Information
Require administrators to provide consent for applications before use.
If Microsoft Entra ID is running as an identity provider for third-party applications, permissions and consent should be limited to administrators or pre-approved. Malicious applications may attempt to exfiltrate data or abuse privileged user accounts.
NOTE: Nessus has provided the target output to assist in reviewing the benchmark to ensure target compliance.
Solution
Remediate from Azure Portal
- From Azure Home select the Portal Menu
- Select Microsoft Entra ID
- Under Manage select Enterprise applications
- Under Security select Consent and permissions
- Under Manage select User consent settings
- Set User consent for applications to Do not allow user consent
- Click Save
Impact:
Enforcing this setting may create additional requests that administrators need to review.
Item Details
Category: ACCESS CONTROL, CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION
References: 800-53|AC-1, 800-53|AC-2, 800-53|CM-7(2), 800-53|CM-8(3), 800-53|CM-10, 800-53|CM-11, 800-53|IA-4, 800-53|IA-5, CSCv7|2.6
Control ID: 799ea80e537b694e15256a092c8cc2ded2f551f086824405e41da07a0971de5b