Ensure that 'Multi-Factor Auth Status' is 'Enabled' for all Non-Privileged Users
Risk Level: High
Cloud Entity: Azure Active Directory
CloudGuard Rule ID: D9.AZU.IAM.47
Covered by Spectral: No
Category: Security, Identity, & Compliance
GSL LOGIC
User should have userCredentialRegistrationDetails.isRegisterWithMfa=trueREMEDIATION
From Portal
- From Azure Home, select the Portal Menu.
- Select the Azure Active Directory blade.
- Select 'Users'.
- Select All Users.
- Click on Per-User MFA button on the top bar.
- Ensure that for all users MULTI-FACTOR AUTH STATUS is Enabled.
Note: Please note that at the time of writing, there is no API, Azure CLI or Powershell mechanism available to programmatically conduct security assessment or remediation for this recommendation. By default, multi-factor authentication is disabled for all users.
References
- https://docs.microsoft.com/en-us/azure/multi-factor-authentication/multi-factor-authentication
- https://workbench.cisecurity.org/sections/1460902/recommendations/2349013
Azure Active Directory
Azure Active Directory (Azure AD) is Microsoft’s cloud-based identity and access management service, which helps your employees sign in and access resources in external resources and internal res
Compliance Frameworks
- AZU PCI-DSS 4.0
- Azure CIS Foundations v. 1.5.0
- Azure CIS Foundations v.2.0
- Azure CloudGuard Best Practices
- Azure Dashboard System Ruleset
- Azure NIST 800-53 Rev 5
- CloudGuard Azure All Rules Ruleset
Updated 7 months ago