2.4 Ensure Guest Users Are Reviewed on a Regular Basis

Information

Microsoft Entra ID has native and extended identity functionality allowing you to invite people from outside your organization to be guest users in your cloud account and sign in with their own work, school, or social identities.

Rationale:

Guest users are typically added outside your employee on-boarding/off-boarding process and could potentially be overlooked indefinitely. To prevent this, guest users should be reviewed on a regular basis. During this audit, guest users should also be determined to not have administrative privileges.

Impact:

Before removing guest users, determine their use and scope. Like removing any user, there may be unforeseen consequences to systems if an account is removed without careful consideration.

NOTE: Nessus has provided the target output to assist in reviewing the benchmark to ensure target compliance.

Solution

Remediate from Azure Portal

From Azure Home select the Portal Menu

Select Microsoft Entra ID

Under Manage, select Users

Click on Add filter

Select User type

Select Guest from the Value dropdown

Click Apply

Check the box next to all Guest users that are no longer required or are inactive

Click Delete

Click OK

Remediate from Azure CLI
Before deleting the user, set it to inactive using the ID from the Audit Procedure to determine if there are any dependent systems.

az ad user update --id <[email protected]> --account-enabled {false}

After determining that there are no dependent systems delete the user.

Remove-AzureADUser -ObjectId <[email protected]>

Remediate from Azure PowerShell
Before deleting the user, set it to inactive using the ID from the Audit Procedure to determine if there are any dependent systems.

Set-AzureADUser -ObjectId '<[email protected]>' -AccountEnabled false

After determining that there are no dependent systems delete the user.

PS C:\>Remove-AzureADUser -ObjectId [email protected]

Default Value:

By default no guest users are created.

See Also

https://workbench.cisecurity.org/benchmarks/16820

Item Details

Category: ACCESS CONTROL

References: 800-53|AC-2, 800-53|AC-2(3), CSCv7|16.6, CSCv7|16.8

Plugin: microsoft_azure

Control ID: f69d5a04598a5547b0fb246c3a4e7cc068030b92142374f87819d6a19caa03c2