π Microsoft Entra ID Guest Users are not reviewed on a regular basis π’
- Contextual name: π Guest Users are not reviewed on a regular basis π’
- ID:
/ce/ca/azure/microsoft-entra-id/guest-users-regular-review
- Located in: π Microsoft Entra ID
Flagsβ
- π’ Impossible policy
- π’ Policy with categories
- π’ Policy with type
Our Metadataβ
- Policy Type:
COMPLIANCE_POLICY
- Policy Category:
SECURITY
Similar Policiesβ
- Cloud Conformity
Descriptionβ
Descriptionβ
Microsoft Entra ID has native and extended identity functionality allowing you to invite people from outside your organization to be guest users in your cloud account and sign in with their own work, school, or social identities.
Rationaleβ
Guest users are typically added outside your employee on-boarding/off-boarding process and could potentially be overlooked indefinitely. To prevent this, guest users should be reviewed on a regular basis. During this audit, guest users should also be determined to not have administrative privileges.
Impactβ
Before removing guest users, determine their use and scope. Like removing any user, there may be unforeseen consequences to systems if an account is removed without careful consideration.
Auditβ
From Azure Portalβ
- From Azure Home select the Portal Menu.
- Select
Microsoft Entra ID
.- Under
Manage
, selectUsers
.- Click on
Add filter
.- Select
User type
.- Select
Guest
from theValue
dropdown.- Click
Apply
.- Audit the listed guest users.
... see more
Remediationβ
Remediatingβ
From Azure Portalβ
- From Azure Home select the Portal Menu.
- Select
Microsoft Entra ID
.- Under
Manage
, selectUsers
.- Click on
Add filter
.- Select
User type
.- Select
Guest
from the Value dropdown.- Click
Apply
.- Check the box next to all
Guest
users that are no longer required or are inactive.- Click
Delete
.- Click
OK
.From Azure CLIβ
Before deleting the user, set it to inactive using the ID from the Audit Procedure to determine if there are any dependent systems:
az ad user update --id <exampleaccountid@domain.com> --account-enabled {false}
After determining that there are no dependent systems delete the user:
Remove-AzureADUser -ObjectId <exampleaccountid@domain.com>
From Azure PowerShellβ
Before deleting the user, set it to inactive using the ID from the Audit Procedure to determine if there are any dependent systems:
Set-AzureADUser -ObjectId "<exampleaccountid@domain.com>" -AccountEnabled false
After determining that there are no dependent systems delete the user:
... see more
policy.yamlβ
Linked Framework Sectionsβ
Section | Sub Sections | Internal Rules | Policies | Flags |
---|---|---|---|---|
πΌ CIS Azure v2.1.0 β πΌ 1.4 Ensure Guest Users Are Reviewed on a Regular Basis - Level 1 (Manual) | 1 | |||
πΌ CIS Azure v3.0.0 β πΌ 2.4 Ensure Guest Users Are Reviewed on a Regular Basis (Manual) | 1 | |||
πΌ Cloudaware Framework β πΌ User Account Management | 14 |