9.1.11 (L1) Ensure Service Principals cannot create and use profiles

Information

Service principal profiles provide a flexible solution for apps used in a multitenancy deployment. The profiles enable customer data isolation and tighter security boundaries between customers that are utilizing the app.

The recommended state is Enabled for a subset of the organization or Disabled

Service Principals should be restricted to a security group to limit which Service Principals can interact with profiles. This supports the principle of least privilege.

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

To remediate using the UI:

- Navigate to Microsoft Fabric

https://app.powerbi.com/admin-portal

- Select Tenant settings
- Scroll to Developer settings
- Set Allow service principals to create and use profiles to one of these states:
- State 1: Disabled
- State 2: Enabled with Specific security groups selected and defined.

Important: If the organization doesn't actively use this feature it is recommended to keep it Disabled

Impact:

Disabled is the default behavior.

See Also

https://workbench.cisecurity.org/benchmarks/20006

Item Details

Category: CONFIGURATION MANAGEMENT

References: 800-53|CM-6, 800-53|CM-7

Plugin: microsoft_azure

Control ID: b7361009f18ef11098c8f20dcc52bc278a00c82f146f6f9eeca493b3b93484bd