lacework-global-520
Require Multi-factor Authentication for Risky Sign-ins (Manual)
Profile Applicability
• Level 1
Description
For designated users, they must use their Multi-Factor Authentication (MFA) process on login.
Rationale
Enabling multi-factor authentication is a recommended setting to limit the potential of accounts being compromised and limiting access to authenticated personnel.
Impact
There is an increased cost, as Conditional Access policies require Azure AD Premium. Similarly, they may require additional overhead to maintain if users lose access to their MFA.
Audit
From Azure Portal
- From Azure Home select the Portal Menu and select
Security
. - Select on the left side
Conditional Access
. - Select the policy you wish to audit.
- View under
Users and Groups
the corresponding users and groups to whom the policy is applied. - View under
Exclude
to determine which users and groups to whom the policy is not applied.
Remediation
From Azure Portal
- From Azure Home open the Portal Menu in top left, and select
Azure Active Directory
. - Select
Security
. - Select
Conditional Access
. - Click
+ New policy
. - Enter a name for the policy.
- Select
Users or workload identities
. - Under
Include
, selectAll users
. - Under
Exclude
, selectUsers and groups
. - Select
users this policy not should apply to
and clickSelect
. - Select
Cloud apps or actions
. - Select
All cloud apps
. - Select
Conditions
. - Select
Sign-in risk
. - Update the Configure toggle to
Yes
. - Check the
sign-in risk level this policy should apply to
, for exampleHigh
andMedium
. - Select
Done
. - Select
Grant
. - Under
Grant access
, selectRequire multi-factor authentication
and clickSelect
. - Set
Enable policy
toReport-only
. - Click
Create
.
After testing the policy in report-only mode, update the Enable policy setting from Report-only to On.
References
https://docs.microsoft.com/en-us/azure/active-directory/conditional-access/howto-conditional-access-policy-risk
https://docs.microsoft.com/en-us/azure/active-directory/conditional-access/troubleshoot-conditional-access-what-if
https://docs.microsoft.com/en-us/azure/active-directory/conditional-access/howto-conditional-access-insights-reporting
https://docs.microsoft.com/en-us/security/benchmark/azure/security-controls-v3-identity-management#im-7-restrict-resource-access-based-on--conditions
Additional Information
Test these policies by using the What If tool in the References. Setting these can create issues with logging in for users until they use an MFA device linked to their accounts. You can perform further testing via the insights and reporting resource the in References which monitors Azure sign ins.