Skip to main content

Compliance Manager Assessment

Purview Compliance Manager provides assessment templates that map Microsoft 365 configuration actions to specific compliance framework controls. Each assessment identifies Microsoft-managed controls (Microsoft's responsibility as the cloud provider) and customer-managed controls (your organization's responsibility as the tenant administrator).

Navigate to Purview Compliance Portal > Compliance Manager > Assessments and create a new assessment using the template for your framework.

CMMC Level 2 Assessment

Create a new assessment using the CMMC Level 2 template.

Assessment scope

The CMMC Level 2 assessment in Compliance Manager maps to NIST SP 800-171 Rev. 2 controls — consistent with the DoD CMMC Final Rule mandate. It does not constitute a formal CMMC assessment or C3PAO audit, but serves as an internal readiness measurement tool and evidence repository for your SSP.

Priority Customer-Managed Actions: Data Protection — CMMC Level 2

The following are the highest-priority customer-managed action items in the CMMC Level 2 assessment addressed by Purview configuration, corresponding to the controls in Section 11-1: Data Protection Requirements.

Action ItemCMMC ControlPurview ImplementationEvidence
Implement data classification and labelingAC.L2-3.1.3Sensitivity labels with CUI scope published to users and applied via auto-labeling policies in SharePoint, OneDrive, and ExchangePurview Content Explorer — labeled item count by label; Activity Explorer — label-applied events
Encrypt CUI at restSC.L2-3.13.16Sensitivity labels (CUI, SP-CTI, SP-EXPT) configured with AES-256 encryption restricting access to tenant-internal identitiesCompliance Manager improvement action status; Purview Activity Explorer — protection-applied events
Enforce FIPS-validated cryptographySC.L2-3.13.11Microsoft's FIPS 140-2 validated cryptographic modules underpin sensitivity label encryption in GCC High — no additional configuration requiredReference Microsoft's FIPS 140-2 cryptographic module validation certificates in your SSP
Implement data loss prevention for CUIAC.L2-3.1.3DLP policies in Exchange, Teams, SharePoint, and OneDrive blocking external sharing of CUI-labeled or CUI-matching contentDLP policy match reports; Purview DLP Alerts — override and incident review
Control removable media for CUIMP.L2-3.8.1, MP.L2-3.8.7Intune Device Control XML (Chapter 10) restricts USB write access; Purview Endpoint DLP policy blocks copy of labeled content to removable mediaMDE Device Control events (Advanced Hunting); Purview Endpoint DLP alerts

Classify & Protect: Setup Steps — CMMC

  • [ ] Create the label taxonomy from Section 11-1: Public, Internal, CUI, CUI // SP-CTI, CUI // SP-EXPT.
  • [ ] Configure encryption on CUI, SP-CTI, and SP-EXPT labels. Restrict decryption to your tenant's Entra ID groups representing CUI-authorized personnel.
  • [ ] Publish labels to all users with a default label policy. Set Internal as the document default; require justification to downgrade from CUI.
  • [ ] Enable auto-labeling for Exchange and SharePoint using built-in Sensitive Information Types for CUI categories (e.g., U.S. export-controlled content, DoD contract numbers).
  • [ ] Enable container labels on SharePoint sites and Teams used for CUI — enforce private membership, external sharing off, and unmanaged device restrictions.

Detect & Enforce: DLP Setup Steps — CMMC

  • [ ] Create DLP policies for Exchange, SharePoint, OneDrive, and Teams:
    • Block or encrypt external sharing of CUI-labeled content.
    • Require business justification + manager approval for overrides.
    • Show policy tips in-client; notify the security team on incidents.
  • [ ] Enable Endpoint DLP on managed Windows devices:
    • Control copy-to-USB, print, clipboard, and browser upload when content matches CUI labels or Sensitive Information Types.
    • Block sync to personal cloud storage (consumer OneDrive, Google Drive, Dropbox).

Improvement Score Expectations — CMMC Level 2

A newly provisioned GCC High M365 tenant typically scores 30–40% on the CMMC Level 2 assessment before customer configuration — the Microsoft-managed controls (datacenter physical security, platform encryption, service availability) are already credited. After deploying the configurations in this book (Conditional Access, Intune baselines, Defender, and Purview labels/DLP), expect 60–75% score. The remaining gap is typically administrative controls — policy documentation, physical security attestations, and personnel security actions — that Compliance Manager cannot verify programmatically and must be manually attested.

📩 Don't Miss the Next Solution

Join the list to see the real-time solutions I'm delivering to my GCC High clients.