🛡️ Microsoft Entra ID MFA For Administrators is not required🟢⚪
- Contextual name: 🛡️ MFA For Administrators is not required🟢⚪
- ID:
/ce/ca/azure/microsoft-entra-id/mfa-for-administrators - Tags:
- Policy Type:
BEST_PRACTICE - Policy Categories:
SECURITY
Description
Description
For designated users, they will be prompted to use their multi-factor authentication (MFA) process on login.
Rationale
Enabling multi-factor authentication is a recommended setting to limit the use of Administrative accounts to authenticated personnel.
Impact
There is an increased cost, as Conditional Access policies require Microsoft Entra ID P1. Similarly, MFA may require additional overhead to maintain. There is also a potential scenario in which the multi-factor authentication method can be lost, and administrative users are no longer able to log in. For this scenario, there should be an emergency access account. Please see References for creating this.
NOTE: Starting July 2024, Microsoft will begin requiring MFA for All Users - including Break Glass Accounts. By the end of October 2024, this requirement will be enforced. Physical FIDO2 security keys, or a certificate kept on secure removable storage can fulfill this MFA requirement. If opting for a physical device, that device should be kept in a very secure, documented physical location.
... see more
Remediation
Remediation
From Azure Portal
- From Azure Home open the Portal Menu in top left, and select Microsoft Entra ID.
- Select
Security.- Select
Conditional Access.- Select
Policies.- Click
+ New policy.- Enter a name for the policy.
- Click the blue text under
Users.- Select
Select users and groups.- Select administrative groups this policy should apply to and click
Select.- Under
Exclude, checkUsers and groups.- Select users this policy not should apply to and click
Select.- Click the blue text under
Target resources.- Select
All cloud apps.- Click the blue text under
Grant.- Under Grant access, check
Require multifactor authenticationand clickSelect.- Set
Enable policytoReport-only.- Click
Create.After testing the policy in report-only mode, update the
Enable policysetting fromReport-onlytoOn.
policy.yaml
Linked Framework Sections
| Section | Sub Sections | Internal Rules | Policies | Flags | Compliance |
|---|---|---|---|---|---|
| 💼 CIS Azure v2.1.0 → 💼 1.2.3 Ensure that A Multi-factor Authentication Policy Exists for Administrative Groups - Level 1 (Manual) | 1 | no data | |||
| 💼 CIS Azure v3.0.0 → 💼 2.2.4 Ensure that A Multi-factor Authentication Policy Exists for Administrative Groups (Manual) | 1 | no data | |||
| 💼 Cloudaware Framework → 💼 Multi-Factor Authentication (MFA) Implementation | 16 | no data |