Frontrow Technology
← All insights & guides
Guide

Compliance — APRA CPS 230

APRA CPS 230 — the operational risk readiness checklist for Microsoft 365 estates (2026)

APRA CPS 230 took effect July 2025 across APRA-regulated entities. The readiness checklist for Microsoft 365 estates — critical operations register, service provider register, scenario analysis, business continuity, and how the Microsoft 365 control stack evidences each.

Sam Williams · Last reviewed 14 May 2026 · 8 min read

APRA Prudential Standard CPS 230 Operational Risk Management took effect 1 July 2025 across APRA-regulated entities in Australia — banks, insurers, super funds and the broader prudentially regulated sector. CPS 230 is the operational-risk counterpart to CPS 234 (information security): where CPS 234 governs how you protect information assets, CPS 230 governs how you operate critical business functions resiliently — including the technology systems they depend on. Most APRA entities had a 12-month grace period to formally embed the framework; that grace has now expired, and the framework has its first round of supervisory letters out.

For any APRA-regulated entity running on Microsoft 365, Azure, or Microsoft Dynamics, CPS 230 has direct implications. The framework expects four named registers, scenario testing, and demonstrable business continuity — and Microsoft's tenant must be evidenced as part of the control set. Below is the readiness checklist for Microsoft 365 estates.

What CPS 230 actually requires

CPS 230 codifies five operational-risk pillars. (1) Operational risk management framework — a documented framework covering identification, assessment, treatment and monitoring. (2) Critical operations register — a list of the business activities the entity considers critical (the threshold is loss of which would materially affect customers, members or financial stability). (3) Tolerance for disruption — for each critical operation, the maximum acceptable disruption duration. (4) Service provider register — every material service provider supporting a critical operation, with risk treatment plans. (5) Scenario analysis and business continuity — scenarios tested at least annually, BCP and recovery plans documented and tested.

Where Microsoft 365 fits in the registers

Microsoft 365 (Exchange Online, SharePoint Online, OneDrive, Teams) is almost always a material service provider for at least one critical operation in an APRA-regulated entity — usually customer communications, internal collaboration, and document management. Microsoft Entra ID is universally on the register as the identity provider supporting every critical-operation application. Microsoft Azure underpins many entity-specific applications. Each Microsoft service that supports a critical operation needs an entry in the service provider register with risk treatment.

The Microsoft 365 readiness checklist

1. Service provider register entries

  • Microsoft 365 (Exchange Online, SharePoint Online, OneDrive, Teams) — categorise as material service provider; document the critical operations supported; risk treatment includes Microsoft's SOC 2 / ISO 27001 / IRAP attestations as third-party assurance.
  • Microsoft Entra ID — identity provider for every critical-operation app. Material by definition.
  • Microsoft Azure — for entity-specific applications running in Azure. Per-app entry.
  • Microsoft Defender XDR and Microsoft Sentinel — security service providers; document monitoring coverage.
  • Any third-party SaaS integrated with M365 (DocuSign, Salesforce, AdobeSign, etc.) supporting a critical operation — separate entry per provider.

2. Tolerance for disruption — Microsoft 365 outages

Microsoft's SLA on M365 is 99.9 percent uptime — roughly 8.76 hours of permitted unavailability per year. APRA's expectation is that critical operations have a documented tolerance for disruption. Define explicitly: what's the maximum we can be without Exchange before customer-facing service degrades meaningfully? What's the maximum without Teams before incident-response coordination is compromised? Document the tolerance, then check whether Microsoft's SLA falls inside it. For most APRA entities, the SLA is acceptable for the longest-tolerable single outage but does not cover repeated short outages or workload-specific incidents.

3. Scenario analysis

CPS 230 expects scenario testing at least annually. The Microsoft-relevant scenarios to test: tenant-wide M365 outage (Microsoft has had multi-hour outages), regional Azure outage affecting the entity's Azure-hosted apps, Entra ID identity outage (most-impactful — affects every app federated to Entra), ransomware encrypting M365 data, insider abuse of a privileged Entra role. Each scenario needs a documented run-through with business and IT, an after-action review, and updates to the BCP.

4. Business continuity — Microsoft 365 specifics

  • Microsoft 365 backup — Microsoft's native retention does not constitute a backup for CPS 230 purposes. Deploy a third-party M365 backup (AFI, Veeam, Spanning, Druva) covering Exchange, SharePoint, OneDrive and Teams.
  • Break-glass identity — two break-glass Global Admin accounts with phishing-resistant MFA, credentials physically secured, monitored for any sign-in, and tested quarterly.
  • Out-of-band communications — Microsoft 365 cannot be the only communications channel during an M365 outage. Document an OOB channel (SMS distribution, third-party notification tool, or a competing comms platform for the duration of the incident).
  • Documented restore runbook — for each critical operation, the documented restore path. Where the Microsoft service is the bottleneck (e.g. SharePoint outage), the restore path may involve switching to alternate sites or temporary workflows.

5. Monitoring — Microsoft service health and security signals

Wire Microsoft Service Health alerts to the incident management channel. Microsoft Sentinel ingestion of Defender XDR, Azure Activity and Entra ID sign-in logs gives the security operations team visibility. APRA notifiable cyber incidents (CPS 234) pathway is documented separately but operates from the same signal set.

What APRA supervisors are asking for

Early supervisory feedback on CPS 230 in 2026 has surfaced consistent themes. Supervisors want to see the registers as living documents, not annual artefacts. They expect scenario analysis to be specific (named scenarios, named participants, named decisions) not generic (table-top BCP run-through). They look for evidence that material service provider risk treatments are actually monitored — not just signed-off attestations from the provider, but ongoing monitoring of incidents, outages and security events. For Microsoft 365 specifically, supervisors are looking for tenant-specific tolerance for disruption, not just acceptance of Microsoft's general SLA.

