Control: 6.4 Ensure that 'Restrict non-admin users from creating tenants' is set to 'Yes'
Description
Require administrators or appropriately delegated users to create new tenants.
It is recommended to only allow an administrator to create new tenants. This prevent users from creating new Microsoft Entra ID or Azure AD B2C tenants and ensures that only authorized users are able to do so.
Remediation
From Azure Portal
- From Azure Home select the Portal Menu.
- Select Microsoft Entra ID.
- Under Manage, selectUsers.
- Under Manage, selectUser settings.
- Set Restrict non-admin users from creating tenantstoYes.
- Click Save.
From PowerShell
Import-Module Microsoft.Graph.Identity.SignIns
Connect-MgGraph -Scopes 'Policy.ReadWrite.Authorization'
Select-MgProfile -Name beta
$params = @{DefaultUserRolePermissions = @{AllowedToCreateTenants = $false}}
Update-MgPolicyAuthorizationPolicy -AuthorizationPolicyId -BodyParameter $params
Usage
Run the control in your terminal:
powerpipe control run azure_compliance.control.cis_v400_6_4Snapshot and share results via Turbot Pipes:
powerpipe loginpowerpipe control run azure_compliance.control.cis_v400_6_4 --shareSQL
This control uses a named query:
select  'active_directory' as resource,  'info' as status,  'Manual verification required.' as reason;