Guardian Security Insights: Transforming Secure Score Into Actionable Security

Justin Kirsch | | 8 min read
Guardian Security Insights transforms Microsoft Secure Score into actionable security for financial institutions

Your Microsoft Secure Score reads 47%. The admin portal lists 60+ recommended actions sorted by point value. Some take five minutes. Some require weeks of planning and change management. The list does not tell you which ones actually reduce your risk versus which ones just raise the number.

Financial institutions face a specific version of this problem. The IBM Cost of a Data Breach Report 2025 found that breaches in financial services cost an average of $5.56 million, second only to healthcare. Institutions that detected and contained breaches in under 200 days spent $3.87 million on average. Those that took longer spent $5.01 million. The gap between those two numbers is the gap between having a score and having a plan.

Guardian Security Insights closes that gap. It takes the raw Secure Score data and transforms it into a prioritized, sequenced action plan built for regulated financial institutions. Not a generic list of Microsoft recommendations. A roadmap where each action addresses real risk, produces compliance evidence, and moves the score toward 90%+ within 90 days.

Legacy Authentication Blocked

IMAP, SMTP, POP3, and MAPI protocols disabled via Conditional Access policy

MFA Fully Enrolled (Not Just Registered)

Every user has completed second-factor setup, not just started it

Stale Accounts Disabled

Accounts inactive 90+ days identified, disabled, and licenses reclaimed

Conditional Access Policies Deployed

MFA from untrusted locations, non-compliant device blocking, high-risk sign-in restrictions

DLP Policies Active for Borrower Data

Social Security numbers, bank accounts, and NPI protected across Exchange, SharePoint, OneDrive, and Teams

Drift Detection Operational

Configuration changes to Conditional Access, Intune, DLP, and Entra ID trigger immediate alerts

If your institution cannot check every box on that list, the gap between your current score and a defensible security program is wider than the number suggests. Guardian Security Insights builds the bridge.

Why Secure Score Alone Fails Financial Institutions

Microsoft Secure Score is a well-designed measurement tool. It is not a security program. Three limitations prevent it from driving real improvement at regulated financial institutions.

What Secure Score Tells You

  • Point value for each recommended action
  • Flat list of 60+ improvements
  • Percentage across Identity, Data, Devices, Apps
  • Microsoft's generic best practices

What Guardian SI Adds

  • Risk-weighted priority based on your threat model
  • Sequenced roadmap with prerequisites mapped
  • Regulatory framework alignment (GLBA, FTC, FFIEC, NCUA)
  • Financial-services-specific configuration standards

Point value does not equal risk reduction. Blocking legacy authentication might score fewer points than configuring advanced audit logging. But legacy authentication protocols like IMAP, SMTP, and POP3 cannot enforce MFA. The 2025 Verizon DBIR found that credential abuse caused 22% of all breaches. A mortgage lender holding borrower Social Security numbers and bank account data has a different risk profile than a consulting firm with the same number of Microsoft 365 users. Secure Score does not account for that difference.

No sequencing or dependencies. Microsoft presents recommended actions as a flat list. In practice, you cannot enforce device compliance through Conditional Access until devices are enrolled in Intune. You cannot require compliant devices until you define compliance policies. You cannot roll out MFA to all users simultaneously without a phased plan. A team that picks the highest-point action first may discover it requires three other changes they have not made.

No regulatory context. Secure Score recommendations align with Microsoft security best practices. They do not map to GLBA, FTC Safeguards Rule requirements, FFIEC examination expectations, NCUA ACET domains, or state regulations like NYDFS 23 NYCRR 500. With the FFIEC CAT sunsetting on August 31, 2025, and institutions transitioning to NIST CSF 2.0 or the CRI Profile, the regulatory landscape is shifting. Your IT director needs to know which Secure Score actions satisfy regulatory requirements and which are nice-to-have improvements above the compliance floor.

Where Does Your Tenant Actually Stand?

ABT's free Security Grade assessment shows you the gaps Secure Score misses.

The Guardian Security Insights Action Plan

Guardian Security Insights takes the raw Secure Score data and transforms it into a structured action plan. Every recommended action is reordered by actual risk, mapped to prerequisites, and aligned to the regulatory frameworks your examiners use.

Comparison of default Microsoft Secure Score limitations versus Guardian Security Insights capabilities for financial institutions
Guardian SI transforms Secure Score from a flat list into a risk-weighted, regulatory-aligned action plan
Finding

Financial institutions with proactive security programs that detected and contained breaches in under 200 days spent $3.87 million on average, compared to $5.01 million for those exceeding 200 days. The 23% cost difference traces directly to prioritized remediation and continuous monitoring.

IBM SecurityCost of a Data Breach Report 2025 · Financial Services sector analysis

Here is how the action plan works across four phases.

