turbot/azure_compliance

Control: 1.3 Ensure that 'Restrict non-admin users from creating tenants' is set to 'Yes'

Description

Require administrators or appropriately delegated users to create new tenants.

It is recommended to only allow an administrator to create new tenants. This prevent users from creating new Azure AD or Azure AD B2C tenants and ensures that only authorized users are able to do so.

Remediation

From Azure Portal

  1. From Azure Home select the Portal Menu.
  2. Select Microsoft Entra ID
  3. Select Users
  4. Select User settings
  5. Set Restrict non-admin users from creating tenants to Yes

From PowerShell

Import-Module Microsoft.Graph.Identity.SignIns
Connect-MgGraph -Scopes 'Policy.ReadWrite.Authorization'
Select-MgProfile -Name beta
$params = @{
DefaultUserRolePermissions =
@{
AllowedToCreateTenants = $false
}
}
Update-MgPolicyAuthorizationPolicy -AuthorizationPolicyId -BodyParameter
$params

Usage

Run the control in your terminal:

powerpipe control run azure_compliance.control.cis_v210_1_3

Snapshot and share results via Turbot Pipes:

powerpipe login
powerpipe control run azure_compliance.control.cis_v210_1_3 --share

SQL

This control uses a named query:

ad_manual_control

Tags