Azure compliance manager, officially part of Microsoft Purview Compliance Manager, is a tool that helps organizations manage and track their compliance with various regulations and standards.
Microsoft Purview Compliance Manager is a cloud-based solution that helps your organization simplify and manage compliance across your multicloud environment (including Microsoft 365, Azure, AWS, and GCP). It assists with taking inventory of data protection risks, managing the complexities of implementing controls, staying current with regulations, and reporting to auditors.
It provides a central dashboard to monitor progress, automate assessments against industry regulations like ISO and NIST, and digitize workflows for tracking and documenting compliance activities.
The manager allows users to assign tasks, document evidence, and provides a compliance score that reflects the organization's posture against chosen regulations.
It acts as a central hub for risk assessment, control implementation, and regulatory compliance reporting.
🔑 Key Features
Compliance Manager centralizes and streamlines your compliance activities through several core elements:
- Compliance Score: A risk-based score that quantifiably measures your progress in completing improvement actions. It helps you prioritize actions with the greatest impact on your compliance posture.
- Assessments: Groupings of controls from specific regulations, standards (like GDPR or HIPAA), or policies. It offers pre-built templates for numerous global, regional, and industry regulations, along with the ability to create custom assessments.
- Improvement Actions: Detailed, step-by-step guidance on suggested actions your organization can take to comply with the relevant standards. These actions can be assigned to users for implementation and testing.
- Controls: Requirements of a regulation, standard, or policy. Compliance Manager tracks:
- Common Control Mapping: This feature helps scale your compliance program by allowing a single improvement action to satisfy multiple requirements across several regulations, eliminating duplicate work.
- Continuous Control Assessment: Automatically scans your environment for technical controls and provides continuous status and credit results.
💡 Simplifying Regulatory Adherence
Compliance Manager simplifies regulatory adherence by:
- Centralizing and Translating Requirements: It provides a single portal to manage compliance, translating complicated regulations into understandable improvement actions and mapping them to controls.
- Prioritizing Risk: The Compliance Score helps organizations focus on the most critical actions that will have the biggest impact on reducing data protection and regulatory risks.
- Streamlining Workflow: It provides workflow capabilities, allowing you to assign, track, and monitor compliance tasks and collect necessary evidence for audits in one place.
- Providing Up-to-Date Guidance: It offers continuous regulatory updates, ensuring you stay current with the latest changes in standards and regulations.
🎯 Key Points — Purview Compliance Manager
- Centralized dashboard: Provides an overview of your compliance score, data protection status, and recommendations for various regulations.
- Automated assessments: Scans your Microsoft and even non-Microsoft cloud services (like AWS and GCP) to assess compliance with a library of over 350 regulations and standards.
- Digitized workflows: Allows you to assign, track, and document compliance-related activities, making it easier to collaborate and prepare for audits.
- Actionable guidance: Offers detailed guidance and links to enable the specific capabilities needed to meet regulatory requirements.
- Evidence management: Provides a secure repository to upload and manage compliance-related artifacts and evidence.
- Multicloud support: Integrates with services like Defender for Cloud to assess compliance across Azure, Microsoft 365, Google Cloud Platform, and AWS from a single interface.
- Customizable reporting: Generates reports, such as an Excel file, to help communicate your compliance status to auditors and stakeholders.
- Role-based access: Allows you to set permissions for different roles (e.g., administrators, assessors) to manage access to specific assessments and data.
🎯 Key Functions of Compliance Manager
Compliance Manager simplifies the complex task of meeting various industry standards and regulations (like GDPR, HIPAA, or ISO standards) by providing a structured, quantifiable framework.
- Compliance Score: It calculates a risk-based score that measures your progress in completing recommended improvement actions. This score helps you understand your current posture and prioritize efforts.
- Points are awarded based on the type of action (mandatory vs. discretionary) and its function (preventative, detective, or corrective).
- Assessments and Templates: It provides a library of ready-to-use regulatory assessment templates (over 320, covering global, regional, and industry-specific standards) that you can use to immediately start assessing your environment. You can also create custom assessments.
