Skip to main content

πŸ’Ό 6.2.2 Ensure that an exclusionary geographic Conditional Access policy is considered (Manual)

  • Contextual name: πŸ’Ό 6.2.2 Ensure that an exclusionary geographic Conditional Access policy is considered (Manual)
  • ID: /frameworks/cis-azure-v4.0.0/06/02/02
  • Located in: πŸ’Ό 6.2 Conditional Access

Description​

CAUTION: If these policies are created without first auditing and testing the result, misconfiguration can potentially lock out administrators or create undesired access issues. Conditional Access Policies can be used to block access from geographic locations that are deemed out-of-scope for your organization or application. The scope and variables for this policy should be carefully examined and defined.

Similar​

  • Sections
    • /frameworks/cis-azure-v3.0.0/02/02/02

Similar Sections (Take Policies From)​

SectionSub SectionsInternal RulesPoliciesFlags
πŸ’Ό CIS Azure v3.0.0 β†’ πŸ’Ό 2.2.2 Ensure that an exclusionary Geographic Access Policy is considered (Manual)1

Similar Sections (Give Policies To)​

SectionSub SectionsInternal RulesPoliciesFlags
πŸ’Ό CIS Azure v3.0.0 β†’ πŸ’Ό 2.2.2 Ensure that an exclusionary Geographic Access Policy is considered (Manual)1

Sub Sections​

SectionSub SectionsInternal RulesPoliciesFlags

Policies (1)​

PolicyLogic CountFlags
πŸ“ Microsoft Entra ID Conditional Access By Location is not defined 🟒🟒 x3