Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
1 change: 1 addition & 0 deletions compliance/controls/azure/azure_cis_v210_1_13.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -4,6 +4,7 @@ type: control
description: Require administrators or appropriately delegated users to register third-party applications.
integration_type:
- azure_subscription
- entraid_directory
parameters: []
policy:
language: sql
Expand Down
1 change: 1 addition & 0 deletions compliance/controls/azure/azure_cis_v210_1_18.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -4,6 +4,7 @@ type: control
description: Restrict security group creation to administrators only.
integration_type:
- azure_subscription
- entraid_directory
parameters: []
policy:
language: sql
Expand Down
1 change: 1 addition & 0 deletions compliance/controls/azure/azure_cis_v210_1_25.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -4,6 +4,7 @@ type: control
description: This recommendation aims to maintain a balance between security and operational efficiency by ensuring that a minimum of 2 and a maximum of 4 users are assigned the Global Administrator role in Microsoft Entra ID. Having at least two Global Administrators ensures redundancy, while limiting the number to four reduces the risk of excessive privileged access.
integration_type:
- azure_subscription
- entraid_directory
parameters: []
policy:
language: sql
Expand Down
1 change: 1 addition & 0 deletions compliance/controls/azure/azure_cis_v210_1_2_6.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -4,6 +4,7 @@ type: control
description: This recommendation ensures that users accessing the Windows Azure Service Management API (i.e. Azure Powershell, Azure CLI, Azure Resource Manager API, etc.) are required to use multifactor authentication (MFA) credentials when accessing resources through the Windows Azure Service Management API.
integration_type:
- azure_subscription
- entraid_directory
parameters: []
policy:
language: sql
Expand Down
1 change: 1 addition & 0 deletions compliance/controls/azure/azure_cis_v210_1_2_7.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -4,6 +4,7 @@ type: control
description: This recommendation ensures that users accessing Microsoft Admin Portals (i.e. Microsoft 365 Admin, Microsoft 365 Defender, Exchange Admin Center, Azure Portal, etc.) are required to use multifactor authentication (MFA) credentials when logging into an Admin Portal.
integration_type:
- azure_subscription
- entraid_directory
parameters: []
policy:
language: sql
Expand Down
1 change: 1 addition & 0 deletions compliance/controls/azure/azure_cis_v210_1_4.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -4,6 +4,7 @@ type: control
description: Microsoft Entra ID is extended to include Azure AD B2B collaboration, allowing you to invite people from outside your organization to be guest users in your cloud account and sign in with their own work, school, or social identities. Guest users allow you to share your company's applications and services with users from any other organization, while maintaining control over your own corporate data. Work with external partners, large or small, even if they don't have Azure AD or an IT department. A simple invitation and redemption process lets partners use their own credentials to access your company's resources as a guest user. Guest users in every subscription should be review on a regular basis to ensure that inactive and unneeded accounts are removed.
integration_type:
- azure_subscription
- entraid_directory
parameters: []
policy:
language: sql
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -4,6 +4,7 @@ type: control
description: AzureAD Users should have MFA Enabled with Azure subscription role assignment
integration_type:
- azure_subscription
- entraid_directory
parameters:
- key: entraidAccountStatusInclude
value: ""
Expand Down