6.4 Ensure that 'Restrict non-admin users from creating tenants' is set to 'Yes'

Information

Require administrators or appropriately delegated users to create new tenants.

It is recommended to only allow an administrator to create new tenants. This prevent users from creating new Microsoft Entra ID or Azure AD B2C tenants and ensures that only authorized users are able to do so.

Solution

Remediate from Azure Portal

- From Azure Home select the Portal Menu
- Select Microsoft Entra ID
- Under Manage select Users
- Under Manage select User settings
- Set Restrict non-admin users from creating tenants to Yes
- Click Save

Remediate from PowerShell

Import-Module Microsoft.Graph.Identity.SignIns

Connect-MgGraph -Scopes 'Policy.ReadWrite.Authorization'

Select-MgProfile -Name beta

$params = @{
DefaultUserRolePermissions = @{
AllowedToCreateTenants = $false
}
}

Update-MgPolicyAuthorizationPolicy -AuthorizationPolicyId -BodyParameter $params

Impact:

Enforcing this setting will ensure that only authorized users are able to create new tenants.

See Also

https://workbench.cisecurity.org/benchmarks/19304

Item Details

Category: ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

References: 800-53|AC-2, 800-53|AC-3, 800-53|AC-6, 800-53|AC-6(1), 800-53|AC-6(7), 800-53|AU-9(4), CSCv7|14.6

Plugin: microsoft_azure

Control ID: 4a6444b67ec4a3c8674e4c7c0b0fed7a86fe2488308edc2c7a493b54c2c202f2