Benchmark: 1.1 Azure Active Directory
Overview
This section covers recommendations for Azure Active Directory (AAD) as the underlying AuthN / AuthZ for SaaS.
Usage
Install the mod:
mkdir dashboardscd dashboardspowerpipe mod initpowerpipe mod install github.com/turbot/steampipe-mod-microsoft365-compliance
Start the Powerpipe server:
steampipe service startpowerpipe server
Open http://localhost:9033 in your browser and select 1.1 Azure Active Directory.
Run this benchmark in your terminal:
powerpipe benchmark run microsoft365_compliance.benchmark.cis_v150_1_1
Snapshot and share results via Turbot Pipes:
powerpipe benchmark run microsoft365_compliance.benchmark.cis_v150_1_1 --share
Controls
- 1.1.1 Ensure multifactor authentication is enabled for all users in administrative roles
- 1.1.2 Ensure multifactor authentication is enabled for all users in all roles
- 1.1.3 Ensure that between two and four global admins are designated
- 1.1.4 Ensure self-service password reset is enabled
- 1.1.5 Ensure that password protection is enabled for Active Directory
- 1.1.6 Enable Conditional Access policies to block legacy authentication
- 1.1.8 Enable Azure AD Identity Protection sign-in risk policies
- 1.1.9 Enable Azure AD Identity Protection user risk policies
- 1.1.11 Ensure Security Defaults is disabled on Azure Active Directory
- 1.1.12 Ensure that only organizationally managed/approved public groups exist
- 1.1.15 Ensure Sign-in frequency is enabled and browser sessions are not persistent for Administrative users