Skip to content

Commit a0a5d52

Browse files
authored
Merge pull request #234856 from v-edmckillop/patch-148
Update toc.yml
2 parents 6e42f85 + ba92db1 commit a0a5d52

11 files changed

+946
-0
lines changed

articles/active-directory/standards/azure-ad-pci-dss-guidance.md

Lines changed: 225 additions & 0 deletions
Large diffs are not rendered by default.
Lines changed: 45 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,45 @@
1+
---
2+
title: Azure Active Directory PCI-DSS Multi-Factor Authentication guidance
3+
description: Learn the authentication methods supported by Azure AD to meet PCI MFA requirements
4+
services: active-directory
5+
ms.service: active-directory
6+
ms.subservice: standards
7+
ms.workload: identity
8+
ms.topic: how-to
9+
author: jricketts
10+
ms.author: jricketts
11+
manager: martinco
12+
ms.reviewer: martinco
13+
ms.date: 04/18/2023
14+
ms.custom: it-pro
15+
ms.collection:
16+
---
17+
18+
# Azure Active Directory PCI-DSS Multi-Factor Authentication guidance
19+
**Information Supplement: Multi-Factor Authentication v 1.0**
20+
21+
Use the following table of authentication methods supported by Azure Active Directory (Azure AD) to meet requirements in the PCI Security Standards Council [Information Supplement, Multi-Factor Authentication v 1.0](https://listings.pcisecuritystandards.org/pdfs/Multi-Factor-Authentication-Guidance-v1.pdf).
22+
23+
|Method|To meet requirements|Protection|MFA element|
24+
|-|-|-|-|
25+
|[Passwordless phone sign in with Microsoft Authenticator](../authentication/howto-authentication-passwordless-phone.md)|Something you have (device with a key), something you know or are (PIN or biometric) </br> In iOS, Authenticator Secure Element (SE) stores the key in Keychain. [Apple Platform Security, Keychain data protection](https://support.apple.com/guide/security/keychain-data-protection-secb0694df1a/web) </br> In Android, Authenticator uses Trusted Execution Engine (TEE) by storing the key in Keystore. [Developers, Android Keystore system](https://developer.android.com/training/articles/keystore) </br> When users authenticate using Microsoft Authenticator, Azure AD generates a random number the user enters in the app. This action fulfills the out-of-band authentication requirement. |Customers configure device protection policies to mitigate device compromise risk. For instance, Microsoft Intune compliance policies. |Users unlock the key with the gesture, then Azure AD validates the authentication method. |
26+
|[Windows Hello for Business Deployment Prerequisite Overview](/windows/security/identity-protection/hello-for-business/hello-identity-verification) |Something you have (Windows device with a key), and something you know or are (PIN or biometric). </br> Keys are stored with device Trusted Platform Module (TPM). Customers use devices with hardware TPM 2.0 or later to meet the authentication method independence and out-of-band requirements. </br> [Certified Authenticator Levels](https://fidoalliance.org/certification/authenticator-certification-levels/)|Configure device protection policies to mitigate device compromise risk. For instance, Microsoft Intune compliance policies. |Users unlock the key with the gesture for Windows device sign in.|
27+
|[Enable passwordless security key sign-in, Enable FIDO2 security key method](../authentication/howto-authentication-passwordless-security-key.md)|Something that you have (FIDO2 security key) and something you know or are (PIN or biometric). </br> Keys are stored with hardware cryptographic features. Customers use FIDO2 keys, at least Authentication Certification Level 2 (L2) to meet the authentication method independence and out-of-band requirement.|Procure hardware with protection against tampering and compromise.|Users unlock the key with the gesture, then Azure AD validates the credential. |
28+
|[Overview of Azure AD certificate-based authentication](../authentication/concept-certificate-based-authentication.md)|Something you have (smart card) and something you know (PIN). </br> Physical smart cards or virtual smartcards stored in TPM 2.0 or later, are a Secure Element (SE). This action meets the authentication method independence and out-of-band requirement.|Procure smart cards with protection against tampering and compromise.|Users unlock the certificate private key with the gesture, or PIN, then Azure AD validates the credential. |
29+
30+
## Next steps
31+
32+
PCI-DSS requirements **3**, **4**, **9**, and **12** aren't applicable to Azure AD, therefore there are no corresponding articles. To see all requirements, go to pcisecuritystandards.org: [Official PCI Security Standards Council Site](https://docs-prv.pcisecuritystandards.org/PCI%20DSS/Standard/PCI-DSS-v4_0.pdf).
33+
34+
To configure Azure AD to comply with PCI-DSS, see the following articles.
35+
36+
* [Azure AD PCI-DSS guidance](azure-ad-pci-dss-guidance.md)
37+
* [Requirement 1: Install and Maintain Network Security Controls](pci-requirement-1.md)
38+
* [Requirement 2: Apply Secure Configurations to All System Components](pci-requirement-2.md)
39+
* [Requirement 5: Protect All Systems and Networks from Malicious Software](pci-requirement-5.md)
40+
* [Requirement 6: Develop and Maintain Secure Systems and Software](pci-requirement-6.md)
41+