- Improvement Actions: It offers detailed, step-by-step guidance on suggested actions you need to take to comply with standards. These actions are often mapped to specific configuration changes you need to make in Azure or Microsoft 365.
- Control Mapping: It uses a feature called common control mapping where implementing one action can satisfy requirements across multiple regulations and standards. This eliminates redundant work.
- Continuous Control Assessment: The system continuously scans your environment to detect system settings and automatically updates the status and credit for technical controls.
☁️ Relation to Azure
While Compliance Manager is part of the broader Microsoft Purview suite, it is essential for organizations using Azure because:
- Shared Responsibility: Compliance Manager helps you manage your controls under the Shared Responsibility Model, particularly the customer-managed controls related to system configuration and organizational processes.
- Integration with Azure Policy: Although not the same, Compliance Manager complements tools like Azure Policy, which is used within Azure to enforce configurations and achieve real-time governance and compliance at scale.

Azure-related compliance, the architect relies on Compliance Manager to define the required controls and measure progress, and uses Azure Policy to automate the enforcement of those controls.
Azure Compliance Manager
Azure Compliance Manager is primarily a feature within Microsoft Purview Compliance Manager, which focuses on compliance across Microsoft 365 services (like SharePoint, Exchange, Teams) and certain Microsoft cloud services, not solely Azure infrastructure.
However, a core component for Azure infrastructure compliance and the mechanism for aligning with the controls listed in Compliance Manager is Azure Policy.
Therefore, the planning and design process for managing compliance on Azure infrastructure involves leveraging Azure Policy and the Regulatory Compliance dashboard in Microsoft Defender for Cloud, which surfaces Azure Policy initiatives related to major standards.
Microsoft Purview Compliance Manager is a unified solution to help you manage and assess your compliance posture across your multicloud environment, though it's primarily integrated with Microsoft 365 and Azure.
🧭 What is Microsoft Purview Compliance Manager?
Compliance Manager is an essential tool for an organization's compliance journey, helping with risk assessment, control implementation, staying current with regulations, and reporting to auditors.
It works on the principle of Shared Responsibility, where Microsoft manages certain controls for the cloud service, and your organization is responsible for implementing and managing your own controls.
🛠️ Key Components and How it Works
Compliance Manager simplifies the complex world of regulations through several key elements:
1. Assessments:
- It offers pre-built assessment templates for common regulations and standards (like GDPR, HIPAA, ISO 27001, etc.).
- You can also create custom assessments for your unique internal policies.
- The assessment checks your organization's adherence to the controls required by the standard.
2. Controls and Improvement Actions:
- A control is a requirement of a regulation or standard. Compliance Manager categorizes controls into:
- Microsoft-managed controls: Controls Microsoft is responsible for implementing for its cloud services.
- Your controls (Customer-managed): Controls your organization must implement.
- Shared controls: Controls where both parties have a responsibility.
- For your controls, Compliance Manager provides Improvement Actions — detailed, step-by-step guidance on what to do to meet the control requirement. You can assign these actions to users, track progress, and upload evidence.
3. Compliance Score:
- This is a risk-based, quantifiable score that measures your progress in completing the recommended improvement actions.
- Each action contributes points to your overall score, based on the potential risk involved.
- It helps you prioritize which actions to focus on for the biggest impact on your compliance posture.
4. Continuous Monitoring:
- The tool integrates with services like Microsoft Defender for Cloud and Azure Policy to automatically assess and track the status of technical controls and configurations in your Azure (and even AWS/GCP) environment.
- This provides a continuous view of your compliance status, reducing the need for manual checks.
💻 How to Start Using it (Focusing on Azure)
While Compliance Manager is accessed through the Microsoft Purview compliance portal, its connection to Azure is typically managed through Microsoft Defender for Cloud:
- Activate Azure and Defender for Cloud: You need an Azure subscription with Microsoft Defender for Cloud enabled. This is the integration point that allows Compliance Manager to pull compliance data from your Azure resources.
- Add Standards to Subscriptions: Within the Defender for Cloud Regulatory Compliance dashboard, you select and assign the standards (e.g., PCI-DSS, ISO 27001) you want to monitor for your Azure subscriptions.
