How It Works

The compliance industry builds paper cathedrals.
We build systems.

This isn't an AI tool you figure out yourself. It's a managed service delivered by one of the most experienced Microsoft security partners in the industry — with 30 years of expertise encoded into a platform that scales what we know to every customer we serve.

Here's what happens when you engage with us.

Phase 1

Assess your environment

Week 1

Our team

A GMS security consultant reviews your M365 tenant against 250+ CIS benchmark recommendations for Microsoft 365. Not a generic questionnaire — a structured assessment of your actual Entra ID, Defender, Intune, and Purview configuration.

We assess your Zero Trust maturity across seven pillars: identity, endpoints, data, apps, infrastructure, network, and visibility. Every gap maps to a specific capability we can deploy.

The platform

The assessment engine runs automated CIS checks against your tenant via Microsoft Graph. Each recommendation produces a pass/fail result with specific remediation guidance — including the PowerShell script or portal path to fix it.

The output is a scoped Statement of Work generated automatically from your gaps — not a generic proposal, but a plan built from your actual tenant state.

Phase 2

Configure your security

Weeks 2-8

Our team

GMS engineers deploy your security foundation in a structured sequence — 78 capabilities across three plans, each building on the last. We don't hand you a checklist. We configure your tenant, validate every setting, and manage the rollout across your user base.

  • Foundation (2-4 weeks): Email auth, 41 Conditional Access policies, CIS baselines
  • Endpoint (4-6 weeks): 1,298 app packages, 1,000+ device policies, Defender, PIM
  • Information Governance (6-8 weeks): DLP, sensitivity labels, AI governance, Copilot readiness
The platform

Every configuration is tracked against CIS v6.0.1 benchmarks. Intune policy sets are aligned to CIS Level 1 recommendations. Drift detection monitors for configuration changes — if a Conditional Access policy is modified or disabled, the platform flags it before the next evidence collection run.

Evidence collection begins from day one. By the time we reach Plan 3, you have months of compliance history before any auditor arrives.

Phase 3

Prove you're compliant

Ongoing

Our team

We write your ISMS policies — not from templates, but from your actual configuration. Your A.8.1 endpoint policy references your Intune compliance profiles, your BitLocker encryption threshold (≥95%), your Defender for Endpoint onboarding target. An auditor can verify every claim by navigating to the portal path in the policy.

When the auditor arrives, our team is there. We've prepared for this — 780 auditor questions, classified by difficulty, mapped to controls, with evidence ready for each one.

The platform

107 collection scripts query your tenant on schedule. Each ISO 27001 control is decomposed into weighted compliance rules with specific thresholds. Your compliance score is updated daily. Screenshots from the M365 admin portal are captured alongside API evidence — auditors see both the data and the portal view.

115 evidence reports are generated per collection run. Non-compliant rules automatically create corrective action tickets. When the rule passes on two consecutive checks, the ticket auto-closes.

Phase 4

Stay compliant

Continuous

Our team

Compliance isn't a project — it's an ongoing managed service. GMS monitors your compliance posture, responds to incidents synced from Microsoft Defender, manages corrective actions through ConnectWise, and prepares you for surveillance audits.

When regulations change, when Microsoft updates features, when your organisation grows — we adapt the configuration and update the policies. Your ISMS stays current because we're operating it, not just advising on it.

The platform

14 ISMS registers run continuously — risk, assets, incidents, training, legal requirements, suppliers, corrective actions, and more. They're not spreadsheets. They're live registers fed by real data, cross-referenced so a risk links to its controls, controls link to evidence, evidence links to corrective actions, and corrective actions link to tickets.

Risk Control Evidence Corrective Action Ticket

The AI layer: 30 years of expertise, available on demand

The AI doesn't replace our team. It preserves what we've learned operating M365 tenants for 1,200+ customers and encodes it into a system that scales.

It answers auditor questions

780 questions mapped to controls. Three AI models working together — fast triage, evidence retrieval from your tenant, deep compliance reasoning with cited evidence. Tiered citations: Evidenced, Framework, Advisory.

It says "I don't know"

When evidence is missing, the AI tells you. No fabrication. That's how you know the positive answers are trustworthy. It also probes deeper — following up on misconceptions like a Big 4 assessor would.

It preserves institutional knowledge

107 collection scripts encode what we've learned. 105 risk definitions encode what we've seen go wrong. When someone leaves your team, the knowledge stays in the system.

Why this works when other approaches don't

vs. Consulting firms

They write policies from templates and leave. We operate the systems we secure. Our policies reference your actual configuration because we configured it.

vs. Generic GRC platforms

They connect to 400 platforms superficially. We go deep into one ecosystem — Microsoft 365 — with 250+ CIS checks, 107 collection scripts, and policies that name specific portal paths.

vs. AI compliance startups

They read the ISO standard last month. We've been delivering Microsoft security for 30 years. The AI encodes our expertise — it doesn't replace it.

vs. Doing it yourself

You'd need to write 107 collection scripts, decompose 93 controls into weighted rules, build 14 ISMS registers, and map 78 M365 capabilities to ISO requirements. We've already done it.

The outcome isn't a certificate. It's a moat.

When compliance is embedded in operations — not bolted on top — it becomes a competitive advantage that competitors can't replicate. Sophisticated buyers are learning to tell the difference between paper compliance and operational compliance.

"What would it mean if you could answer any auditor question in sixty seconds? That's not a compliance programme. That's a competitive advantage."