turbot/microsoft365_compliance

Control: 1.1.2 Ensure multifactor authentication is enabled for all users in all roles

Description

Enable multifactor authentication for all users in the Microsoft 365 tenant. Users will be prompted to authenticate with a second factor upon logging in to Microsoft 365 services. The second factor is most commonly a text message to a registered mobile phone number where they type in an authorization code, or with a mobile application like Microsoft Authenticator.

Multifactor authentication requires an individual to present a minimum of two separate forms of authentication before access is granted. Multifactor authentication provides additional assurance that the individual attempting to gain access is who they claim to be. With multifactor authentication, an attacker would need to compromise at least two different authentication mechanisms, increasing the difficulty of compromise and thus reducing the risk.

Remediation

To enable multifactor authentication for all users, use the Microsoft 365 Admin Center:

  1. Log in to https://admin.microsoft.com as a Global Administrator.
  2. Go to Admin centers and click on Azure Active Directory.
  3. Select Enterprise applications then, under Security, select Conditional Access.
  4. Click New policy.
  5. Select Cloud apps or actions > All cloud apps (and don't exclude any apps).
  6. Go to Assignments > Users and groups > Include > select All users (and do not exclude any user).
  7. Access Controls > Grant > Require multi-factor authentication (and nothing else).
  8. Conditions > Client Apps > Configure (Yes) > Explicitly select Browser, Mobile apps and desktop clients, Modern authentication clients, Exchange ActiveSync clients, and Other clients.
  9. Leave all other conditions blank.
  10. Make sure the policy is enabled.
  11. Create.

Default Value: Disabled.

Usage

Run the control in your terminal:

powerpipe control run microsoft365_compliance.control.cis_v140_1_1_2

Snapshot and share results via Turbot Pipes:

powerpipe login
powerpipe control run microsoft365_compliance.control.cis_v140_1_1_2 --share

SQL

This control uses a named query:

azuread_all_user_mfa_enabled

Tags