🛡️ Microsoft Entra ID MFA For Windows Azure Service Management API is not required🟢⚪
- Contextual name: 🛡️ MFA For Windows Azure Service Management API is not required🟢⚪
- ID:
/ce/ca/azure/microsoft-entra-id/mfa-for-windows-azure-service-management-api - Tags:
- Policy Type:
COMPLIANCE_POLICY - Policy Categories:
SECURITY
Description
Description
This recommendation ensures that users accessing the Windows Azure Service Management API (i.e. Azure Powershell, Azure CLI, Azure Resource Manager API, etc.) are required to use multi-factor authentication (MFA) credentials when accessing resources through the Windows Azure Service Management API.
Rationale
Administrative access to the Windows Azure Service Management API should be secured with a higher level of scrutiny to authenticating mechanisms. Enabling multi-factor authentication is recommended to reduce the potential for abuse of Administrative actions, and to prevent intruders or compromised admin credentials from changing administrative settings.
IMPORTANT: While this recommendation allows exceptions to specific Users or Groups, they should be very carefully tracked and reviewed for necessity on a regular interval through an Access Review process. It is important that this rule be built to include "All Users" to ensure that all users not specifically excepted will be required to use MFA to access the Azure Service Management API.
... see more
Remediation
Remediation
From Azure Portal
- From the Azure Admin Portal dashboard, open
Microsoft Entra ID.- Click
Securityin the Entra ID blade.- Click
Conditional Accessin the Security blade.- Click
Policiesin the Conditional Access blade.- Click
+ New policy.- Enter a name for the policy.
- Click the blue text under
Users.- Under
Include, selectAll users.- Under
Exclude, checkUsers and groups.- Select users or groups to be exempted from this policy (e.g. break-glass emergency accounts, and non-interactive service accounts) then click the
Selectbutton.- Click the blue text under
Target Resources.- Under Include, click the
Select appsradio button.- Click the blue text under
Select.- Check the box next to
Windows Azure Service Management APIsthen click theSelectbutton.- Click the blue text under
Grant.- Under
Grant accesscheck the box forRequire multifactor authenticationthen click theSelectbutton.- Before creating, set
Enable policytoReport-only.... see more
policy.yaml
Linked Framework Sections
| Section | Sub Sections | Internal Rules | Policies | Flags | Compliance |
|---|---|---|---|---|---|
| 💼 CIS Azure v2.1.0 → 💼 1.2.6 Ensure Multifactor Authentication is Required for Windows Azure Service Management API - Level 1 (Manual) | 1 | no data | |||
| 💼 CIS Azure v3.0.0 → 💼 2.2.7 Ensure Multi-factor Authentication is Required for Windows Azure Service Management API (Manual) | 1 | no data | |||
| 💼 CIS Azure v4.0.0 → 💼 6.2.6 Ensure that multifactor authentication is required for Windows Azure Service Management API (Manual) | 1 | no data | |||
| 💼 Cloudaware Framework → 💼 Multi-Factor Authentication (MFA) Implementation | 16 | no data |