Skip to main content

Description

Restrict access to group web interface in the Access Panel portal.

Rationale

Self-service group management enables users to create and manage security groups or Office 365 groups in Microsoft Entra ID. Unless a business requires this day-to-day delegation for some users, self-service group management should be disabled. Any user can access the Access Panel, where they can reset their passwords, view their information, and more. By default, users are also allowed to access the Group feature, which shows groups, members, and related resources (SharePoint URL, group email address, Yammer URL, and Teams URL). By setting this feature to Yes, users will no longer have access to the web interface but will still have access to the data using the API. This is useful to prevent non-technical users from enumerating group-related information, while technical users can still access this information using APIs.

Impact

Setting to Yes could create administrative overhead by customers seeking certain group memberships that will have to be manually managed by administrators with appropriate permissions.

Audit

From Azure Portal

  1. In the Azure portal, open the portal menu.
  2. Select Microsoft Entra ID.
  3. Under Manage, select Groups.
  4. Under Settings, select General.
  5. Under Self Service Group Management, ensure that Restrict user ability to access groups features in My Groups is set to Yes.

Default Value

By default, Restrict user ability to access groups features in the Access Pane is set to No.

References

  1. https://learn.microsoft.com/en-us/entra/identity/users/groups-self-service-management
  2. https://learn.microsoft.com/en-us/security/benchmark/azure/mcsb-privileged-access#pa-1-separate-and-limit-highly-privilegedadministrative-users
  3. https://learn.microsoft.com/en-us/security/benchmark/azure/mcsb-privileged-access#pa-3-manage-lifecycle-of-identities-and-entitlements
  4. https://learn.microsoft.com/en-us/security/benchmark/azure/mcsb-governance-strategy#gs-2-define-and-implement-enterprise-segmentationseparation-of-duties-strategy
  5. https://learn.microsoft.com/en-us/security/benchmark/azure/mcsb-governance-strategy#gs-6-define-and-implement-identity-and-privileged-access-strategy