InformationAllow users to provide consent for selected permissions when a request is coming from a verified publisher.
Unless Azure Active Directory is running as an identity provider for third-party applications, do not allow users to use their identity outside of the cloud environment. User profiles contain private information such as phone numbers and email addresses which could then be sold off to other third parties without requiring any further consent from the user.
Enforcing this setting may create additional requests that administrators need to fulfill quite often.
NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.
SolutionFrom Azure Portal
From Azure Home select the Portal Menu
Select Azure Active Directory
Select User settings
Then Manage how end users launch and view their applications
Under the Enterprise applications heading, set Users can consent to apps accessing company data on their behalf to No
Please note that at this point of time, there is no Azure CLI or other API commands available to programmatically conduct security configuration for this recommendation.
Set-MsolCompanyInformation --UsersPermissionToUserConsentToAppEnabled $False
By default, Users can consent to apps accessing company data on their behalf is set to Yes.
Category: ACCESS CONTROL, CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION
References: 800-53|AC-1, 800-53|AC-2, 800-53|AC-2(1), 800-53|AC-3, 800-53|CM-7(2), 800-53|CM-7(5), 800-53|CM-8(3), 800-53|CM-10, 800-53|CM-11, 800-53|IA-4, 800-53|IA-5, CSCv7|2.6, CSCv7|2.7
Control ID: 51d353eabf7bbdb95cb791854ec82e26969269526e42dba0f3a71cf7227360b6