2.1 Ensure third party integrated applications are not allowed

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

Do not allow third party integrated applications to connect to your services.

Rationale:

You should not allow third party integrated applications to connect to your services unless there is a very clear value and you have robust security controls in place. While there are legitimate uses, attackers can grant access from breached accounts to third party applications to exfiltrate data from your tenancy without having to maintain the breached account.

Impact:

Implementation of this change will impact both end users and administrators. End users will not be able to integrate third-party applications that they may wish to use. Administrators are likely to receive requests from end users to grant them permission to necessary third-party applications.

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

To prohibit third party integrated applications, use the Microsoft 365 Admin Center:

Select Admin Centers and Azure Active Directory.

Select Users from the Azure navigation pane

Select Users settings.

Set App registrations is set to No.

Click Save.

Default Value:

Yes

See Also

https://workbench.cisecurity.org/files/4073