- View and Act in Compliance Manager: The data from Defender for Cloud is then surfaced in Compliance Manager. You can:
- View your Compliance Score and track progress.
- See detailed Assessments for your chosen regulations.
- Work on Improvement Actions by assigning tasks, documenting steps taken, and uploading evidence for manual controls.
The connection between Microsoft Purview Compliance Manager and Azure services is based on a crucial integration with Microsoft Defender for Cloud and the core governance tool, Azure Policy.
🚀 The Core Integration: Defender for Cloud
The direct integration point that pulls Azure compliance data into Purview Compliance Manager is Microsoft Defender for Cloud's Regulatory Compliance Dashboard

Step-by-Step Integration Plan for Azure
1. Prerequisite: Enable Microsoft Defender for Cloud
You must have Microsoft Defender for Cloud (MDC) enabled on your Azure subscriptions to pull configuration and compliance data into Compliance Manager.3
- Action: In the Azure Portal, go to Microsoft Defender for Cloud and ensure it is enabled for the Azure subscriptions you want to monitor.4
- Note: At a minimum, the Foundational CSPM (Cloud Security Posture Management) plan is required to access the Regulatory Compliance dashboard that drives the integration.5
2. Define and Assign Regulatory Standards6
The standards you select in MDC become the assessments in Purview Compliance Manager.
- Action: In Defender for Cloud, navigate to the Regulatory compliance blade.7
- Assign Standards: Add the relevant industry and regulatory standards (e.g., PCI DSS v4.0, ISO 27001, Azure Security Benchmark) to your Azure subscriptions.8 This step automatically applies a corresponding Azure Policy Initiative to monitor your resources against that standard.
3. Review and Remediate with Azure Policy
The non-compliant findings reported in Defender for Cloud are directly based on the evaluation of the assigned Azure Policy Initiatives.
- Review: Examine the non-compliant resources in the Defender for Cloud dashboard.9 Each non-compliant finding is linked to a specific Azure Policy definition.
- Remediate: Use Azure Policy to enforce compliance:
- For existing non-compliant resources, create a Remediation Task.10
- For future resource creation, change the policy effect to
Denyto block non-compliant deployments.11
4. Create and View the Assessment in Compliance Manager
Compliance Manager centralizes the results from Azure, Microsoft 365, and other clouds.12
- Action: In the Microsoft Purview compliance portal, navigate to Compliance Manager.13
- Create Assessment: Select Assessments $\rightarrow$ Add Assessment.
- Choose the same regulatory standard you enabled in Defender for Cloud (e.g., ISO 27001).
- Select Microsoft Azure as one of the services to be assessed, along with the correct Azure subscription.14
- View Results: Compliance Manager will automatically pull the assessment results (compliance status) from Defender for Cloud.15
5. Manage Improvement Actions (Your To-Do List)
Compliance Manager converts the non-compliant policy findings into "Improvement Actions" and adds them to your overall Compliance Score.

Integration Outcome: By following this path, any new policy violation in your Azure environment is automatically detected by Defender for Cloud, reflected in the Regulatory Compliance dashboard, and then immediately reported as a drop in your score and a failed test in Purview Compliance Manager.
🛡️ Required Roles for Integration
The permissions are split between the two services:
1. In Microsoft Purview (or Microsoft 365 Compliance Center)
To work with assessments in Compliance Manager, you generally need one of the following Microsoft Purview portal roles (or their Microsoft Entra ID equivalents):
- Compliance Administrator
- Compliance Manager Administration (A Compliance Manager-specific role)
- Global Administrator (Least recommended due to high privilege)
These roles allow you to:
- Create and manage assessments.
- See the automated testing status pulled in from Defender for Cloud.
2. In Azure for Defender for Cloud Data Access
For Compliance Manager to successfully pull the compliance data from Defender for Cloud's Regulatory Compliance dashboard, the user or service principal interacting with the data typically needs read access to the compliance policy data in Azure.
