Control: 2.1 Ensure third party integrated applications are not allowed
Description
Do not allow third party integrated applications to connect to your services.
You should not allow third party integrated applications to connect to your services unless there is a very clear value and you have robust security controls in place. While there are legitimate uses, attackers can grant access from breached accounts to third party applications to exfiltrate data from your tenancy without having to maintain the breached account.
Remediation
To prohibit third party integrated applications, use the Microsoft 365 Admin Center:
- Select
Admin Centers
andAzure Active Directory
. - Select
Users
from the Azure navigation pane. - Select
Users settings
. - Set
App registrations
is set toNo
. - Click
Save
.
Default Value: Yes
Usage
Run the control in your terminal:
powerpipe control run microsoft365_compliance.control.cis_v140_2_1
Snapshot and share results via Turbot Pipes:
powerpipe loginpowerpipe control run microsoft365_compliance.control.cis_v140_2_1 --share
SQL
This control uses a named query:
azuread_third_party_application_not_allowed