Description
This recommendation ensures that users accessing Microsoft Admin Portals (i.e. Microsoft 365 Admin, Microsoft 365 Defender, Exchange Admin Center, Azure Portal, etc.) are required to use multi-factor authentication (MFA) credentials when logging into an Admin Portal.
Rationaleβ
Administrative Portals for Microsoft Azure should be secured with a higher level of scrutiny to authenticating mechanisms. Enabling multi-factor authentication is recommended to reduce the potential for abuse of Administrative actions, and to prevent intruders or compromised admin credentials from changing administrative settings.
IMPORTANT: While this recommendation allows exceptions to specific Users or Groups, they should be very carefully tracked and reviewed for necessity on a regular interval through an Access Review process. It is important that this rule be built to include "All Users" to ensure that all users not specifically excepted will be required to use MFA to access Admin Portals.
Impactβ
Conditional Access policies require Microsoft Entra ID P1 or P2 licenses. Similarly, they may require additional overhead to maintain if users lose access to their MFA. Any users or groups which are granted an exception to this policy should be carefully tracked, be granted only minimal necessary privileges, and conditional access exceptions should be reviewed or investigated.
Auditβ
From Azure Portalβ
- From the Azure Admin Portal dashboard, open
Microsoft Entra ID
. - In the menu on the left of the Entra ID blade, click
Security
. - In the menu on the left of the Security blade, click
Conditional Access
. - In the menu on the left of the Conditional Access blade, click
Policies
. - Click on the name of the policy you wish to audit.
- Click the blue text under
Users
. - Under the
Include
section of Users, reviewUsers and Groups
to ensure thatAll Users
is selected. - Under the
Exclude
section of Users, review theUsers and Groups
that are excluded from the policy (NOTE: this should be limited to break-glass emergency access accounts, non-interactive service accounts, and other carefully considered exceptions). - On the left side, click the blue text under
Target Resources
. - Under the
Include
section of Target resources, ensure theSelect apps
radio button is selected. - Under
Select
, ensureMicrosoft Admin Portals
is listed.
Default Valueβ
MFA is not enabled by default for administrative actions.
Referencesβ
- https://learn.microsoft.com/en-us/security/benchmark/azure/mcsb-identity-management#im-7-restrict-resource-access-based-on--conditions
- https://docs.microsoft.com/en-us/azure/active-directory/conditional-access/concept-conditional-access-users-groups
- https://learn.microsoft.com/en-us/entra/identity/conditional-access/how-to-policy-mfa-admin-portals
Additional Informationβ
These policies should be tested by using the What If tool in the References. Setting these can and will create issues with administrators changing settings until they use an MFA device linked to their accounts. An emergency access account is recommended for this eventuality if all administrators are locked out. Please see the documentation in the references for further information. Similarly further testing can also be done via the insights and reporting resource in References which monitors Azure sign ins.