At a minimum, for accessing the compliance data in Defender for Cloud, an account needs:
- Reader role (or a custom role with equivalent permissions) assigned at the Subscription level for the Azure subscriptions being monitored.
For more granular access or to ensure all capabilities are met (especially when setting up the initial monitoring and policy assignments within Defender for Cloud), Microsoft documentation suggests having a combination of roles on the Azure subscriptions:
- Resource Policy Contributor
- Security Admin
In summary, to view and utilize the integrated data in Compliance Manager:
- You need a Compliance Admin/Assessor role in Purview/M365.
- The underlying service needs a Reader role on the relevant Azure subscriptions to see the data in Defender for Cloud.
Here is a summary of the required permissions, licenses, and roles for working with Sensitivity Labels in Microsoft Purview:
🔒 Microsoft Purview Sensitivity Labels: Roles and Permissions
The requirements for working with sensitivity labels are divided into two main areas: Administration/Management (creating/publishing labels) and Application (applying labels to content).
1. Administration & Management (Creating and Publishing Labels)
These roles are needed to create, configure, and publish sensitivity labels and their label policies in the Microsoft Purview portal:

Best Practice: Microsoft recommends using roles with the fewest permissions needed, such as the
Information Protection Adminrole group, instead of granting aGlobal Administratorrole.
2. Application (Applying Labels to Content)
The permissions for actually applying a sensitivity label to a document or email in an Office app are generally granted through licensing and the label policy itself.
- User Roles (Applying Manually): Any end-user who has been included in the Label Policy when it was published will be able to see and apply the labels in their apps (like Word, Excel, Outlook, etc.), provided they have the correct license.
- Automatic Labeling (Data Map): For auto-labeling of non-Microsoft 365 data assets in the Microsoft Purview Data Map, labels are applied to asset metadata based on an auto-labeling policy configured by an administrator.
3. Licensing Requirements
Certain licenses are required for users to be able to apply and benefit from the protection features of sensitivity labels:

Here is a step-by-step guide for planning and designing your Azure compliance:
1. Plan and Define Compliance Scope (The "What") 🗺️
Before implementing any technical controls, define your needs:
- Identify Regulatory Requirements: Determine which specific industry regulations or internal policies your organization must comply with (e.g., ISO 27001, HIPAA, NIST SP 800–53, PCI DSS).
- Determine Scope: Pinpoint which Azure subscriptions, management groups, and resource groups host resources relevant to these regulations. Compliance should generally be applied at the highest level possible (Management Group) to ensure consistency.
- Define Target Architecture: Understand your current and future Azure architecture to know what types of resources (VMs, storage accounts, databases, etc.) need to be governed.
2. Design the Governance Hierarchy (The "Where") 🏗️
Effective compliance relies on a well-structured Management Group hierarchy:
- Management Group Structure: Design a hierarchy that aligns with your organizational structure and compliance boundaries. Policies applied at a higher management group flow down to all subscriptions beneath it.
- Best Practice: Place compliance-driven policies (like "Restrict resource locations") high up in the hierarchy to enforce them broadly.
- Principle of Least Privilege: Ensure that the identities (users, service principals) responsible for deploying and managing policies have the minimal required Role-Based Access Control (RBAC) permissions.
3. Map Requirements to Azure Policy (The "How") 📝
Azure Policy is the enforcement tool for Azure compliance.
Utilize Regulatory Compliance Initiatives:
- Navigate to the Regulatory Compliance dashboard in Microsoft Defender for Cloud.
- Add applicable standards (e.g., ISO 27001) to your subscriptions. This automatically assigns a corresponding Azure Policy initiative (a group of related policies).
Review and Select Policies:
- Examine the Built-in Policies provided by Microsoft for your chosen standards.
- Focus on Audit or AuditIfNotExists effects initially to assess your current compliance posture without blocking deployments.
Create Custom Policies (If Necessary):
- If built-in policies don't cover a specific requirement, create custom policy definitions using JSON to enforce your unique standards (e.g., specific tagging requirements).
