rules/findings/EntraID/IAM/CIS3.0/entra-iam-users-disabled-mfa.json
{
"args": [ ], "provider": "EntraID", "serviceType": "Entra Identity Governance", "serviceName": "Microsoft Entra ID", "displayName": "Ensure that 'Multi-Factor Auth Status' is 'Enabled' for all Non-Privileged Users", "description": " ###### IMPORTANT - Please read the section overview: If your organization pays for Microsoft Entra ID licensing (included in Microsoft 365 E3, E5, or F5, and EM&S E3 or E5 licenses) and CAN use Conditional Access, ignore the recommendations in this section and proceed to the Conditional Access section. <br/> Enable multi-factor authentication for all non-privileged users.", "rationale": "Multi-factor authentication requires an individual to present a minimum of two separate forms of authentication before access is granted. Multi-factor authentication provides additional assurance that the individual attempting to gain access is who they claim to be. With multi-factor authentication, an attacker would need to compromise at least two different authentication mechanisms, increasing the difficulty of compromise and thus reducing the risk.", "impact": "Users would require two forms of authentication before any access is granted. Also, this requires an overhead for managing dual forms of authentication.", "remediation": { "text": " ###### Remediate from Azure Portal 1. From Azure Home select the Portal Menu 2. Select `Microsoft Entra ID` blade 3. Under `Manage`, click `Users` 4. Click on the `Per-User MFA` button in the top row menu 5. Check the box next to each user 6. Click `Enable MFA` 7. Click `Enable` ", "code": { "powerShell": null, "iac": null, "terraform": null, "other": null } }, "recommendation": null, "references": [ "https://docs.microsoft.com/en-us/azure/multi-factor-authentication/multi-factor-authentication", "https://docs.microsoft.com/en-us/azure/active-directory/authentication/howto-mfa-userstates", "https://docs.microsoft.com/en-us/azure/security/benchmarks/security-controls-v2-identity-management#im-4-use-strong-authentication-controls-for-all-azure-active-directory-based-access", "https://docs.microsoft.com/en-us/azure/security/fundamentals/identity-management-best-practices" ], "compliance": [ { "name": "CIS Microsoft Azure Foundations", "version": "3.0.0", "reference": "2.1.3", "profile": "Level 2" } ], "level": "medium", "tags": [ ], "rule": { "path": "aad_domain_users", "subPath": null, "selectCondition": { }, "query": [ { "filter": [ { "conditions": [ [ "mfaenabled", "ne", "" ], [ "mfaenabled", "eq", "false" ] ], "operator": "and" } ] } ], "shouldExist": null, "returnObject": null, "removeIfNotExists": "true" }, "output": { "html": { "data": { "properties": { "userPrincipalName": "User Principal Name", "objectType": "Object Type", "userType": "User Type", "mfaenabled": "MFA enabled" }, "expandObject": null }, "table": "Normal", "decorate": [ ], "emphasis": [ ], "actions": { "objectData": { "properties": [ "*" ], "expandObject": null, "limit": null }, "showGoToButton": "False", "showModalButton": "False", "directLink": null } }, "text": { "data": { "properties": { }, "expandObject": null }, "status": { "keyName": [ ], "message": "MFA is not enabled for all non privileged users", "defaultMessage": null }, "properties": { "resourceName": null, "resourceId": null, "resourceType": null }, "onlyStatus": true } }, "idSuffix": "aad_users_with_mfa_disabled", "notes": [ ], "categories": [ ] } |