lacework-global-515
Enable 'Restore multi-factor authentication on all remembered devices' (Manual)
Profile Applicability
• Level 1
Description
Do not allow users to remember Multi-Factor Authentication (MFA) on devices.
Rationale
Remembering Multi-Factor Authentication (MFA) for devices and browsers allows users to have the option to bypass MFA for a set number of days after performing a successful sign-in using MFA. This can enhance usability by minimizing the number of times a user may need to perform two-step verification on the same device. However, if an account or device is compromised, remembering MFA for trusted devices may affect security. Hence, it is recommended that users not be allowed to bypass MFA.
Impact
For every login attempt, the user will be required to perform multi-factor authentication.
Audit
From Azure Portal
- From Azure Home select the Portal Menu
- Select the
Azure Active Directory
- Then
Users
- Select
All Users
- Click on
Per-User MFA
button on the top bar - Select User(s) and click on
Manage user settings
in the right column - Ensure that
Restore multi-factor authentication on all remembered devices
is enabled
Please note that at this point of time, there is no API/CLI mechanism available to programmatically conduct security assessment for this recommendation.
Remediation
From Azure Portal
- From Azure Home select the Portal Menu.
- Select
Azure Active Directory
. - Select
Users
. - Click the
Per-User MFA
button in the top bar. - Select Users and click
Manage user settings
in the right column. - Check the box next to
Restore multi-factor authentication on all remembered devices
. - Click
save
.
Please note that at this point in time, there is no Azure CLI or other API commands available to programmatically conduct security configuration for this recommendation.
References
https://docs.microsoft.com/en-us/azure/active-directory/authentication/howto-mfa-mfasettings#remember-multi-factor-authentication
https://docs.microsoft.com/en-us/security/benchmark/azure/security-controls-v3-identity-management#im-4-use-strong-authentication-controls-for-all-azure-active-directory-based-access