lacework-global-589
Set 'Users Can Consent to Apps Accessing Company Data on Their Behalf' To 'Allow for Verified Publishers' (Manual)
Profile Applicability
• Level 2
Description
Allow users to provide consent for selected permissions when a request is coming from a verified publisher.
Rationale
Unless Azure Active Directory is running as an identity provider for third-party applications, do not allow users to use their identity outside of the cloud environment. User profiles contain private information such as phone numbers and email addresses which could then be sold off to other third parties without requiring any further consent from the user.
Impact
Enforcing this setting may create additional requests that administrators need to fulfill quite often.
Audit
From Azure Portal
- From Azure Home select the Portal Menu
- Select
Azure Active Directory
- Then
Users
- Select
User settings
- Select
Manage how end users launch and view their applications
- Under the
Enterprise applications heading
, ensure thatUsers can consent to apps accessing company data on their behalf
is set toNo
Please note that at this point of time, there is no Azure CLI or other API commands available to programmatically conduct security assessment for this recommendation.
From Azure PowerShell
Connect-MsolService
Get-MsolCompanyInformation | Select-Object UsersPermissionToUserConsentToAppEnabled
Command should return UsersPermissionToUserConsentToAppEnabled
with the value of False
Remediation
From Azure Portal
- From Azure Home select the Portal Menu.
- Select Azure Active Directory.
- Select Users.
- Select User settings.
- Select Manage how end users launch and view their applications.
- Select Consent and permissions.
- Under User consent for applications, select Allow user consent for apps from verified publishers, for selected permissions.
- Select Save.
Please note that at this point in time, there is no Azure CLI or other API commands available to programmatically conduct security configuration for this recommendation.
From Azure PowerShell
Connect-MsolService
Set-MsolCompanyInformation --UsersPermissionToUserConsentToAppEnabled $False
References
https://docs.microsoft.com/en-us/azure/active-directory/manage-apps/configure-user-consent#configure-user-consent-to-applications
https://docs.microsoft.com/en-us/security/benchmark/azure/security-controls-v3-privileged-access#pa-1-protect-and-limit-highly-privileged-users
https://docs.microsoft.com/en-us/security/benchmark/azure/security-controls-v3-privileged-access#pa-2-restrict-administrative-access-to-business-critical-systems
https://docs.microsoft.com/en-us/security/benchmark/azure/security-controls-v3-governance-strategy#gs-2-define-enterprise-segmentation-strategy
https://docs.microsoft.com/en-us/security/benchmark/azure/security-controls-v3-governance-strategy#gs-6-define-identity-and-privileged-access-strategy
https://docs.microsoft.com/en-us/powershell/module/msonline/set-msolcompanysettings?view=azureadps-1.0
https://docs.microsoft.com/en-us/powershell/module/msonline/get-msolcompanyinformation?view=azureadps-1.0