Ensure that Multi-Factor Authentication is enabled for all user credentials that have write access to the cloud resources within your Microsoft Azure account. Multi-Factor Authentication (MFA) is a simple, yet efficient method of verifying your Azure user identity by requiring an authentication code generated by a virtual or hardware device, also known as passcode, used in addition to your usual access credentials such as user name and password.
This rule resolution is part of the Conformity Security & Compliance tool for Azure.
Having an MFA-protected Azure account represents an efficient way to safeguard your cloud resources against malicious users and attackers, as Multi-Factor Authentication adds extra security to the authentication process by requiring privileged users (contributors, subscription owners and service co-administrators) to present a minimum of two separate forms of authorization before their access is granted. With Multi-Factor Authentication (MFA) enabled, an attacker would need to compromise at least two different authentication mechanisms, increasing the difficulty of compromising access credentials and thus reducing the risk of attack significantly.
Audit
To determine if MFA is enabled for all Microsoft Azure privileged users, perform the following actions:
Remediation / Resolution
To enable Multi-Factor Authentication (MFA) for your Azure cloud privileged users, perform the following actions:
Note 1: By default, MFA is disabled for all Microsoft Azure users, therefore their MFA state is set to Disabled. Once you enroll your users within MFA, their state changes to Enabled. When enabled users sign in and complete the MFA registration process, their state changes to Enforced.Note 2: As an example, this conformity rule will use Microsoft Authenticator as MFA device as this is one of the most popular MFA virtual devices used by Azure cloud customers.
References
- Azure Official Documentation
- How it works: Microsoft Entra multifactor authentication
- Plan a Microsoft Entra multifactor authentication deployment
- Use the sign-ins report to review Microsoft Entra multifactor authentication events
- Enable per-user Microsoft Entra multifactor authentication to secure sign-in events
- CIS Microsoft Azure Foundations
- Azure PowerShell Documentation
- Microsoft Entra ID (MSOnline)
- MSOnline
- Get-MsolUser
- Set-MsolUser
- Azure Command Line Interface (CLI) Documentation
- az
- az ad user list
- az role assignment list