Control: 2.2.4 Ensure that A Multi-factor Authentication Policy Exists for Administrative Groups
Description
For designated users, they will be prompted to use their multi-factor authentication (MFA) process on login.
Enabling multi-factor authentication is a recommended setting to limit the use of Administrative accounts to authenticated personnel.
Remediation
From Azure Portal
- From Azure Home open the Portal Menu in top left, and select Microsoft Entra ID.
- Select
Security
. - Select
Conditional Access
. - Select
Policies
. - Click
+ New policy
. - Enter a name for the policy.
- Click the blue text under
Users
. - Select
Select users and groups
. - Select administrative groups this policy should apply to and click
Select
. - Under
Exclude
, checkUsers and groups
. - Select users this policy not should apply to and click
Select
. - Click the blue text under
Target resources
. - Select
All cloud apps
. - Click the blue text under
Grant
. - Under Grant access, check
Require multifactor authentication
and clickSelect
. - Set
Enable policy
toReport-only
. - Click
Create
.
After testing the policy in report-only mode, update the Enable policy
setting from Report-only
to On
.
Default Value
Starting October 2024, MFA will be required for all accounts by default.
Usage
Run the control in your terminal:
powerpipe control run azure_compliance.control.cis_v300_2_2_4
Snapshot and share results via Turbot Pipes:
powerpipe loginpowerpipe control run azure_compliance.control.cis_v300_2_2_4 --share
SQL
This control uses a named query:
ad_manual_control