5.3.4 (L1) Ensure approval is required for Global Administrator role activation

Information

Microsoft Entra Privileged Identity Management can be used to audit roles, allow just in time activation of roles and allow for periodic role attestation. Requiring approval before activation allows one of the selected approvers to first review and then approve the activation prior to PIM granted the role. The approver doesn't have to be a group member or owner.

The recommended state is Require approval to activate for the Global Administrator role.

Requiring approval for Global Administrator role activation enhances visibility and accountability every time this highly privileged role is used. This process reduces the risk of an attacker elevating a compromised account to the highest privilege level, as any activation must first be reviewed and approved by a trusted party.

Note: This only acts as protection for eligible users that are activating a role. Directly assigning a role does require an approval workflow so therefore it is important to implement and use PIM correctly.

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

To remediate using the UI:

- Navigate to Microsoft Entra admin center

https://entra.microsoft.com/

.
- Click to expand Identity Governance select Privileged Identity Management
- Under Manage select Microsoft Entra Roles
- Under Manage select Roles
- Select Global Administrator in the list.
- Select Role settings and click Edit
- Check the Require approval to activate box.
- Add at least two approvers.
- Click Update

Impact:

Approvers do not need to be assigned the same role or be members of the same group. It's important to have at least two approvers and an emergency access (break-glass) account to prevent a scenario where no Global Administrators are available. For example, if the last active Global Administrator leaves the organization, and only eligible but inactive Global Administrators remain, a trusted approver without the Global Administrator role or an emergency access account would be essential to avoid delays in critical administrative tasks.

See Also

https://workbench.cisecurity.org/benchmarks/17682

Item Details

Category: ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

References: 800-53|AC-1, 800-53|AC-2, 800-53|AC-2(1), 800-53|IA-4, 800-53|IA-5, CSCv7|4.1

Plugin: microsoft_azure

Control ID: 6bacf3c7fe9dd05b22ddb90770ce020c5ffb6f20ac3de4e8ce5deb6f875200ac