Control: 1.2.7 Ensure Multifactor Authentication is Required to access Microsoft Admin Portals
Description
This recommendation ensures that users accessing the Microsoft Admin Portals (i.e. Microsoft 365 Admin, Microsoft 365 Defender, Exchange Admin Center, Azure Portal, etc.) are required to use multifactor authentication (MFA) credentials when logging into an Admin Portal.
Remediation
From Azure Portal
- From the Azure Admin Portal dashboard, open
Microsoft Entra ID
. - Click
Security
in the Entra ID blade. - Click
Conditional Access
in the Security blade. - Click
Policies
in the Conditional Access blade. - Click
+ New policy
. - Enter a name for the policy.
- Click the blue text under
Users
. - Under
Include
, selectAll users
. - Under
Exclude
, checkUsers and groups
. - Select users or groups to be exempted from this policy (e.g. break-glass emergency accounts, and non-interactive service accounts) then click the
Select
button. - Click the blue text under
Target Resources
. - Under
Include
, click theSelect apps
radio button. - Click the blue text under
Select
. - Check the box next to
Microsoft Admin Portals
then click theSelect
button. - Click the blue text under
Grant
. - Under
Grant access
check the box forRequire multifactor authentication
then click theSelect
button. - Before creating, set
Enable policy
toReport-only
. - Click
Create
.
After testing the policy in report-only mode, update the Enable policy
setting from Report-only
to On
.
Default Value
MFA is not enabled by default for administrative actions.
Usage
Run the control in your terminal:
powerpipe control run azure_compliance.control.cis_v210_1_2_7
Snapshot and share results via Turbot Pipes:
powerpipe loginpowerpipe control run azure_compliance.control.cis_v210_1_2_7 --share
SQL
This control uses a named query:
iam_conditional_access_mfa_enabled_for_administrators