Skip to main content

💼 2.1.2 Ensure that 'Multi-Factor Auth Status' is 'Enabled' for all Privileged Users (Manual)

  • ID: /frameworks/cis-azure-v3.0.0/02/01/02

Description​

[IMPORTANT - Please read the section overview: If your organization pays for Microsoft Entra ID licensing (included in Microsoft 365 E3, E5, or F5, and EM&S E3 or E5 licenses) and CAN use Conditional Access, ignore the recommendations in this section and proceed to the Conditional Access section.]

Enable multi-factor authentication for all roles, groups, and users that have write access or permissions to Azure resources. These include custom created objects or built-in roles such as:

  • Service Co-Administrators
  • Subscription Owners
  • Contributors

Similar​

  • Sections
    • /frameworks/cis-azure-v2.1.0/01/01/02
    • /frameworks/cis-azure-v4.0.0/06/01/02

Similar Sections (Take Policies From)​

SectionSub SectionsInternal RulesPoliciesFlagsCompliance
💼 CIS Azure v2.1.0 → 💼 1.1.2 Ensure that 'Multi-Factor Auth Status' is 'Enabled' for all Privileged Users - Level 1 (Manual)no data
💼 CIS Azure v4.0.0 → 💼 6.1.2 Ensure that 'multifactor authentication' is 'enabled' for all users (Manual)no data

Similar Sections (Give Policies To)​

SectionSub SectionsInternal RulesPoliciesFlagsCompliance
💼 CIS Azure v2.1.0 → 💼 1.1.2 Ensure that 'Multi-Factor Auth Status' is 'Enabled' for all Privileged Users - Level 1 (Manual)no data
💼 CIS Azure v4.0.0 → 💼 6.1.2 Ensure that 'multifactor authentication' is 'enabled' for all users (Manual)no data
💼 CIS Azure v5.0.0 → 💼 5.1.2 Ensure that 'multifactor authentication' is 'enabled' for all users (Automated)1no data

Sub Sections​

SectionSub SectionsInternal RulesPoliciesFlagsCompliance