Information
Microsoft Entra Privileged Identity Management can be used to audit roles, allow just in time activation of roles and allow for periodic role attestation. Requiring approval before activation allows one of the selected approvers to first review and then approve the activation prior to PIM granted the role. The approver doesn't have to be a group member or owner.
The recommended state is Require approval to activate for the Privileged Role Administrator role.
This role grants the ability to manage assignments for all Microsoft Entra roles including the Global Administrator role. This role does not include any other privileged abilities in Microsoft Entra ID like creating or updating users. However, users assigned to this role can grant themselves or others additional privilege by assigning additional roles.
Requiring approval for activation enhances visibility and accountability every time this highly privileged role is used. This process reduces the risk of an attacker elevating a compromised account to the highest privilege level, as any activation must first be reviewed and approved by a trusted party.
Note: This only acts as protection for eligible users that are activating a role. Directly assigning a role does require an approval workflow so therefore it is important to implement and use PIM correctly.
NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.
Solution
To remediate using the UI:
- Navigate to Microsoft Entra admin center
https://entra.microsoft.com/
.
- Click to expand Identity Governance select Privileged Identity Management
- Under Manage select Microsoft Entra Roles
- Under Manage select Roles
- Select Privileged Role Administrator in the list.
- Select Role settings and click Edit
- Check the Require approval to activate box.
- Add at least two approvers.
- Click Update
Impact:
Requiring approvers for automatic role assignment can slightly increase administrative overhead and add delays to tasks.