turbot/azure_compliance

Control: 1.4 Ensure Access Review is Set Up for External Users in Azure AD Privileged Identity Management

Description

This recommendation extends guest access review by utilizing the Azure AD Privileged Identity Management feature provided in Azure AD Premium P2.

Azure AD is extended to include Azure AD B2B collaboration, allowing you to invite people from outside your organization to be guest users in your cloud account and sign in with their own work, school, or social identities. Guest users allow you to share your company's applications and services with users from any other organization, while maintaining control over your own corporate data.

Work with external partners, large or small, even if they don't have Azure AD or an IT department. A simple invitation and redemption process lets partners use their own credentials to access your company's resources a a guest user.

Remediation

From Azure Portal

  1. From the Azure Portal home page click the portal menu in the top left.
  2. Select Azure Active Directory.
  3. Select Users in the left column under the Manage heading.
  4. Next to the search box select the filter option.
  5. Search for and select User Type.
  6. In the third drop down Value select Guest.
  7. Review the guest users in your Active Directory.
  8. For those you wish to delete, select the checkbox on the left then the Delete option in the top row.

From Azure CLI

With the information from the audit procedure, to remove a Guest user run the following command with their User Principal Value.

Remove-AzureADUser -ObjectId "<UserPrincipalName@emailaddress.com"

From Powershell

With the information from the audit procedure, to remove a Guest user run the following command with their User Principal Value.

Remove-AzureADUser -ObjectId "<UserPrincipalName@emailaddress.com>"

Default Value

By default no guest users are created.

Usage

Run the control in your terminal:

powerpipe control run azure_compliance.control.cis_v200_1_4

Snapshot and share results via Turbot Pipes:

powerpipe login
powerpipe control run azure_compliance.control.cis_v200_1_4 --share

SQL

This control uses a named query:

ad_manual_control

Tags