1
Block

Eliminate highest-risk gaps in weeks 1-2

2
Harden

Deploy Conditional Access, Intune, and DLP in weeks 3-6

3
Monitor

Build continuous monitoring and drift detection in months 2-3

4
Optimize

Maintain 90%+ and adapt to regulatory changes ongoing

Phase 1: Block the Biggest Threats (Weeks 1-2)

The first actions target the highest-risk gaps regardless of point value. For most financial institutions, these are:

Block legacy authentication. IMAP, SMTP, POP3, and MAPI protocols do not support MFA. Blocking them through a single Conditional Access policy removes the most exploited attack vector from your environment. Most lenders ABT onboards have legacy auth enabled because "someone might need it." ABT has yet to find that someone. If a specific application requires legacy auth, Guardian creates a scoped exception with monitoring rather than leaving the entire tenant exposed.

Complete MFA enrollment for all users. Not registration. Completion. Guardian Security Insights identifies every user who started MFA setup but never finished the second factor. Standard Microsoft reporting counts these users as MFA-enabled. They are not. Guardian's standard practice is to send enrollment completion links with a 48-hour deadline.

Disable stale accounts. Accounts inactive for 90+ days represent both security risk and budget waste. ABT recommends disabling them and reclaiming the licenses. Guardian Security Insights surfaces every stale account with the last login date, assigned roles, and license cost.

Phase 2: Harden the Configuration (Weeks 3-6)

With the biggest threats blocked, the next phase builds the security configuration that prevents drift.

  • Deploy Conditional Access policies requiring MFA from untrusted locations, blocking non-compliant devices, and restricting high-risk sign-ins. Each policy maps to specific GLBA and FTC Safeguards Rule access control requirements.
  • Enroll devices in Intune with compliance policies covering OS version, encryption, and screen lock. Block non-enrolled devices through Conditional Access. This gives your team visibility into every endpoint touching borrower data.
  • Configure DLP policies that detect and protect Social Security numbers, bank account numbers, and other borrower data types in Exchange, SharePoint, OneDrive, and Teams. DLP is a GLBA requirement and an FTC Safeguards Rule expectation.
  • Set up email authentication with SPF, DKIM, and DMARC to prevent domain spoofing. Phishing emails spoofing your loan officers' addresses cost borrowers money and cost your institution trust.

Phase 3: Build Monitoring and Reporting (Months 2-3)

With the hardened baseline in place, Guardian Security Insights shifts to continuous monitoring that catches changes before they become problems.

Enable Secure Score trending. Guardian Security Insights tracks your score across Identity, Data, Devices, and Apps with 30/60/90-day trend lines. A score that drops on Tuesday gets investigated on Wednesday, not discovered during the quarterly review.

Configure drift detection. Any modification to Conditional Access policies, Intune compliance rules, DLP configurations, or Entra ID settings triggers a logged event. Your team sees what changed, who changed it, and whether the change creates a compliance gap.

Build compliance reporting. Guardian Security Insights maps your current control state to every applicable regulatory framework. One data set, multiple audiences: your internal team, your auditor, your examiner, your cyber insurance carrier.

Phase 4: Optimize and Maintain (Ongoing)

Once your score stabilizes above 80% and trends toward 90%, the work shifts from implementation to optimization.

Guardian Security Insights evaluates each remaining Secure Score action against your risk profile and regulatory requirements. Some recommendations in the 80-100% range involve trade-offs. Microsoft adds new Secure Score actions quarterly. When NIST updates a control, when a state regulator issues new guidance, when your cyber insurance carrier changes their questionnaire, Guardian Security Insights maps the new requirements against your existing controls and identifies gaps before your next examination.

The 90-Day Roadmap: Score to Security Program

The pattern is consistent across the 750+ financial institutions ABT serves:

MilestoneTypical Starting PointAfter Guardian SIKey Actions
Day 1Score: 35-55%Baseline documentedFull tenant assessment, risk inventory
Day 30Legacy auth enabled, MFA gapsScore jumps 20-30 pointsLegacy auth blocked, MFA completed, stale accounts disabled
Day 60No Conditional Access, no DLPScore above 75%CA policies deployed, Intune enrolled, DLP active
Day 90No monitoring, no drift alertsScore stabilizes 80%+, path to 90%Continuous monitoring, compliance reporting, drift detection
6 MonthsQuarterly manual reviewsMaintenance rhythmPrioritized daily reports, auto-generated audit evidence

After six months, the security program operates on a maintenance rhythm. Your team works from prioritized daily reports. Auditors get evidence packages that answer their questions before they ask. Cyber insurance renewals include documentation that supports premium reduction conversations.

