Policy: Azure > CIS v5.0 > 5 - Identity Services
This section covers security best practice recommendations for products in the Azure Identity services category.
This includes Microsoft Entra ID (Azure AD), Conditional Access, and identity governance recommendations.
Primary Policy
This policy is used with the following primary policy:
Related Policies
- 5.04 - Ensure that 'Restrict non-admin users from creating tenants' is set to 'Yes'
- 5.05 - Ensure that 'Number of methods required to reset' is set to '2'
- 5.06 - Ensure that account 'Lockout Threshold' is less than or equal to '10'
- 5.07 - Ensure that account 'Lockout duration in seconds' is greater than or equal to '60'
- 5.08 - Ensure that a 'Custom banned password list' is set to 'Enforce'
- 5.09 - Ensure that 'Number of days before users are asked to re-confirm their authentication information' is not set to '0'
- 5.10 - Ensure that 'Notify users on password resets?' is set to 'Yes'
- 5.11 - Ensure that 'Notify all admins when other admins reset their password?' is set to 'Yes'
- 5.12 - Ensure that 'User consent for applications' is set to 'Do not allow user consent'
- 5.13 - Ensure that 'User consent for applications' is set to 'Allow user consent for apps from verified publishers, for selected permissions'
- 5.14 - Ensure that 'Users can register applications' is set to 'No'
- 5.15 - Ensure that 'Guest users access restrictions' is set to 'Guest user access is restricted to properties and memberships of their own directory objects'
- 5.16 - Ensure that 'Guest invite restrictions' is set to 'Only users assigned to specific admin roles [...]' or 'No one [..]'
- 5.17 - Ensure that 'Restrict access to Microsoft Entra admin center' is set to 'Yes'
- 5.18 - Ensure that 'Restrict user ability to access groups features in My Groups' is set to 'Yes'
- 5.19 - Ensure that 'Users can create security groups in Azure portals, API or PowerShell' is set to 'No'
- 5.20 - Ensure that 'Owners can manage group membership requests in My Groups' is set to 'No'
- 5.21 - Ensure that 'Users can create Microsoft 365 groups in Azure portals, API or PowerShell' is set to 'No'
- 5.22 - Ensure that 'Require Multifactor Authentication to register or join devices with Microsoft Entra' is set to 'Yes'
- 5.23 - Ensure That No Custom Subscription Administrator Roles Exist
- 5.24 - Ensure that a custom role is assigned permissions for administering resource locks
- 5.25 - Ensure that 'Subscription leaving Microsoft Entra tenant' and 'Subscription entering Microsoft Entra tenant' is set to 'Permit no one'
- 5.26 - Ensure fewer than 5 users have global administrator assignment
- 5.27 - Ensure there are between 2 and 3 subscription owners
- 5.28 - Ensure passwordless authentication methods are considered
- 5.01 - Security Defaults (Per-User MFA)
- 5.02 - Conditional Access
- 5.03 - Periodic Identity Reviews
- Maximum Attestation Duration
Controls
Setting this policy configures these controls:
- Azure > CIS v5.0 > 5 - Identity Services > 5.01 - Security Defaults (Per-User MFA) > 5.01.01 - Ensure that 'security defaults' is enabled in Microsoft Entra ID
- Azure > CIS v5.0 > 5 - Identity Services > 5.01 - Security Defaults (Per-User MFA) > 5.01.02 - Ensure that 'multifactor authentication' is 'enabled' for all users
- Azure > CIS v5.0 > 5 - Identity Services > 5.01 - Security Defaults (Per-User MFA) > 5.01.03 - Ensure that 'Allow users to remember multifactor authentication on devices they trust' is disabled
- Azure > CIS v5.0 > 5 - Identity Services > 5.02 - Conditional Access > 5.02.01 - Ensure that 'trusted locations' are defined
- Azure > CIS v5.0 > 5 - Identity Services > 5.02 - Conditional Access > 5.02.02 - Ensure that an exclusionary geographic Conditional Access policy is considered
- Azure > CIS v5.0 > 5 - Identity Services > 5.02 - Conditional Access > 5.02.03 - Ensure that an exclusionary Device code flow policy is considered
- Azure > CIS v5.0 > 5 - Identity Services > 5.02 - Conditional Access > 5.02.04 - Ensure that a multifactor authentication policy exists for all users
- Azure > CIS v5.0 > 5 - Identity Services > 5.02 - Conditional Access > 5.02.05 - Ensure that multifactor authentication is required for risky sign-ins
- Azure > CIS v5.0 > 5 - Identity Services > 5.02 - Conditional Access > 5.02.06 - Ensure that multifactor authentication is required for Windows Azure Service Management API
- Azure > CIS v5.0 > 5 - Identity Services > 5.02 - Conditional Access > 5.02.07 - Ensure that multifactor authentication is required to access Microsoft Admin Portals
- Azure > CIS v5.0 > 5 - Identity Services > 5.02 - Conditional Access > 5.02.08 - Ensure a Token Protection Conditional Access policy is considered
- Azure > CIS v5.0 > 5 - Identity Services > 5.03 - Periodic Identity Reviews > 5.03.01 - Ensure that Azure admin accounts are not used for daily operations
