5.4.3 Use Entra ID Client Authentication and Azure RBAC where possible

Information

Cosmos DB can use tokens or Entra ID for client authentication which in turn will use Azure RBAC for authorization. Using Entra ID is significantly more secure because Entra ID handles the credentials and allows for MFA and centralized management, and the Azure RBAC is better integrated with the rest of Azure.

Rationale:

Entra ID client authentication is considerably more secure than token-based authentication because the tokens must be persistent at the client. Entra ID does not require this.

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

Map all the resources that currently have access to the Azure Cosmos DB account with keys or access tokens.
Create an Entra ID identity for each of these resources:

For Azure resources, you can create a managed identity. You may choose between system-assigned and user-assigned managed identities.

For non-Azure resources, create an Entra ID identity. Grant each Entra ID identity the minimum permission it requires. When possible, we recommend you use one of the 2 built-in role definitions: Cosmos DB Built-in Data Reader or Cosmos DB Built-in Data Contributor. Validate that the new resource is functioning correctly. After new permissions are granted to identities, it may take a few hours until they propagate. When all resources are working correctly with the new identities, continue to the next step.

Remediate from PowerShell

$cosmosdbname = '<your-cosmos-db-account-name>'
$resourcegroup = '<your-resource-group-name>'
az cosmosdb show --name $cosmosdbname --resource-group $resourcegroup | ConvertFrom-Json
az resource update --ids $cosmosdb.id --set properties.disableLocalAuth=true --latest-include-preview

Default Value:

The default is to use tokens/keys for client authentication.

See Also

https://workbench.cisecurity.org/benchmarks/16820

Item Details

Category: ACCESS CONTROL

References: 800-53|AC-2(1), 800-53|AC-3, CSCv7|16.2

Plugin: microsoft_azure

Control ID: 3bc3b588e1fbb2c8d2fa6ea640aecdbfe4b41ffe20336378f1f6bf655277c697