Description
Enable only 'Azure Active Directory' (Microsoft Entra ID) authentication for Azure VPN Gateway point-to-site connections.
Rationale
Microsoft Entra ID authentication provides strong security and centralized identity management, and reduces risks associated with static credentials and certificate management.
Impact
Azure VPN Gateways incur hourly charges, with additional costs for point-to-site connections and data transfer. Pricing varies by SKU and usage. Refer to https://azure.microsoft.com/en-us/pricing/details/vpn-gateway/ for details.
Audit
From Azure Portal
- Go to
Virtual network gateways. - Under
VPN gateway, clickVPN gateways. - Click the name of a VPN gateway.
- Under
Settings, clickPoint-to-site configuration. - Ensure
Authentication typeis set toAzure Active Directoryonly. - Repeat steps 1-5 for each VPN gateway.
From Azure Policy
If referencing a digital copy of this Benchmark, clicking a Policy ID will open a link to the associated Policy definition in Azure.
- Policy ID: 21a6bc25-125e-4d13-b82d-2e19b7208ab7 - Name:
VPN gateways should use only Azure Active Directory (Azure AD) authentication for point-to-site users