For a Microsoft Azure business-to-business (B2B) collaboration, each Microsoft Entra ID guest user needs to be associated with a business owner or business process. When there is no need for B2B collaboration, ensure that there are no Microsoft Entra ID guest users available within your Microsoft Azure account.
This rule resolution is part of the Conformity Security & Compliance tool for Azure.
A Microsoft Entra business-to-business (B2B) collaboration is used to securely share your applications and services with guest users and external partners from other organizations, while maintaining full control over your own data. Microsoft Entra ID is configured to handle B2B collaborations, allowing you to invite people from outside your organization to be guest users within your Azure cloud account. Unless you have a real business need that requires to provide guest access to external users, avoid creating such guest users. Microsoft Entra ID guest users are usually added outside the employee onboarding/offboarding process managed by your company and this can eventually lead to potential security vulnerabilities.
Audit
To determine if there are any Microsoft Entra ID guest users available in your Azure account, perform the following actions:
Remediation / Resolution
Remove any Microsoft Entra ID guest users that are not linked to a business owner or business process, created in your Microsoft Azure cloud account. To delete Microsoft Entra ID guest users, perform the following actions:
References
- Azure Official Documentation
- Microsoft Entra ID documentation
- Microsoft Entra External ID documentation
- Add or delete users
- Add Microsoft Entra B2B collaboration users in the Microsoft Entra admin center
- CIS Microsoft Azure Foundations
- Azure Command Line Interface (CLI) Documentation
- az
- az ad user list
- az ad user delete