π Microsoft Entra ID MFA For Administrators is not required π’
- Contextual name: π MFA For Administrators is not required π’
- ID:
/ce/ca/azure/microsoft-entra-id/mfa-for-administrators
- Located in: π Microsoft Entra ID
Flagsβ
- π’ Impossible policy
- π’ Policy with categories
- π’ Policy with type
Our Metadataβ
- Policy Type:
BEST_PRACTICE
- Policy Category:
SECURITY
Descriptionβ
Descriptionβ
For designated users, they will be prompted to use their multi-factor authentication (MFA) process on login.
Rationaleβ
Enabling multi-factor authentication is a recommended setting to limit the use of Administrative accounts to authenticated personnel.
Impactβ
There is an increased cost, as Conditional Access policies require Microsoft Entra ID P1. Similarly, MFA may require additional overhead to maintain. There is also a potential scenario in which the multi-factor authentication method can be lost, and administrative users are no longer able to log in. For this scenario, there should be an emergency access account. Please see References for creating this.
NOTE: Starting July 2024, Microsoft will begin requiring MFA for All Users - including Break Glass Accounts. By the end of October 2024, this requirement will be enforced. Physical FIDO2 security keys, or a certificate kept on secure removable storage can fulfill this MFA requirement. If opting for a physical device, that device should be kept in a very secure, documented physical location.
... see more
Remediationβ
Remediationβ
From Azure Portalβ
- From Azure Home open the Portal Menu in top left, and select Microsoft Entra ID.
- Select
Security
.- Select
Conditional Access
.- Select
Policies
.- Click
+ New policy
.- Enter a name for the policy.
- Click the blue text under
Users
.- Select
Select users and groups
.- Select administrative groups this policy should apply to and click
Select
.- Under
Exclude
, checkUsers and groups
.- Select users this policy not should apply to and click
Select
.- Click the blue text under
Target resources
.- Select
All cloud apps
.- Click the blue text under
Grant
.- Under Grant access, check
Require multifactor authentication
and clickSelect
.- Set
Enable policy
toReport-only
.- Click
Create
.After testing the policy in report-only mode, update the
Enable policy
setting fromReport-only
toOn
.
policy.yamlβ
Linked Framework Sectionsβ
Section | Sub Sections | Internal Rules | Policies | Flags |
---|---|---|---|---|
πΌ CIS Azure v2.1.0 β πΌ 1.2.3 Ensure that A Multi-factor Authentication Policy Exists for Administrative Groups - Level 1 (Manual) | 1 | |||
πΌ CIS Azure v3.0.0 β πΌ 2.2.4 Ensure that A Multi-factor Authentication Policy Exists for Administrative Groups (Manual) | 1 | |||
πΌ Cloudaware Framework β πΌ Multi-Factor Authentication (MFA) Implementation | 16 |