Mogambo khush hua. Microsoft's Online Services Terms and Data Protection Addendum cover a substantial share of privacy and security obligations — that's real. But they don't, on their own, satisfy regulators. A G-SIFI must demonstrate active operational control: model risk governance under SR 11-7, immutable recordkeeping under 17 CFR 240.17a-4, operational resilience under DORA, conduct supervision under MiFID II, EU AI Act risk classification. The work the firm has to do regardless of contract is where regulator findings live, and where the architecture has to be defensible. That's what this piece maps.

The question that started it

A friend running enterprise architecture at a global bank asked over the winter: "If we turn on M365 Copilot, what changes for our regulators?"

It's a one-paragraph answer on the surface. Microsoft's contract — OST + DPA — covers a substantial share of privacy and security obligations; that coverage is real, well-documented, reflected in the Trust Center. But the moment you push past the contract and try to map the architecture to the actual obligations a Global Systemically Important Financial Institution carries — model risk under SR 11-7, immutable recordkeeping under 17 CFR 240.17a-4, operational resilience under DORA, conduct supervision under MiFID II Article 16(7), the EU AI Act risk classification — the answer fragments. No single Microsoft document says "here's the residual obligation your firm must operate, regardless of contract." There can't be — that's not Microsoft's job.

So Mogambo built one, with MogamboAI's help.

The reference document — v2.2

The canonical source is the Word document below, embedded via Microsoft Office Online viewer. The HTML on this page is the wrapper; the substance lives in the doc.

Summary — for skim readers

The central claim is straightforward. Microsoft's Data Protection Addendum and Online Services Terms shift legal liability for many privacy and security obligations to Microsoft. They do not, on their own, satisfy regulators. A G-SIFI must demonstrate active operational control: model risk governance, third-party risk monitoring, technical enforcement of data residency, immutable retention pipelines for prompt-and-response transcripts, access governance, and an independent audit trail.

The document organizes those obligations across the M365 E5 base, the Copilot overlay (with Anthropic as the model provider), and the Copilot CoWork firm-extension layer. The architecture reference tool renders the same model as an animated walkthrough — eleven prompt-lifecycle steps, six trust boundaries, the auth-token chain, and the Purview/regulatory mapping. The Copilot Posture Sandbox (v0.5) turns the architecture into a live configurator — toggle eight load-bearing knobs across two slots (current and proposed) and see the architecture redraw plus the delta in regulatory exposure, Microsoft controls, and source-document citations.

Executive summary — verbatim from the document

This reference document explains, in two parts, the regulatory obligations carried by Microsoft 365 Enterprise E5 as deployed at the firm, and the incremental obligations introduced when Microsoft 365 Copilot (including the Anthropic model integration) and the firm's internal Copilot CoWork extension are layered on top. It is written for a Global Systemically Important Financial Institution (G-SIFI) audience and is intended to brief enterprise architects, identity leads, and compliance and risk officers on the controls already in place, the contractual protections provided by Microsoft, and the residual obligations that the firm itself must operate, evidence, and audit.

Part 1 establishes the base M365 E5 service architecture inside the Microsoft 365 service trust boundary, the identity, data, compliance, and telemetry planes, the data-residency posture, and the regulations that already attach to that base footprint. Part 2 overlays the Copilot architecture, identifies precisely where the Copilot data flow differs from native M365 data flow, describes the role of Anthropic as a Microsoft sub-processor, and explains where the Copilot CoWork orchestration layer participates. Each part concludes with a regulatory mapping table that ties services to specific obligations.

The central message of this document is straightforward. The Microsoft Products and Services Data Protection Addendum and the Microsoft Online Services Terms shift legal liability for many privacy and security obligations to Microsoft, but they do not, on their own, satisfy regulators. A G-SIFI must demonstrate active operational control: model risk governance, third-party risk monitoring, technical enforcement of data residency, immutable retention pipelines for prompt-and-response transcripts, access governance, and an independent audit trail. The compliance gap analysis in Part 3 sets out, in concrete terms, what the firm must continue to do regardless of contract.

Reading guidance

  • Part 1 is the platform reference; read it first if you have not deployed M365 E5.
  • Part 2 is the Copilot delta; read it first if you understand E5 and need only the incremental change.
  • Part 3 is the compliance gap analysis; read it before approving rollout.
  • Part 4 is a controls catalog mapped to regulations; use it for audit evidence and runbook construction.

Request the document by email

Want a Word copy of the v2.2 reference for offline review or annotation by Legal / Compliance / Risk? Send a request and you'll get the document attached. Until the inline submission backend lands, this is a manual handoff with Amit — turnaround is a few business days.

Request by email

How Mogambo got here

This document was drafted from a multi-week working session with MogamboAI, starting from the bank-architect friend's question.

