Control: 1.1.12 Ensure that only organizationally managed/approved public groups exist
Description
Microsoft 365 Groups is the foundational membership service that drives all teamwork across Microsoft 365. With Microsoft 365 Groups, you can give a group of people access to a collection of shared resources. While there are several different types of group types this recommendation is concerned with Microsoft 365 Groups.
In the Administration panel, when a group is created, the default privacy value is "Public".
Ensure that only organizationally managed and approved public groups exist. When a group has a "public" privacy, users may access data related to this group (e.g. SharePoint), through three methods:
- By using the Azure portal, and adding themselves into the public group.
- By requesting access to the group from the Group application of the Access Panel.
- By accessing the SharePoint URL.
Administrators are notified when a user uses the Azure Portal. Requesting access to the group forces users to send a message to the group owner, but they still have immediately access to the group. The SharePoint URL is usually guessable, and can be found from the Group application of the Access Panel. If group privacy is not controlled, any user may access sensitive information, according to the group they try to access.
Note: Public in this case meaning public to the identities within organization.
Remediation
In the Microsoft 365 Administration portal, go to:
- Teams & groups.
- Active teams & groups.
- Select a Public group.
- Go to 'Settings'.
- Set Privacy to 'Private'.
Default Value: Public when create from the Administration portal; private otherwise.
Usage
Run the control in your terminal:
powerpipe control run microsoft365_compliance.control.cis_v150_1_1_12
Snapshot and share results via Turbot Pipes:
powerpipe loginpowerpipe control run microsoft365_compliance.control.cis_v150_1_1_12 --share
SQL
This control uses a named query:
azuread_group_not_public