turbot/azure_compliance

Control: 1.1.3 Ensure that 'Multi-Factor Auth Status' is 'Enabled' for all Non-Privileged Users

Description

Enable multi-factor authentication for all non-privileged users.

Multi-factor authentication requires an individual to present a minimum of two separate forms of authentication before access is granted. Multi-factor authentication provides additional assurance that the individual attempting to gain access is who they claim to be. With multi-factor authentication, an attacker would need to compromise at least two different authentication mechanisms, increasing the difficulty of compromise and thus reducing the risk.

Remediation

From Azure Portal

  1. From Azure Home select the Portal Menu.
  2. Select the Microsoft Entra ID blade.
  3. Select Users
  4. Take note of all users with the role Service Co-Administrators, Owners or Contributors
  5. Click on the Per-User MFA button in the top row menu
  6. Check the box next to each noted user
  7. Click Enable under quick steps in the right-hand panel
  8. Click enable multi-factor auth
  9. Click close

Follow Microsoft Azure documentation and enable multi-factor authentication in your environment.

https://docs.microsoft.com/en-us/azure/active-directory/authentication/tutorial-enable-azure-mfa

Enabling and configuring MFA is a multi-step process. Here are some additional resources on the process within Microsoft Entra ID: https://docs.microsoft.com/en-us/azure/active-directory/conditional-access/howto-conditional-access-policy-admin-mfa https://docs.microsoft.com/en-us/azure/active-directory/authentication/howto-mfa-getstarted#enable-multi-factor-authentication-with-conditional-access https://docs.microsoft.com/en-us/azure/active-directory/authentication/howto-mfa-mfasettings

Default Value

By default, multi-factor authentication is disabled for all users.

Usage

Run the control in your terminal:

powerpipe control run azure_compliance.control.cis_v210_1_1_3

Snapshot and share results via Turbot Pipes:

powerpipe login
powerpipe control run azure_compliance.control.cis_v210_1_1_3 --share

SQL

This control uses a named query:

ad_manual_control

Tags