- Azure > CIS v5.0 > 5 - Identity Services > 5.03 - Periodic Identity Reviews > 5.03.02 - Ensure that guest users are reviewed on a regular basis
- Azure > CIS v5.0 > 5 - Identity Services > 5.03 - Periodic Identity Reviews > 5.03.03 - Ensure that use of the 'User Access Administrator' role is restricted
- Azure > CIS v5.0 > 5 - Identity Services > 5.03 - Periodic Identity Reviews > 5.03.04 - Ensure that all 'privileged' role assignments are periodically reviewed
- Azure > CIS v5.0 > 5 - Identity Services > 5.03 - Periodic Identity Reviews > 5.03.05 - Ensure disabled user accounts do not have read, write, or owner permissions
- Azure > CIS v5.0 > 5 - Identity Services > 5.03 - Periodic Identity Reviews > 5.03.06 - Ensure 'Tenant Creator' role assignments are periodically reviewed
- Azure > CIS v5.0 > 5 - Identity Services > 5.03 - Periodic Identity Reviews > 5.03.07 - Ensure all non-privileged role assignments are periodically reviewed
- Azure > CIS v5.0 > 5 - Identity Services > 5.04 - Ensure that 'Restrict non-admin users from creating tenants' is set to 'Yes'
- Azure > CIS v5.0 > 5 - Identity Services > 5.05 - Ensure that 'Number of methods required to reset' is set to '2'
- Azure > CIS v5.0 > 5 - Identity Services > 5.06 - Ensure that account 'Lockout Threshold' is less than or equal to '10'
- Azure > CIS v5.0 > 5 - Identity Services > 5.07 - Ensure that account 'Lockout duration in seconds' is greater than or equal to '60'
- Azure > CIS v5.0 > 5 - Identity Services > 5.08 - Ensure that a 'Custom banned password list' is set to 'Enforce'
- Azure > CIS v5.0 > 5 - Identity Services > 5.09 - Ensure that 'Number of days before users are asked to re-confirm their authentication information' is not set to '0'
- Azure > CIS v5.0 > 5 - Identity Services > 5.10 - Ensure that 'Notify users on password resets?' is set to 'Yes'
- Azure > CIS v5.0 > 5 - Identity Services > 5.11 - Ensure that 'Notify all admins when other admins reset their password?' is set to 'Yes'
- Azure > CIS v5.0 > 5 - Identity Services > 5.12 - Ensure that 'User consent for applications' is set to 'Do not allow user consent'
- Azure > CIS v5.0 > 5 - Identity Services > 5.13 - Ensure that 'User consent for applications' is set to 'Allow user consent for apps from verified publishers, for selected permissions'
- Azure > CIS v5.0 > 5 - Identity Services > 5.14 - Ensure that 'Users can register applications' is set to 'No'
- Azure > CIS v5.0 > 5 - Identity Services > 5.15 - Ensure that 'Guest users access restrictions' is set to 'Guest user access is restricted to properties and memberships of their own directory objects'
- Azure > CIS v5.0 > 5 - Identity Services > 5.16 - Ensure that 'Guest invite restrictions' is set to 'Only users assigned to specific admin roles [...]' or 'No one [..]'
- Azure > CIS v5.0 > 5 - Identity Services > 5.17 - Ensure that 'Restrict access to Microsoft Entra admin center' is set to 'Yes'
- Azure > CIS v5.0 > 5 - Identity Services > 5.18 - Ensure that 'Restrict user ability to access groups features in My Groups' is set to 'Yes'
- Azure > CIS v5.0 > 5 - Identity Services > 5.19 - Ensure that 'Users can create security groups in Azure portals, API or PowerShell' is set to 'No'
- Azure > CIS v5.0 > 5 - Identity Services > 5.20 - Ensure that 'Owners can manage group membership requests in My Groups' is set to 'No'
- Azure > CIS v5.0 > 5 - Identity Services > 5.21 - Ensure that 'Users can create Microsoft 365 groups in Azure portals, API or PowerShell' is set to 'No'
- Azure > CIS v5.0 > 5 - Identity Services > 5.22 - Ensure that 'Require Multifactor Authentication to register or join devices with Microsoft Entra' is set to 'Yes'
- Azure > CIS v5.0 > 5 - Identity Services > 5.23 - Ensure That No Custom Subscription Administrator Roles Exist
- Azure > CIS v5.0 > 5 - Identity Services > 5.24 - Ensure that a custom role is assigned permissions for administering resource locks
- Azure > CIS v5.0 > 5 - Identity Services > 5.25 - Ensure that 'Subscription leaving Microsoft Entra tenant' and 'Subscription entering Microsoft Entra tenant' is set to 'Permit no one'
- Azure > CIS v5.0 > 5 - Identity Services > 5.26 - Ensure fewer than 5 users have global administrator assignment
- Azure > CIS v5.0 > 5 - Identity Services > 5.27 - Ensure there are between 2 and 3 subscription owners
- Azure > CIS v5.0 > 5 - Identity Services > 5.28 - Ensure passwordless authentication methods are considered
Policy Specification
Schema Type | |
|---|---|
Default | |
Valid Values [YAML] |
|
Examples [YAML] |
|
Category
In Your Workspace
Developers
- tmod:@turbot/cis#/control/categories/cis
- tmod:@turbot/azure-cisv5-0#/policy/types/s05
- turbot graphql policy-type --id "tmod:@turbot/azure-cisv5-0#/policy/types/s05"
- turbot graphql policy-settings --filter "policyTypeId:tmod:@turbot/azure-cisv5-0#/policy/types/s05"
Get Policy TypeGet Policy Settings
Category URI
Policy Type URI
GraphQL
CLI