5.1.2.4 Ensure 'Restrict access to the Azure AD administration portal' is set to 'Yes'

Information

Restrict non-privileged users from signing into the Microsoft Entra admin center.

Note: This recommendation only affects access to the web portal. It does not prevent privileged users from using other methods such as Rest API or PowerShell to obtain information. Those channels are addressed elsewhere in this document.

Rationale:

The Microsoft Entra admin center contains sensitive data and permission settings, which are still enforced based on the user's role. However, an end user may inadvertently change properties or account settings that could result in increased administrative overhead. Additionally, a compromised end user account could be used by a malicious attacker as a means to gather additional information and escalate an attack.

Note: Users will still be able to sign into Microsoft Entra admin center but will be unable to see directory information.

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

To remediate using the UI:

Navigate to Microsoft Entra admin center https://entra.microsoft.com/

Click to expand Identity> Users > User settings.

Set Restrict access to Microsoft Entra admin center to Yes then Save.

Default Value:

No - Non-administrators can access the Microsoft Entra admin center.

See Also

https://workbench.cisecurity.org/benchmarks/15279

Item Details

Category: ACCESS CONTROL

References: 800-53|AC-6

Plugin: microsoft_azure

Control ID: 2afdcf6eeaa58880bcee8490291fc1cb00bb8fef461612cd741a3a6b2973fdb0