Policy: Azure > CIS v5.0 > 5 - Identity Services > 5.03 - Periodic Identity Reviews
The Azure "Security Defaults" recommendations represent an entry-level set of recommendations which will be relevant to organizations and tenants that are either just starting to use Azure as an IaaS solution, or are only utilizing a bare minimum feature set such as the freely licensed tier of Azure Active Directory. Security Defaults recommendations are intended to ensure that these entry-level use cases are still capable of establishing a strong baseline of secure configuration.
If your subscription is licensed to use Azure AD Premium P1 or P2, it is strongly recommended that the "Security Defaults" section (this section and the recommendations therein) be bypassed in favor of the use of "Conditional Access."
Primary Policy
This policy is used with the following primary policy:
Related Policies
- 5.03.01 - Ensure that Azure admin accounts are not used for daily operations
- 5.03.02 - Ensure that guest users are reviewed on a regular basis
- 5.03.03 - Ensure that use of the 'User Access Administrator' role is restricted
- 5.03.04 - Ensure that all 'privileged' role assignments are periodically reviewed
- 5.03.05 - Ensure disabled user accounts do not have read, write, or owner permissions
- 5.03.06 - Ensure 'Tenant Creator' role assignments are periodically reviewed
- 5.03.07 - Ensure all non-privileged role assignments are periodically reviewed
Category
In Your Workspace
Developers
- tmod:@turbot/cis#/control/categories/cis
- tmod:@turbot/azure-cisv5-0#/policy/types/s0503
- turbot graphql policy-type --id "tmod:@turbot/azure-cisv5-0#/policy/types/s0503"
- turbot graphql policy-settings --filter "policyTypeId:tmod:@turbot/azure-cisv5-0#/policy/types/s0503"
Get Policy TypeGet Policy Settings