Mods
Azure

Policy: Azure > CIS v2.0 > 01 - Identity and Access Management > 1.02 - Conditional Access > 1.02.02 - Ensure that an exclusionary Geographic Access Policy is considered

Configures auditing against a CIS Benchmark item.

Level: 1

Conditional Access Policies can be used to block access from geographic locations that are deemed out-of-scope for your organization or application. The scope and variables for this policy should be carefully examined and defined.

Conditional Access, when used as a deny list for the tenant or subscription, is able to prevent ingress or egress of traffic to countries that are outside of the scope of interest (e.g.: customers, suppliers) or jurisdiction of an organization. This is an effective way to prevent unnecessary and long-lasting exposure to international threats such as APTs.

Resource Types

This policy targets the following resource types:

Primary Policy

This policy is used with the following primary policy:

Controls

Policy Specification

Schema Type
string
Default
Per Azure > CIS v2.0 > 01 - Identity and Access Management
Valid Values [YAML]
  • Per Azure > CIS v2.0 > 01 - Identity and Access Management
    
  • Skip
    
  • Check: Benchmark using attestation
    

Category

In Your Workspace

Developers