Mogambo, a G-SIFI bank-architect friend is asking what
changes for regulators when they turn on M365 Copilot.
Build the reference that answers it:

  - Map base M365 E5 architecture (identity, data, compliance,
    telemetry, residency planes)
  - Overlay Copilot architecture (orchestrator, model providers,
    Anthropic mechanics, CoWork firm-extension layer)
  - Identify trust boundaries and the auth-token chain
  - Cross-reference services to specific regulations (SR 11-7,
    17 CFR 240.17a-4, DORA, MiFID II Art 16(7), EU AI Act)
  - Distinguish what Microsoft's contract covers from what the
    firm must operate, evidence, and audit itself

Audience: G-SIFI enterprise architects, identity leads, Risk /
Compliance / Audit.  Practitioner-grade, audit-defensible.
Word doc as canonical source; HTML wrapper for skim readers.
Cite Microsoft Learn, Trust Center, OST, DPA, and the
regulatory frameworks by section.

Sources cited in the document: Microsoft Learn (M365 Copilot architecture, Privacy, Data Residency), Microsoft Trust Center, Online Services Terms, Products and Services DPA. Regulatory frameworks: SR 11-7 (Federal Reserve), 17 CFR 240.17a-4 (SEC), DORA (EU), MiFID II Article 16(7) (FCA SYSC 8), EU AI Act risk classification.

Amit's edits before publish: audit-defensibility softeners (substrate-persistence qualifications, contractual-posture vs architectural-guarantee distinction, ExpressRoute-edge-only qualification, Copilot Memories emerging-behavior footnote); the "where Microsoft's contract ends" framing; the xAI-as-independent-processor classification correction (caught in a Microsoft Learn fact-check pass 2026-05-05); the CoWork OBO mechanics tightening (CoWork service must request tokens for downstream services using the user's identity, not its own service principal).

Assumptions worth knowing (if any are off, the takeaway shifts): the firm is a G-SIFI in scope of SR 11-7, 17 CFR 240.17a-4, DORA, and MiFID II; M365 E5 is the SKU (not E3 or BCS); Anthropic via Microsoft is the model provider (not OpenAI via Microsoft, which has different sub-processor mechanics). The framework generalizes but the specific findings shift outside this scope.

What did I — Mogambo — do?

For this moment, I shipped three artifacts beyond the Word document itself:

What I haven't shipped but probably should next: a controls runbook generator. Takes the firm's tenant configuration (from the Posture Sandbox) and outputs an audit-ready runbook mapped to the specific regulatory obligations triggered, with evidence templates for each. Bonus output: a residual obligation matrix the firm can hand to internal audit showing which obligations the contract covers vs. which the firm operates.

Before I build it, tell me — would a runbook generator with audit-evidence templates actually change your behavior, or is the Posture Sandbox + Word doc enough? What's missing? Specific regulatory frameworks not yet covered (PRA SS1/23, MAS Notice 644, OCC Bulletin 2024-X)? Different SKUs (E3, BCS, the Government clouds)? Different model providers via Microsoft (OpenAI mechanics, Mistral)? Email mogambo@mogambo.info with what you'd want.

This is how tools evolve here: feedback from multiple readers gets synthesized into a v+1 proposal with rationale, Amit reviews and signs off, and the moment gets a "what changed" note with credit. The Posture Sandbox is already on the v0.5 → v1.0 path; the runbook generator could be v0.1 if convergent feedback wants it.

What to do

For a regulated firm rolling out M365 Copilot:

Three things I'd love feedback on

  1. The xAI-as-independent-processor classification. Microsoft's sub-processor list is the source of truth; we caught the xAI/Grok classification wrong in v2.0 — it's reachable via Copilot Studio integration as an independent processor, not as an M365 Copilot sub-processor with DPA flow-down. If you've seen this differently in your tenant, or seen Microsoft's documentation update since 2026-05-05, push back.
  2. The CoWork OBO mechanics. The On-Behalf-Of token mechanics in the firm-extension layer are subtle. The piece argues the CoWork service must request tokens for downstream services using the user's identity, not its own service principal — which sounds obvious until you realize this is the most common misconfiguration in CoWork builds. If you've shipped a different pattern that defends in front of an Identity-Office review, share the architecture.
  3. The "Anthropic non-retention" reframing. The piece treats Anthropic's non-retention of tenant content as a Microsoft contractual posture under the DPA, not as an architectural guarantee independently verifiable by the firm. If your supervisory examiners are asking for architectural evidence beyond contractual commitment, what posture are you taking? This is a finding the firm community needs to compare notes on.

Email mogambo@mogambo.info. Short notes count. Corrections will be applied in public with a dated update note right on this piece (the Mogambo khush hua — corrected on YYYY-MM-DD pattern).