Skip to main content

💼 6.2.2 Ensure that an exclusionary geographic Conditional Access policy is considered (Manual)

  • ID: /frameworks/cis-azure-v4.0.0/06/02/02

Description​

CAUTION: If these policies are created without first auditing and testing the result, misconfiguration can potentially lock out administrators or create undesired access issues. Conditional Access Policies can be used to block access from geographic locations that are deemed out-of-scope for your organization or application. The scope and variables for this policy should be carefully examined and defined.

Similar​

  • Sections
    • /frameworks/cis-azure-v3.0.0/02/02/02

Similar Sections (Take Policies From)​

SectionSub SectionsInternal RulesPoliciesFlagsCompliance
💼 CIS Azure v3.0.0 → 💼 2.2.2 Ensure that an exclusionary Geographic Access Policy is considered (Manual)no data

Similar Sections (Give Policies To)​

SectionSub SectionsInternal RulesPoliciesFlagsCompliance
💼 CIS Azure v3.0.0 → 💼 2.2.2 Ensure that an exclusionary Geographic Access Policy is considered (Manual)no data
💼 CIS Azure v5.0.0 → 💼 5.2.2 Ensure that an exclusionary geographic Conditional Access policy is considered (Manual)1no data

Sub Sections​

SectionSub SectionsInternal RulesPoliciesFlagsCompliance