Group Policies with Initiatives:
- Bundle related policies (Built-in and Custom) into Initiatives (Policy Sets). This simplifies management and tracking, allowing you to assign one initiative instead of dozens of individual policies.
4. Implement and Enforce Policies (The "Enforcement") 🔒
Assign Policies/Initiatives:
- Assign the selected Initiatives to the appropriate Management Groups or Subscriptions determined in your scope planning.
- Use Exclusions judiciously for specific resources or resource groups that are intentionally non-compliant (e.g., test environments).
Initial Compliance Assessment:
- After assignment, allow up to 30 minutes for the initial compliance scan to complete.
- Review the Azure Policy Compliance dashboard to see which resources are Non-Compliant.
Remediate Non-Compliant Resources:
- For policies with a
DeployIfNotExistsorModifyeffect, create Remediation Tasks to automatically bring existing non-compliant resources into compliance. - For policies with an
Auditeffect, manually fix the non-compliant resources.
Transition to Enforcement:
- Once you are comfortable with the audit results and remediation, change the policy effect from
AudittoDenyto prevent the creation of new non-compliant resources.
5. Continuous Monitoring and Reporting 📈
Compliance is an ongoing process.
- Monitoring: Regularly check the Azure Policy Compliance dashboard and the Regulatory Compliance dashboard in Defender for Cloud for new non-compliant resources.
- Reporting: Use the reporting features in Defender for Cloud to generate high-level compliance reports for auditors and stakeholders.
- Automation: Integrate your policies with CI/CD pipelines (Policy as Code) to shift compliance left and block non-compliant deployments early in the development process.
- Review and Update: Regulations and your cloud environment evolve. Review and update your assigned initiatives and policies at least annually.
Licensing For Compliance Manager:
Microsoft Purview Compliance Manager depend heavily on your licensing agreement. Here is a breakdown of the licensing for Compliance Manager, focusing on the two main aspects:
Access to the Tool
Access to Premium Assessments
🔑 1. Access to the Compliance Manager Tool
Basic access to the Microsoft Purview Compliance Manager portal and its core features, including your Compliance Score and the Microsoft Data Protection Baseline assessment, is typically included with many Microsoft 365 and Office 365 licenses.
Generally, you need at least a license from one of the following tiers for the user to be able to access the service:

Important Licensing Note:
- User-Based Licensing: The general rule from Microsoft is that everyone who benefits from the service must have an assigned subscription license that includes Compliance Manager. This means every user who reads, edits, or manages data in Compliance Manager needs a compliant license.
- Access is Role-Based: Even if a user has a compliant license, they need to be assigned a specific role (Reader, Contributor, Assessor, etc.) to access the data within Compliance Manager.
📈 2. Premium Regulatory Assessments (Add-ons)
The extensive library of compliance templates for specific, high-stakes regulations (e.g., certain country-specific, industry-specific, or advanced international standards) are considered Premium Assessments and require additional licensing.

Key Details on Premium Assessments:
- Add-on Purchase: This is often a separate add-on SKU purchased monthly or annually.
- Per-Regulation License: When you purchase the add-on, it grants you a license to activate a certain number of these premium regulatory templates (regulations) for a period (e.g., one year).
- Trial Available: Microsoft often offers a one-time trial to use a limited number of premium assessments (e.g., 25 templates for 90 days) so you can evaluate them before purchase.
Since licensing details can change and have specific variations (especially for GCC, education, and volume licensing), it is always best practice to consult the most current Microsoft Licensing Documentation or work directly with a Microsoft representative or certified partner.
Conclusion:
Microsoft Purview Compliance Manager provides a unified, strategic solution for monitoring and managing Azure compliance by acting as an aggregator and workflow engine for various regulatory and industry standards.
The key conclusion is that Compliance Manager transforms compliance from a static audit requirement into a dynamic, measurable, and continuous improvement process by leveraging its core features, especially through its integration with Microsoft Defender for Cloud and Azure Policy.
Key Takeaways for Azure Compliance Monitoring

In short, for any organization utilizing Azure, Compliance Manager acts as the single pane of glass to assess, track, and prove adherence to necessary compliance frameworks.