Control: Azure > CIS v2.0 > 01 - Identity and Access Management > 1.17 Ensure That 'Restrict access to Azure AD administration portal' is Set to 'Yes'
Configures auditing against a CIS Benchmark item.
Level: 1
Restrict access to the Azure AD administration portal to administrators only.
NOTE: This only affects access to the Azure AD administrator's web portal. This setting does not prohibit privileged users from using other methods such as Rest API or Powershell to obtain sensitive information from Azure AD.
The Azure AD administrative portal has sensitive data and permission settings. All non- administrators should be prohibited from accessing any Azure AD data in the administration portal to avoid exposure.
Resource Types
This control targets the following resource types:
Primary Policies
The following policies can be used to configure this control:
- 1.17 Ensure That 'Restrict access to Azure AD administration portal' is Set to 'Yes'
- 1.17 Ensure That 'Restrict access to Azure AD administration portal' is Set to 'Yes' > Attestation
Category
In Your Workspace
Developers
- tmod:@turbot/azure-cisv2-0#/control/types/r0117
- tmod:@turbot/cis#/control/categories/v070403
- turbot graphql controls --filter "controlTypeId:tmod:@turbot/azure-cisv2-0#/control/types/r0117"
Get Controls
Control Type URI
Category URI
GraphQL
CLI