Guardian Security Insights 4-phase actionable security pipeline from initial assessment to ongoing optimization
The Guardian SI pipeline: Block, Harden, Monitor, Optimize across 90 days

Beyond the Number: Metrics That Drive Real Security

Secure Score is one metric. Guardian Security Insights tracks the operational metrics that tell the full story of your security program.

Why a Single Score Misleads Examiners

A Secure Score of 85% with Identity at 95% and Devices at 60% is weaker than 85% with all four categories balanced. Examiners evaluate control coverage across domains, not a single aggregate number. Guardian Security Insights breaks the score into Identity, Data, Devices, and Apps with independent trend lines so your team and your examiner see the same picture.

  • MFA completion rate: Percentage of users with fully enrolled (not just registered) MFA. Target: 100%. Guardian Security Insights tracks the gap between registered and enrolled.
  • Stale account count: Number of accounts inactive beyond your policy threshold. Target: zero outside documented exceptions.
  • Device compliance rate: Percentage of devices meeting all Intune compliance policies. Target: 95%+.
  • Policy drift events per month: Unauthorized configuration changes detected. Trend should approach zero as governance matures.
  • Mean time to remediate: Hours from detection to resolution. Guardian Security Insights clients with mature processes average under 48 hours for non-critical findings and under 4 hours for critical findings.
  • Compliance gap count: Unresolved regulatory control gaps tracked against each applicable framework. Target: zero critical gaps, declining total gaps.

These metrics feed leadership dashboards and audit evidence packages. They tell two stories at once: your institution's security is improving, and you can prove it.

The attack surface has expanded with the evolution of new technologies and broadly-used remote access points, including mobile computing, smartphone applications, bring your own devices, and cellular connections.

FFIEC Authentication and Access Guidance

Pure Microsoft Architecture: Why It Matters

ABT is a cloud-first managed service provider and the largest Tier-1 Microsoft Cloud Solution Provider dedicated to financial services. ABT runs a pure Microsoft technology stack. No ConnectWise. No Kaseya. No SolarWinds. Guardian Security Insights is built on the same Microsoft tools your institution already licenses.

This architecture means Guardian Security Insights reads directly from your tenant's native APIs. No third-party data warehouse. No translation layer. No sync delays. The findings are as current as the data in your Microsoft 365 environment. When MSP platforms suffer breaches, ABT's architecture is completely unaffected because there is no third-party tooling in the chain.

ABT has managed Microsoft 365 tenants for financial institutions since 1999. Twenty-five years of configuration patterns, compliance requirements, and audit preparation across mortgage lenders, credit unions, banks, and regulated industries. Your institution's action plan is informed by that depth of experience. For a deeper look at how Guardian Security Insights sets higher standards than default Secure Score benchmarks, see our companion analysis.

Key Takeaway

Secure Score measures where you stand. Guardian Security Insights builds the roadmap to where you need to be. The difference between a number and a security program is sequencing, regulatory context, and continuous monitoring. All three come standard with the Guardian operating model.

Frequently Asked Questions

Guardian Security Insights reorders raw Secure Score recommendations by actual risk rather than point value. Each action is sequenced with prerequisites, mapped to regulatory frameworks including GLBA and FTC Safeguards Rule, and assigned estimated effort. The result is a phased roadmap starting with highest-risk gaps and building toward 90%+ across all four score categories.

Most financial institutions start between 35% and 55%. After blocking legacy authentication, completing MFA enrollment, and disabling stale accounts, scores typically jump 20-30 points in the first month. By 90 days, scores stabilize above 80% with a clear path to 90%+. Continuous monitoring and optimization maintain the score from that point forward.

Legacy authentication protocols like IMAP, SMTP, and POP3 cannot enforce multi-factor authentication, making them the primary entry point for credential-based attacks. The 2025 Verizon DBIR found credential abuse caused 22% of all breaches. Blocking legacy auth through a single Conditional Access policy removes this attack vector entirely within the first week of onboarding.

With the FFIEC CAT sunsetting August 31, 2025, institutions must transition to frameworks like NIST CSF 2.0 or the CRI Profile. Guardian Security Insights maps Secure Score controls directly to these successor frameworks, providing continuous alignment documentation that satisfies examiner expectations during and after the transition period.

Guardian Security Insights tracks MFA completion rate, stale account count, device compliance percentage, policy drift events per month, mean time to remediate findings, and compliance gap count per regulatory framework. These operational metrics provide the visibility that Secure Score alone cannot deliver and produce the evidence auditors and examiners expect.


Justin Kirsch

Justin Kirsch

CEO, Access Business Technologies

Justin Kirsch has led security posture management programs for regulated financial institutions since 1999. As CEO of Access Business Technologies, the largest Tier-1 Microsoft Cloud Solution Provider dedicated to financial services, he helps more than 750 banks, credit unions, and mortgage companies transform Microsoft Secure Score from a static metric into a defensible security program through Guardian Security Insights.