* [Requirement 7: Restrict Access to System Components and Cardholder Data by Business Need to Know](pci-requirement-7.md)
42+
* [Requirement 8: Identify Users and Authenticate Access to System Components](pci-requirement-8.md)
43+
* [Requirement 10: Log and Monitor All Access to System Components and Cardholder Data](pci-requirement-10.md)
44+
* [Requirement 11: Test Security of Systems and Networks Regularly](pci-requirement-11.md)
45+
* [Azure AD PCI-DSS Multi-Factor Authentication guidance](azure-ad-pci-dss-mfa.md) (You're here)
Lines changed: 83 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,83 @@
1+
---
2+
title: Azure Active Directory and PCI-DSS Requirement 1
3+
description: Learn PCI-DSS defined approach requirements for installing and maintaining network security controls
4+
services: active-directory
5+
ms.service: active-directory
6+
ms.subservice: standards
7+
ms.workload: identity
8+
ms.topic: how-to
9+
author: jricketts
10+
ms.author: jricketts
11+
manager: martinco
12+
ms.reviewer: martinco
13+
ms.date: 04/18/2023
14+
ms.custom: it-pro
15+
ms.collection:
16+
---
17+
18+
# Azure Active Directory and PCI-DSS Requirement 1
19+
20+
**Requirement 1: Install and Maintain Network Security Controls**
21+
</br> **Defined approach requirements**
22+
23+
## 1.1 Processes and mechanisms for installing and maintaining network security controls are defined and understood.
24+
25+
|PCI-DSS Defined approach requirements|Azure AD guidance and recommendations|
26+
|-|-|
27+
|**1.1.1** All security policies and operational procedures that are identified in Requirement 1 are: </br> Documented </br> Kept up to date </br> In use </br> Known to all affected parties|Use the guidance and links herein to produce the documentation to fulfill requirements based on your environment configuration.|
28+
|**1.1.2** Roles and responsibilities for performing activities in Requirement 1 are documented, assigned, and understood|Use the guidance and links herein to produce the documentation to fulfill requirements based on your environment configuration.|
29+
30+
## 1.2 Network security controls (NSCs) are configured and maintained.
31+
32+
|PCI-DSS Defined approach requirements|Azure AD guidance and recommendations|
33+
|-|-|
34+
|**1.2.1** Configuration standards for NSC rulesets are: </br> Defined </br> Implemented </br> Maintained|Integrate access technologies such as VPN, remote desktop, and network access points with Azure AD for authentication and authorization, if the access technologies support modern authentication. Ensure NSC standards, which pertain to identity-related controls, include definition of Conditional Access policies, application assignment, access reviews, group management, credential policies, etc. [Azure AD operations reference guide](../fundamentals/active-directory-ops-guide-intro.md)|
35+
|**1.2.2** All changes to network connections and to configurations of NSCs are approved and managed in accordance with the change control process defined at Requirement 6.5.1|Not applicable to Azure AD.|
36+
|**1.2.3** An accurate network diagram(s) is maintained that shows all connections between the cardholder data environment (CDE) and other networks, including any wireless networks.|Not applicable to Azure AD.|
37+
|**1.2.4** An accurate data-flow diagram(s) is maintained that meets the following: </br> Shows all account data flows across systems and networks. </br> Updated as needed upon changes to the environment.|Not applicable to Azure AD.|
38+
|**1.2.5** All services, protocols, and ports allowed are identified, approved, and have a defined business need|Not applicable to Azure AD.|
39+
|**1.2.6** Security features are defined and implemented for all services, protocols, and ports in use and considered insecure, such that risk is mitigated.|Not applicable to Azure AD.|
40+
|**1.2.7** Configurations of NSCs are reviewed at least once every six months to confirm they're relevant and effective.|Use Azure AD access reviews to automate group-membership reviews and applications, such as VPN appliances, which align to network security controls in your CDE. [What are access reviews?](../governance/access-reviews-overview.md)|
41+
|**1.2.8** Configuration files for NSCs are: </br> Secured from unauthorized access </br> Kept consistent with active network configurations|Not applicable to Azure AD.|
42+
43+
## 1.3 Network access to and from the cardholder data environment is restricted.
44+
45+
|PCI-DSS Defined approach requirements|Azure AD guidance and recommendations|
46+
|-|-|
47+
|**1.3.1** Inbound traffic to the CDE is restricted as follows: </br> To only traffic that is necessary. </br> All other traffic is specifically denied|Use Azure AD to configure named locations to create Conditional Access policies. Calculate user and sign-in risk. Microsoft recommends customers populate and maintain the CDE IP addresses using network locations. Use them to define Conditional Access policy requirements. [Using the location condition in a CA policy](../conditional-access/location-condition.md)|
48+
