Skip to main content

💼 6.2.2 Ensure that an exclusionary geographic Conditional Access policy is considered (Manual)

  • ID: /frameworks/cis-azure-v4.0.0/06/02/02

Description

CAUTION: If these policies are created without first auditing and testing the result, misconfiguration can potentially lock out administrators or create undesired access issues. Conditional Access Policies can be used to block access from geographic locations that are deemed out-of-scope for your organization or application. The scope and variables for this policy should be carefully examined and defined.

Similar

  • Sections
    • /frameworks/cis-azure-v3.0.0/02/02/02

Similar Sections (Take Policies From)

SectionSub SectionsInternal RulesPoliciesFlagsCompliance
💼 CIS Azure v3.0.0 → 💼 2.2.2 Ensure that an exclusionary Geographic Access Policy is considered (Manual)1no data

Similar Sections (Give Policies To)

SectionSub SectionsInternal RulesPoliciesFlagsCompliance
💼 CIS Azure v3.0.0 → 💼 2.2.2 Ensure that an exclusionary Geographic Access Policy is considered (Manual)1no data

Sub Sections

SectionSub SectionsInternal RulesPoliciesFlagsCompliance

Policies (1)

PolicyLogic CountFlagsCompliance
🛡️ Microsoft Entra ID Conditional Access By Location is not defined🟢⚪🟢 x2, ⚪ x1no data