9.1.3 Ensure guest access to content is restricted

Information

This setting allows Microsoft Entra B2B guest users to have full access to the browsing experience using the left-hand navigation pane in the organization. Guest users who have been assigned workspace roles or specific item permissions will continue to have those roles and/or permissions, even if this setting is disabled.

The recommended state is Enabled for a subset of the organization or Disabled.

Rationale:

Establishing and enforcing a dedicated security group prevents unauthorized access to Microsoft Fabric for guests collaborating in Entra that are new or assigned guest status from other applications. This upholds the principle of least privilege and uses role-based access control (RBAC). These security groups can also be used for tasks like conditional access, enhancing risk management and user accountability across the organization.

Impact:

Security groups will need to be more closely tended to and monitored.

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

Restrict guest user content access:

Navigate to Microsoft Fabric https://app.powerbi.com/admin-portal

Select Tenant settings.

Scroll to Export and Sharing settings.

Set Guest users can browse and access Fabric content to one of these states:

State 1: Disabled

State 2: Enabled with Specific security groups selected and defined.

Important: If the organization doesn't actively use this feature it is recommended to keep it Disabled.

Default Value:

Disabled

See Also

https://workbench.cisecurity.org/benchmarks/15279

Item Details

Category: ACCESS CONTROL, MEDIA PROTECTION

References: 800-53|AC-3, 800-53|AC-5, 800-53|AC-6, 800-53|MP-2, CSCv7|14.6

Plugin: microsoft_azure

Control ID: 8526cc0a33d83554112c371d5edaedef44a068c6f24d5564785e03ad00abb503