Skip to main content

💼 1 Identity and Access Management

  • Contextual name: 💼 1 Identity and Access Management
  • ID: /frameworks/cis-azure-v1.5.0/01
  • Located in: 💼 CIS Azure v1.5.0

Description

This section covers security recommendations to set identity and access management policies on an Azure Subscription. Identity and Access Management policies are the first step towards a defense-in-depth approach to securing an Azure Cloud Platform environment.

Many of the recommendations from this section are marked as "Manual" while Azure CLI and PowerShell are being improved to support and perform the respective audits and remediation. From a security posture standpoint, these recommendations are still very important and should not be discounted because they are "Manual." As automation capability using Rest API is developed for this Benchmark, the related recommendations will be updated with the respective audit and remediation steps and changed to an "automated" assessment status.

If any problems are encountered running Azure CLI or PowerShell methodologies, please refer to the Overview for this benchmark where you will find additional detail on permission and required cmdlets.

Similar

  • Internal
    • ID: dec-b-8baa62e4

Sub Sections

SectionSub SectionsInternal RulesPoliciesFlags
💼 1.1 Security Defaults4
    💼 1.1.1 Ensure Security Defaults is enabled on Azure Active Directory - Level 1 (Manual _ Not supported, no API/CLI available by Azure)
    💼 1.1.2 Ensure that 'Multi-Factor Auth Status' is 'Enabled' for all Privileged Users - Level 1 (Manual _ Not supported, no API/CLI available by Azure)
    💼 1.1.3 Ensure that 'Multi-Factor Auth Status' is 'Enabled' for all Non-Privileged Users - Level 2 (Manual _ Not supported, no API/CLI available by Azure)
    💼 1.1.4 Ensure that 'Restore multi-factor authentication on all remembered devices' is Enabled - Level 1 (Manual _ Not supported, no API/CLI available by Azure)
💼 1.2 Conditional Access6
    💼 1.2.1 Ensure Trusted Locations Are Defined - Level 1 (Manual)
    💼 1.2.2 Ensure that an exclusionary Geographic Access Policy is considered - Level 1 (Manual)
    💼 1.2.3 Ensure that A Multi-factor Authentication Policy Exists for Administrative Groups - Level 1 (Manual)
    💼 1.2.4 Ensure that A Multi-factor Authentication Policy Exists for All Users - Level 1 (Manual)
    💼 1.2.5 Ensure Multi-factor Authentication is Required for Risky Sign-ins - Level 1 (Manual)
    💼 1.2.6 Ensure Multi-factor Authentication is Required for Azure Management - Level 1 (Manual)
💼 1.3 Ensure Access Review is Set Up for External Users in Azure AD Privileged Identity Management - Level 2 (Manual)
💼 1.4 Ensure Guest Users Are Reviewed on a Regular Basis - Level 1 (Manual _ Assessment requires a manual procedure. Hover over the title for the full description)
💼 1.5 Ensure that 'Allow users to remember multi-factor authentication on devices they trust' is 'Disabled' - Level 1 (Manual _ Not supported, no API/CLI available by Azure)
💼 1.6 Ensure That 'Number of methods required to reset' is set to '2' - Level 1 (Manual _ Not supported, no API/CLI available by Azure)
💼 1.7 Ensure that a Custom Bad Password List is set to 'Enforce' for your Organization - Level 1 (Manual _ Not supported, no API/CLI available by Azure)
💼 1.8 Ensure that 'Number of days before users are asked to re-confirm their authentication information' is not set to '0' - Level 1 (Manual _ Not supported, no API/CLI available by Azure)
💼 1.9 Ensure that 'Notify users on password resets?' is set to 'Yes' - Level 1 (Manual _ Not supported, no API/CLI available by Azure)
💼 1.10 Ensure That 'Notify all admins when other admins reset their password?' is set to 'Yes' - Level 1 (Manual _ Not supported, no API/CLI available by Azure)
💼 1.11 Ensure That ‘Users Can Consent to Apps Accessing Company Data on Their Behalf’ Is Set To ‘Allow for Verified Publishers’ - Level 2 (Manual _ Not supported, no API/CLI available by Azure)
💼 1.12 Ensure that 'Users can consent to apps accessing company data on their behalf' is set to 'No' - Level 1 (Manual _ Not supported, no API/CLI available by Azure)
💼 1.13 Ensure that 'Users can add gallery apps to My Apps' is set to 'No' - Level 1 (Manual _ Not supported, no API/CLI available by Azure)
💼 1.14 Ensure That ‘Users Can Register Applications’ Is Set to ‘No’ - Level 1 (Manual _ Not supported, no API/CLI available by Azure)
💼 1.15 Ensure That 'Guest users access restrictions' is set to 'Guest user access is restricted to properties and memberships of their own directory objects' - Level 1 (Manual)
💼 1.16 Ensure that 'Guest invite restrictions' is set to "Only users assigned to specific admin roles can invite guest users" - Level 2 (Manual _ Not supported, no API/CLI available by Azure)
💼 1.17 Ensure That 'Restrict access to Azure AD administration portal' is Set to 'Yes' - Level 1 (Manual _ Not supported, no API/CLI available by Azure)
💼 1.18 Ensure that 'Restrict user ability to access groups features in the Access Pane' is Set to 'Yes' - Level 2 (Manual _ Not supported, no API/CLI available by Azure)
💼 1.19 Ensure that 'Users can create security groups in Azure portals, API or PowerShell' is set to 'No' - Level 2 (Manual _ Not supported, no API/CLI available by Azure)
💼 1.20 Ensure that 'Owners can manage group membership requests in the Access Panel' is set to 'No' - Level 2 (Manual _ Not supported, no API/CLI available by Azure)
💼 1.21 Ensure that 'Users can create Microsoft 365 groups in Azure portals, API or PowerShell' is set to 'No' - Level 2 (Manual _ Not supported, no API/CLI available by Azure)
💼 1.22 Ensure that 'Require Multi-Factor Authentication to register or join devices with Azure AD' is set to 'Yes' - Level 1 (Manual _ Not supported, no API/CLI available by Azure)
💼 1.23 Ensure That No Custom Subscription Owner Roles Are Created - Level 1 (Automated)
💼 1.24 Ensure a Custom Role is Assigned Permissions for Administering Resource Locks - Level 2 (Manual)
💼 1.25 Ensure That ‘Subscription Entering AAD Directory’ and ‘Subscription Leaving AAD Directory’ Is Set To ‘Permit No One’ - Level 2 (Manual)