Control: 2.3 Ensure that 'Restrict non-admin users from creating tenants' is set to 'Yes'
Description
Require administrators or appropriately delegated users to create new tenants.
It is recommended to only allow an administrator to create new tenants. This prevent users from creating new Microsoft Entra ID or Azure AD B2C tenants and ensures that only authorized users are able to do so.
Remediation
From Azure Portal
- From Azure Home select the Portal Menu.
- Select
Microsoft Entra ID
. - Under
Manage
, selectUsers
. - Under
Manage
, selectUser settings
. - Set
Restrict non-admin users from creating tenants
toYes
. - Click
Save
.
From PowerShell
Import-Module Microsoft.Graph.Identity.SignIns
Connect-MgGraph -Scopes 'Policy.ReadWrite.Authorization'
Select-MgProfile -Name beta
$params = @{ DefaultUserRolePermissions = @{ AllowedToCreateTenants = $false }}
Update-MgPolicyAuthorizationPolicy -AuthorizationPolicyId -BodyParameter $params
Usage
Run the control in your terminal:
powerpipe control run azure_compliance.control.cis_v300_2_3
Snapshot and share results via Turbot Pipes:
powerpipe loginpowerpipe control run azure_compliance.control.cis_v300_2_3 --share
SQL
This control uses a named query:
ad_manual_control