6.12 Ensure that 'User consent for applications' is set to 'Do not allow user consent'

Information

Require administrators to provide consent for applications before use.

If Microsoft Entra ID is running as an identity provider for third-party applications, permissions and consent should be limited to administrators or pre-approved. Malicious applications may attempt to exfiltrate data or abuse privileged user accounts.

NOTE: Nessus has provided the target output to assist in reviewing the benchmark to ensure target compliance.

Solution

Remediate from Azure Portal

- From Azure Home select the Portal Menu
- Select Microsoft Entra ID
- Under Manage select Enterprise applications
- Under Security select Consent and permissions
- Under Manage select User consent settings
- Set User consent for applications to Do not allow user consent
- Click Save

Impact:

Enforcing this setting may create additional requests that administrators need to review.

See Also

https://workbench.cisecurity.org/benchmarks/19304

Item Details

Category: ACCESS CONTROL, CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION

References: 800-53|AC-1, 800-53|AC-2, 800-53|CM-7(2), 800-53|CM-8(3), 800-53|CM-10, 800-53|CM-11, 800-53|IA-4, 800-53|IA-5, CSCv7|2.6

Plugin: microsoft_azure

Control ID: 799ea80e537b694e15256a092c8cc2ded2f551f086824405e41da07a0971de5b