turbot/azure_compliance

Control: 1.2.3 Ensure that A Multi-factor Authentication Policy Exists for Administrative Groups

Description

For designated users, they will be prompted to use their multi-factor authentication (MFA) process on login.

Enabling multi-factor authentication is a recommended setting to limit the use of Administrative accounts to authenticated personnel.

Remediation

From Azure Portal

  1. From Azure Home open the Portal Menu in top left, and select Azure Active Directory.
  2. Scroll down in the menu on the left, and select Security.
  3. Select on the left side Conditional Access.
  4. Click the + New policy

Default Value

By default, MFA is not enabled for any administrative accounts.

Usage

Run the control in your terminal:

powerpipe control run azure_compliance.control.cis_v150_1_2_3

Snapshot and share results via Turbot Pipes:

powerpipe login
powerpipe control run azure_compliance.control.cis_v150_1_2_3 --share

SQL

This control uses a named query:

ad_manual_control

Tags