Benchmark: PCI DSS requirement 8.3.1
Description
Incorporate multi-factor authentication for all non-console access into the CDE for personnel with administrative access.
Usage
Install the mod:
mkdir dashboardscd dashboardspowerpipe mod initpowerpipe mod install github.com/turbot/steampipe-mod-azure-compliance
Start the Powerpipe server:
steampipe service startpowerpipe server
Open http://localhost:9033 in your browser and select PCI DSS requirement 8.3.1.
Run this benchmark in your terminal:
powerpipe benchmark run azure_compliance.benchmark.pci_dss_v321_requirement_8_3_1
Snapshot and share results via Turbot Pipes:
powerpipe benchmark run azure_compliance.benchmark.pci_dss_v321_requirement_8_3_1 --share
Controls
- Guest accounts with owner permissions on Azure resources should be removed
- Guest accounts with read permissions on Azure resources should be removed
- Guest accounts with write permissions on Azure resources should be removed
- Audit usage of custom RBAC roles
- Accounts with owner permissions on Azure resources should be MFA enabled
- Accounts with write permissions on Azure resources should be MFA enabled
- An Azure Active Directory administrator should be provisioned for SQL servers