turbot/azure_compliance

Control: 2.12 Ensure 'User consent for applications' is set to 'Do not allow user consent'

Description

Require administrators to provide consent for applications before use.

If Microsoft Entra ID is running as an identity provider for third-party applications, permissions and consent should be limited to administrators or pre-approved. Malicious applications may attempt to exfiltrate data or abuse privileged user accounts.

Remediation

From Azure Portal

  1. From Azure Home select the Portal Menu.
  2. Select Microsoft Entra ID.
  3. Under Manage, select Enterprise applications.
  4. Under Security, select Consent and permissions.
  5. Under Manage, select User consent settings.
  6. Set User consent for applications to Do not allow user consent.
  7. Click Save.

Default Value

By default, Users consent for applications is set to Allow user consent for apps.

Usage

Run the control in your terminal:

powerpipe control run azure_compliance.control.cis_v300_2_12

Snapshot and share results via Turbot Pipes:

powerpipe login
powerpipe control run azure_compliance.control.cis_v300_2_12 --share

SQL

This control uses a named query:

ad_manual_control

Tags