9.1.10 (L1) Ensure access to APIs by Service Principals is restricted

Information

Web apps registered in Microsoft Entra ID use an assigned service principal to access Power BI APIs without a signed-in user. This setting allows an app to use service principal authentication.

The recommended state is Enabled for a subset of the organization or Disabled

Leaving API access unrestricted increases the attack surface in the event an adversary gains access to a Service Principal. APIs are a feature-rich method for programmatic access to many areas of Power Bi and should be guarded closely.

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

To remediate using the UI:

- Navigate to Microsoft Fabric

https://app.powerbi.com/admin-portal

- Select Tenant settings
- Scroll to Developer settings
- Set Service principals can use Fabric APIs to one of these states:
- State 1: Disabled
- State 2: Enabled with Specific security groups selected and defined.

Important: If the organization doesn't actively use this feature it is recommended to keep it Disabled

Impact:

Disabled is the default behavior.

See Also

https://workbench.cisecurity.org/benchmarks/20006

Item Details

Category: CONFIGURATION MANAGEMENT

References: 800-53|CM-6, 800-53|CM-7

Plugin: microsoft_azure

Control ID: 7e2873ba11e70fe9f10c023c02c3dec94543c67350066f9d28aca3259c894f72