|**1.3.2** Outbound traffic from the CDE is restricted as follows: </br> To only traffic that is necessary. </br> All other traffic is specifically denied|For NSC design, include Conditional Access policies for applications to allow access to CDE IP addresses. </br> Emergency access or remote access to establish connectivity to CDE, such as virtual private network (VPN) appliances, captive portals, might need policies to prevent unintended lockout. [Using the location condition in a CA policy](../conditional-access/location-condition.md) </br> [Manage emergency access accounts in Azure AD](../roles/security-emergency-access.md)|
49+
|**1.3.3** NSCs are installed between all wireless networks and the CDE, regardless of whether the wireless network is a CDE, such that: </br> All wireless traffic from wireless networks into the CDE is denied by default. </br> Only wireless traffic with an authorized business purpose is allowed into the CDE.|For NSC design, include Conditional Access policies for applications to allow access to CDE IP addresses. </br> Emergency access or remote access to establish connectivity to CDE, such as virtual private network (VPN) appliances, captive portals, might need policies to prevent unintended lockout. [Using the location condition in a CA policy](../conditional-access/location-condition.md) </br> [Manage emergency access accounts in Azure AD](../roles/security-emergency-access.md)|
50+
51+
## 1.4 Network connections between trusted and untrusted networks are controlled.
52+
53+
|PCI-DSS Defined approach requirements|Azure AD guidance and recommendations|
54+
|-|-|
55+
|**1.4.1** NSCs are implemented between trusted and untrusted networks.|Not applicable to Azure AD.|
56+
|**1.4.2** Inbound traffic from untrusted networks to trusted networks is restricted to: </br> Communications with system components that are authorized to provide publicly accessible services, protocols, and ports. </br> Stateful responses to communications initiated by system components in a trusted network. </br> All other traffic is denied.|Not applicable to Azure AD.|
57+
|**1.4.3** Anti-spoofing measures are implemented to detect and block forged source IP addresses from entering the trusted network.|Not applicable to Azure AD.|
58+
|**1.4.4** System components that store cardholder data are not directly accessible from untrusted networks.|In addition to controls in the networking layer, applications in the CDE using Azure AD can use Conditional Access policies. Restrict access to applications based on location. [Using the location condition in a CA policy](../conditional-access/location-condition.md)|
59+
|**1.4.5** The disclosure of internal IP addresses and routing information is limited to only authorized parties.|Not applicable to Azure AD.|
60+
61+
## 1.5 Risks to the CDE from computing devices that are able to connect to both untrusted networks and the CDE are mitigated.
62+
63+
|PCI-DSS Defined approach requirements|Azure AD guidance and recommendations|
64+
|-|-|
65+
|**1.5.1** Security controls are implemented on any computing devices, including company- and employee-owned devices, that connect to both untrusted networks (including the Internet) and the CDE as follows: </br> Specific configuration settings are defined to prevent threats being introduced into the entity’s network. </br> Security controls are actively running. </br> Security controls are not alterable by users of the computing devices unless specifically documented and authorized by management on a case-by-case basis for a limited period.| Deploy Conditional Access policies that require device compliance. [Use compliance policies to set rules for devices you manage with Intune](/mem/intune/protect/device-compliance-get-started) </br> Integrate device compliance state with anti-malware solutions. [Enforce compliance for Microsoft Defender for Endpoint with Conditional Access in Intune](/mem/intune/protect/advanced-threat-protection) </br> [Mobile Threat Defense integration with Intune](/mem/intune/protect/mobile-threat-defense)|
66+
67+
## Next steps
68+
69+
PCI-DSS requirements **3**, **4**, **9**, and **12** aren't applicable to Azure AD, therefore there are no corresponding articles. To see all requirements, go to pcisecuritystandards.org: [Official PCI Security Standards Council Site](https://docs-prv.pcisecuritystandards.org/PCI%20DSS/Standard/PCI-DSS-v4_0.pdf).
70+
71+
To configure Azure AD to comply with PCI-DSS, see the following articles.
72+
73+
* [Azure AD PCI-DSS guidance](azure-ad-pci-dss-guidance.md)
74+
* [Requirement 1: Install and Maintain Network Security Controls](pci-requirement-1.md) (You're here)
75+
* [Requirement 2: Apply Secure Configurations to All System Components](pci-requirement-2.md)
76+
* [Requirement 5: Protect All Systems and Networks from Malicious Software](pci-requirement-5.md)
77+
* [Requirement 6: Develop and Maintain Secure Systems and Software](pci-requirement-6.md)
78+
* [Requirement 7: Restrict Access to System Components and Cardholder Data by Business Need to Know](pci-requirement-7.md)
79+
* [Requirement 8: Identify Users and Authenticate Access to System Components](pci-requirement-8.md)
80+
* [Requirement 10: Log and Monitor All Access to System Components and Cardholder Data](pci-requirement-10.md)
81+
* [Requirement 11: Test Security of Systems and Networks Regularly](pci-requirement-11.md)
82+
* [Azure AD PCI-DSS Multi-Factor Authentication guidance](azure-ad-pci-dss-mfa.md)
83+

0 commit comments

Comments
 (0)