5.2.3.5 (L1) Ensure weak authentication methods are disabled

Information

Authentication methods support a wide variety of scenarios for signing in to Microsoft 365 resources. Some of these methods are inherently more secure than others but require more investment in time to get users enrolled and operational.

SMS and Voice Call rely on telephony carrier communication methods to deliver the authenticating factor.

The recommended state is to Disable these methods:

- SMS
- Voice Call

Traditional MFA methods such as SMS codes, email-based OTPs, and push notifications are becoming less effective against today's attackers. Sophisticated phishing campaigns have demonstrated that second factors can be intercepted or spoofed. Attackers now exploit social engineering, man-in-the-middle tactics, and user fatigue (e.g., MFA bombing) to bypass these mechanisms. These risks are amplified in distributed, cloud-first organizations with hybrid workforces and varied device ecosystems.

The SMS and Voice call methods are vulnerable to SIM swapping which could allow an attacker to gain access to your Microsoft 365 account.

Solution

To remediate using the UI:

- Navigate to Microsoft Entra admin center https://entra.microsoft.com/.
- Click to expand Entra ID > Authentication methods.
- Select Policies.
- Inspect each method that is out of compliance and remediate:
- Click on the method to open it.
- Change the Enable toggle to the off position.
- Click Save.

Note: If the save button remains greyed out after toggling a method off, then first turn it back on and then change the position of the Target selection (all users or select groups). Turn the method off again and save. This was observed to be a bug in the UI at the time this document was published.

To remediate using Powershell:

- Connect to Graph using Connect-MgGraph -Scopes "Policy.ReadWrite.AuthenticationMethod"
- Run the following to disable all three authentication methods:

$params = @(
@{ Id = "Sms"; State = "disabled" },
@{ Id = "Voice"; State = "disabled" }
)

Update-MgPolicyAuthenticationMethodPolicy -AuthenticationMethodConfigurations $params

Impact:

There may be increased administrative overhead in adopting more secure authentication methods depending on the maturity of the organization.

See Also

https://workbench.cisecurity.org/benchmarks/24619

Item Details

Category: IDENTIFICATION AND AUTHENTICATION

References: 800-53|IA-2(1), 800-53|IA-2(2)

Plugin: microsoft_azure

Control ID: b0ca2ca04f6c8cbb21f1016c08bf0d079f91abdeef8895bc58055f1e8cf7a116