Microsoft 365 produces two deliverables: an audit-ready risk report and a 133-question security questionnaire pre-filled with evidence from 27 independent sources. The questionnaire is mapped to SIG, SOC 2, HIPAA, PCI DSS and 9 other frameworks — answered without sending Microsoft 365 a single email or waiting for a vendor response.
Is Microsoft 365 safe to use as a vendor?+
Microsoft 365 is a productivity vendor that handles organizational documents and communications. Safety depends on their current security posture, certification status, and how they handle your specific data. ThirdProof automates this evaluation across 27 intelligence sources — sanctions databases (OFAC, EU, UN), business registration verification, adverse media scanning, and cyber risk assessment — producing a deterministic risk tier with confidence score plus an auto-filled security questionnaire. Run a free investigation to see Microsoft 365's full risk profile.
Does Microsoft 365 have SOC 2 certification?+
No SOC 2 found. Microsoft 365 rated High Risk — recent breach reported. See all 3 findings →
Has Microsoft 365 had any data breaches?+
Data breach history is an important signal for any vendor, particularly productivity platforms like Microsoft 365 that handle organizational documents and communications. ThirdProof's adverse media analysis searches multiple news APIs and public records for data breaches, security incidents, lawsuits, regulatory enforcement actions, and financial distress signals. Each finding is linked to its original source with severity classification.
Is Microsoft 365 on any sanctions lists?+
Sanctions screening is standard due diligence for productivity vendors. ThirdProof screens Microsoft 365 against OFAC SDN, consolidated international sanctions lists, and PEP databases. The screening uses entity name verification to reduce false positives. If Microsoft 365 or any associated officers appear on a sanctions list, this triggers automatic escalation to the highest risk tier.
How do I assess Microsoft 365 for vendor risk?+
Assessing Microsoft 365 as a productivity vendor involves verifying SOC 2 Type II and FedRAMP compliance, reviewing their subprocessor chain, and checking sanctions exposure. ThirdProof automates this across 27 intelligence sources in an average of 7 minutes — no questionnaires or vendor participation required. Your first 5 investigations are free.
How long does a ThirdProof assessment take?+
A ThirdProof assessment completes in an average of 7 minutes. 27 intelligence sources are queried in parallel — sanctions databases, business registries, threat intelligence feeds, certificate transparency logs, and more. The result is a deterministic risk tier with confidence score and audit-ready PDF report.
Is ThirdProof free?+
ThirdProof offers 5 free vendor assessments with no credit card required. Each assessment includes the full report — risk tier, confidence score, individual findings, executive summary, and PDF export. Paid plans start at $399/month for teams that need ongoing vendor monitoring.
Can I use a ThirdProof report as SOC 2 audit evidence?+
Yes. ThirdProof reports are designed to satisfy SOC 2 CC9.2 (vendor risk management) requirements. Each report includes SHA-256 integrity verification, methodology disclosure, source attribution for every finding, and AI content labeling. Auditors can independently verify the report's authenticity and trace each finding to its original source.
How is ThirdProof different from a security questionnaire?+
Security questionnaires require vendor participation, take weeks, and produce self-reported answers. ThirdProof queries 27 independent intelligence sources — no vendor involvement needed. Risk tiers are assigned by a deterministic rules engine (not AI opinion), and every finding links to its original source. You get an audit-ready report in an average of 7 minutes instead of waiting weeks for a questionnaire response.

Microsoft 365 is in your vendor stack. Can you prove you assessed them?

SOC 2 CC9.2, HIPAA, PCI-DSS, and CMMC all require documented vendor due diligence — not just knowing the answer, but having audit-ready evidence you verified it. Most compliance teams can't produce that documentation on demand.

ThirdProof investigates Microsoft 365 across 27 intelligence sources in an average of 7 minutes — sanctions screening, cyber posture, SOC 2 verification, FedRAMP status, and more. Every investigation produces two deliverables: an audit-ready risk report and an auto-filled security questionnaire your prospects and auditors expect to see.

✓ 5 free investigations✓ Risk report + auto-filled questionnaire✓ No credit card required✓ Average report time: 7 minutes

Replaces $600–$900 in manual compliance consulting time per vendor assessed.