Intelligent Assessment: Natural language Guardrails powered by AI →
Mods
Azure

Policy: Azure > CIS v3.0 > 02 - Identity > 02.01 - Security Defaults (Per-User MFA) > 02.01.01 - Ensure Security Defaults is enabled on Microsoft Entra ID

Configures auditing against a CIS Benchmark item.

Level: 1

Security defaults in Microsoft Entra ID make it easier to be secure and help protect your organization. Security defaults contain preconfigured security settings for common attacks.

Security defaults is available to everyone. The goal is to ensure that all organizations have a basic level of security enabled at no extra cost. You may turn on security defaults in the Azure portal.

Security defaults provide secure default settings that we manage on behalf of organizations to keep customers safe until they are ready to manage their own identity security settings. For example, doing the following: 1. Requiring all users and admins to register for MFA. 2. Challenging users with MFA - when necessary, based on factors such as location, device, role, and task. 3. Disabling authentication from legacy authentication clients, which can't do MFA.

Targets

This policy targets the following resource types:

Primary Policy

This policy is used with the following primary policy:

Policy Specification

Schema Type
string
Default
Per Azure > CIS v3.0 > 02 - Identity
Valid Values [YAML]
  • Per Azure > CIS v3.0 > 02 - Identity
    
  • Skip
    
  • Check: Benchmark using attestation
    

Category

In Your Workspace

Developers