Information
Require administrators to provide consent for applications before use.
If Microsoft Entra ID is running as an identity provider for third-party applications, permissions and consent should be limited to administrators or pre-approved. Malicious applications may attempt to exfiltrate data or abuse privileged user accounts.
NOTE: Nessus has provided the target output to assist in reviewing the benchmark to ensure target compliance.
Solution
Remediate from Azure Portal
- From Azure Home select the Portal Menu
- Select Microsoft Entra ID
- Under Manage, select Enterprise applications
- Under Security, select Consent and permissions
- Under Manage, select User consent settings
- Set User consent for applications to Do not allow user consent
- Click Save
Impact:
Enforcing this setting may create additional requests that administrators need to review.
Item Details
Category: ACCESS CONTROL, CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION
References: 800-53|AC-1, 800-53|AC-2, 800-53|CM-7(2), 800-53|CM-8(3), 800-53|CM-10, 800-53|CM-11, 800-53|IA-4, 800-53|IA-5, CSCv7|2.6
Control ID: 1c6b9ea689882f203ebae5c7306704a87eefda64f72b96e875e10627025971b2