How CPS 230 interacts with CPS 234

CPS 234 covers information security; CPS 230 covers operational risk and resilience. They overlap on cyber incidents — a ransomware incident is both an information security event (CPS 234) and a critical-operation disruption (CPS 230). APRA's expectation is that both frameworks are exercised through the same incident — not a separate cyber incident process and separate operational risk process. Pair them in your scenario tests.

Microsoft 365 control evidence map for CPS 230

Most CPS 230 controls map onto Microsoft 365 capabilities that the tenant has already paid for: Entra ID conditional access, PIM, sign-in logs as identity-control evidence; Defender XDR and Sentinel as monitoring evidence; Purview audit log retention as change-history evidence; third-party backup as restore evidence; Microsoft Service Health as outage evidence. The work is wiring these into the operational risk framework, not buying new tools.

Try it

Score the underlying control posture

CPS 230 evidence assumes a baseline Microsoft 365 control posture. Score where you sit on Essential Eight as the foundation.

Score each of the 8 strategies

Where are you on the Essential Eight — honestly?

Eight strategies. Four levels each. Pick the statement closest to your reality today. We'll map it to the Microsoft 365 tooling that closes the gap.

What's your target Maturity Level?

Maturity Level 2 — most orgs' pragmatic target

  • 01

    Application control

    Only approved applications can execute on workstations and servers.

  • 02

    Patch applications

    Internet-facing apps, browsers, Office, PDF readers patched promptly.

  • 03

    Microsoft Office macros

    Macros disabled unless from trusted locations and signed by a trusted publisher.

  • 04

    User application hardening

    Web browsers and productivity apps hardened against the most common attacks.

  • 05

    Restrict administrative privileges

    Admin accounts limited, separated and reviewed — the crown jewels of the tenant.

  • 06

    Patch operating systems

    Operating system patches applied on a schedule that matches the risk.

  • 07

    Multi-factor authentication

    MFA everywhere that matters — privileged accounts, remote access, important data.

  • 08

    Regular backups

    Backups of important data, configuration and software — and restores you have actually tested.

Try it

Score NDB readiness

The cyber-incident pathway under CPS 230 ties to NDB scheme obligations. Score readiness.

10 questions · 5 domains

Notifiable Data Breach Readiness Check

Under the NDB scheme you have 30 days from awareness to assess whether a breach is notifiable, and you must then notify OAIC and affected individuals as soon as practicable. Score whether your Microsoft 365 tenant can detect, scope, notify, remediate and improve fast enough to meet the clock. Pick the option closest to your tenant today.

Domain 1

Detect

Mean time to detect a personal information breach. Without detection, the 30-day clock never starts and the breach gets discovered when an affected individual raises it.

  • What's your estimated mean time to detect a personal-information breach in your M365 tenant?

    Source: OAIC Notifiable Data Breaches Report (median discovery times); Microsoft Learn: Microsoft Defender XDR.

  • What's your Purview Audit log retention?

    Source: Microsoft Learn: Microsoft Purview Audit (Premium); Audit log retention policies.

Domain 2

Scope

How quickly you can determine which individuals' personal information was accessed, exfiltrated or modified. The scoping work is what feeds the OAIC notification.

  • Can you reconstruct the scope of a data exposure (which files accessed, by whom, exfiltrated where) within 7 business days?

    Source: Microsoft Learn: Microsoft Purview eDiscovery (Premium); Microsoft Defender for Cloud Apps file investigation.

  • Can you determine which categories of personal information were involved (health, financial, government identifier) without a manual file-by-file review?

    Source: Microsoft Learn: Microsoft Purview sensitive information types; Trainable classifiers in Microsoft Purview.

Domain 3

Notify

Whether you have a documented notification flow, OAIC contact established, communications templates ready, and legal review pre-arranged.

  • Do you have a documented notifiable data breach response runbook covering OAIC notification, individual notification and stakeholder communications?

    Source: OAIC Notifiable Data Breaches scheme — entity guidance; Privacy Act 1988 s 26WK (notification timing).

  • Are individual notification templates pre-drafted and legally reviewed?

    Source: OAIC: Notifying individuals about an eligible data breach; Privacy Act 1988 s 26WL.

Domain 4

Remediate

Whether the organisation can contain the breach (rotate credentials, revoke tokens, disable accounts, isolate devices) within hours, and preserve evidence for forensic analysis.

  • Do you have containment runbooks for the common breach patterns (compromised user, compromised service principal, compromised endpoint)?

    Source: Microsoft Learn: Investigate and respond to incidents in Microsoft Defender XDR; Microsoft Sentinel automation rules and playbooks.

  • How is evidence preserved during containment to support OAIC investigation and post-incident review?

    Source: Microsoft Learn: Microsoft Purview Audit; Microsoft Defender for Endpoint live response; ISO 27037 digital evidence handling.

Domain 5

Continuous improvement

Whether tabletop exercises run, post-incident reviews update controls, and OAIC published trends inform internal control updates.

  • When did you last run a tabletop exercise for a notifiable data breach scenario?

    Source: OAIC Notifiable Data Breaches Report (sectoral trends); ASD Cyber Incident Response Plan guidance.

  • After a real or simulated incident, how are control updates tracked through to closure?

    Source: ASD Cyber Incident Response Plan guidance; ISO 27035 information security incident management.

This is an indicative self-assessment. It is not a substitute for an incident readiness exercise or legal advice. Frontrow Technology offers a Notifiable Data Breach readiness review with a tabletop exercise.

Want us to run this with your team?

30 minutes. No deck. We'll walk through your tenant, your priorities, and the next sensible move.