π Microsoft Entra ID Tenant Creation is set to Yes π’
- Contextual name: π Tenant Creation is set to Yes π’
- ID:
/ce/ca/azure/microsoft-entra-id/disable-tenant-creation
- Located in: π Microsoft Entra ID
Flagsβ
- π’ Policy with categories
- π’ Policy with type
- π’ Production policy
Our Metadataβ
- Policy Type:
COMPLIANCE_POLICY
- Policy Category:
SECURITY
Logicβ
- π§ prod.logic.yaml π’
Descriptionβ
Descriptionβ
Require administrators or appropriately delegated users to create new tenants.
Rationaleβ
It is recommended to only allow an administrator to create new tenants. This prevent users from creating new Microsoft Entra ID or Azure AD B2C tenants and ensures that only authorized users are able to do so.
Impactβ
Enforcing this setting will ensure that only authorized users are able to create new tenants.
Auditβ
From Azure Portalβ
- From Azure Home select the Portal Menu.
- Select
Microsoft Entra ID
.- Under
Manage
, selectUsers
.- Under
Manage
, selectUser settings
.- Ensure that
Restrict non-admin users from creating tenants
is set toYes
.From PowerShellβ
Import-Module Microsoft.Graph.Identity.SignIns Connect-MgGraph -Scopes 'Policy.ReadWrite.Authorization' Get-MgPolicyAuthorizationPolicy | Select-Object -ExpandProperty DefaultUserRolePermissions | Format-List
Review the
DefaultUserRolePermissions
section of the output. Ensure thatAllowedToCreateTenants
is notTrue
.Referencesβ
... see more
Remediationβ
Remediationβ
From Azure Portalβ
- From Azure Home select the Portal Menu.
- Select
Microsoft Entra ID
.- Under
Manage
, selectUsers
.- Under
Manage
, selectUser settings
.- Set
Restrict non-admin users from creating tenants
toYes
.- Click
Save
.From PowerShellβ
Import-Module Microsoft.Graph.Identity.SignIns Connect-MgGraph -Scopes 'Policy.ReadWrite.Authorization' Select-MgProfile -Name beta $params = @{ DefaultUserRolePermissions = @{ AllowedToCreateTenants = $false } } Update-MgPolicyAuthorizationPolicy -AuthorizationPolicyId -BodyParameter $params
policy.yamlβ
Linked Framework Sectionsβ
Section | Sub Sections | Internal Rules | Policies | Flags |
---|---|---|---|---|
πΌ CIS Azure v2.1.0 β πΌ 1.3 Ensure that 'Restrict non-admin users from creating tenants' is set to 'Yes' - Level 1 (Manual) | 1 | |||
πΌ CIS Azure v3.0.0 β πΌ 2.3 Ensure that 'Restrict non-admin users from creating tenants' is set to 'Yes' (Automated) | 1 | |||
πΌ Cloudaware Framework β πΌ General Access Controls | 10 |