MS.TEAMS.5.1v1 - Agencies SHOULD only allow installation of Microsoft apps approved by the agency.

Information

Allowing Teams integration with all Microsoft apps can expose the agency to potential vulnerabilities present in those apps. By only allowing specific apps and blocking all others, the agency will better manage its app integration and potential exposure points.

Solution

1. Sign in to the Microsoft Teams admin center.

2. Select Teams apps > Permission policies.

3. Select Global (Org-wide default).

4. Under Microsoft apps, select Allow specific apps and block all others or Block all apps.

5. Click Allow apps.

6. Search and Click Add to all appropriate Microsoft Apps.

7. Click Allow.

8. Click Save.

9. If custom policies have been created, repeat these steps for each policy, selecting the appropriate policy in step 3.

See Also

https://github.com/cisagov/ScubaGear/tree/v1.5.0/

Item Details

Category: SECURITY ASSESSMENT AND AUTHORIZATION, CONFIGURATION MANAGEMENT, RISK ASSESSMENT, SYSTEM AND SERVICES ACQUISITION, SYSTEM AND INFORMATION INTEGRITY

References: 800-53|CA-2, 800-53|CA-7, 800-53|CM-7, 800-53|CM-11, 800-53|RA-5, 800-53|SA-22, 800-53|SI-2

Plugin: microsoft_azure

Control ID: 8b4d55265929ac12cd866fd1f8a0b5c89b658369046ae4ef056afebe39b11e10