CISA BOD 25-01 Compliance: What U.S. Government Agencies Need to Know

U.S. government agencies are required to bring their Microsoft 365 cloud services into compliance with a recent Binding Operational Directive. Here’s how Tenable can help.
Overview
Malicious threat actors are constantly targeting cloud environments. The risk of compromise can be reduced by enforcing secure configurations of security controls. With this goal in mind, the Cybersecurity and Infrastructure Security Agency (CISA) created the Secure Cloud Business Applications (SCuBA) project. The SCuBA project currently provides secure configuration baselines for Microsoft 365 and Google Workspace.
In December 2024, as part of the SCuBA project, CISA released a Binding Operational Directive (BOD) 25-01: Implementation Guidance for Implementing Secure Practices for Cloud Services. This directive requires U.S. government agencies and departments in the federal civilian executive branch to implement secure configuration baselines for certain software as a service (SaaS) products.
Scope
The scope of the BOD 25-01 includes all production or operational cloud tenants (operating in or as a federal information system) utilizing Microsoft 365. CISA may release additional SCuBA Secure Configuration Baselines for other cloud products which would fall under the scope of this directive. The complete list of required configurations is available here.
While the CISA BOD 25-01 applies to government agencies, any organization using Microsoft 365 would reduce the risk of compromise by adhering to these baselines.
Required actions
According to BOD 25-01, there are several required actions for in-scope cloud tenant agencies that shall be completed by the following dates:
- February 21, 2025 - following CISA reporting instructions:
- submit tenant name and system owning agency/component for each tenant
- submit an updated the inventory annually in the first quarter
- April 25, 2025 - deploy SCuBA assessment tools and begin continuous reporting
- June 20, 2025 - implement all mandatory SCuBA policies identified at BOD 25-01 Required Configurations.
In-scope cloud tenants are also required to:
- Implement all future updates to mandatory SCuBA policies
- Implement all mandatory SCuBA Secure Configuration Baselines and begin continuous monitoring prior to granting an Authorization to Operate for new cloud tenants.
Required configurations
As of March 2025, the following configurations are required for BOD 25-01:
Microsoft 365 (M365)
Microsoft Entra ID
MS.AAD.1.1v1 | Legacy authentication SHALL be blocked. |
MS.AAD.2.1v1 | Users detected as high risk SHALL be blocked. |
MS.AAD.2.3v1 | Sign-ins detected as high risk SHALL be blocked. |
MS.AAD.3.1v1 | Phishing-resistant MFA SHALL be enforced for all users. |
MS.AAD.3.2v1 | If Phishing-resistant MFA has not been enforced yet, then an alternative MFA method SHALL be enforced for all users. |
MS.AAD.3.3v1 | If Phishing-resistant MFA has not been enforced yet and Microsoft Authenticator is enabled, it SHALL be configured to show login context information. |
MS.AAD.3.4v1 | The Authentication Methods Manage Migration feature SHALL be set to Migration Complete. |
MS.AAD.3.6v1 | Phishing-resistant MFA SHALL be required for Highly Privileged Roles. |
MS.AAD.5.1v1 | Only administrators SHALL be allowed to register applications. |
MS.AAD.5.2v1 | Only administrators SHALL be allowed to consent to applications. |
MS.AAD.5.3v1 | An admin consent workflow SHALL be configured for applications. |
MS.AAD.5.4v1 | Group owners SHALL NOT be allowed to consent to applications. |
MS.AAD.6.1v1 | User passwords SHALL NOT expire. |
MS.AAD.7.1v1 | A minimum of two users and a maximum of eight users SHALL be provisioned with the Global Administrator role. |
MS.AAD.7.2v1 | Privileged users SHALL be provisioned with finer-grained roles instead [of] Global Administrator. |
MS.AAD.7.3v1 | Privileged users SHALL be provisioned cloud-only accounts that are separate from an on-premises directory or other federated identity providers. |
MS.AAD.7.4v1 | Permanent active role assignments SHALL NOT be allowed for highly privileged roles except for emergency and service accounts. |
MS.AAD.7.5v1 | Provisioning users to highly privileged roles SHALL NOT occur outside of a PAM system, because this bypasses critical controls the PAM system provides. |
MS.AAD.7.6v1 | Activation of the Global Administrator role SHALL require approval. |
MS.AAD.7.7v1 | Eligible and Active highly privileged role assignments SHALL trigger an alert. |
MS.AAD.7.8v1 | User activation of the Global Administrator role SHALL trigger an alert. |
Microsoft Defender
MS.DEFENDER.1.1v1 | The standard and strict preset security policies SHALL be enabled. |
MS.DEFENDER.1.2v1 | All users SHALL be added to Exchange Online Protection in either the standard or strict preset security policy. |
MS.DEFENDER.1.3v1 | All users SHALL be added to Defender for Office 365 Protection in either the standard or strict preset security policy. |
MS.DEFENDER.1.4v1 | Sensitive accounts SHALL be added to Exchange Online Protection in the strict preset security policy. |
MS.DEFENDER.1.5v1 | Sensitive accounts SHALL be added to Defender for Office 365 Protection in the strict preset security policy. |
MS.DEFENDER.4.1v2 | A custom policy SHALL be configured to protect PII and sensitive information, as defined by the agency, blocking at a minimum: credit card numbers, U.S. Individual Taxpayer Identification Numbers (ITINs), and U.S. Social Security numbers (SSNs). |
MS.DEFENDER.5.1v1 | At a minimum, the alerts required by the CISA M365 Secure Configuration Baseline for Exchange Online SHALL be enabled. |
MS.DEFENDER.6.1v1 | Microsoft Purview Audit (Standard) logging SHALL be enabled. |
MS.DEFENDER.6.2v1 | Microsoft Purview Audit (Premium) logging SHALL be enabled for ALL users. |
Exchange Online
MS.EXO.1.1v1 | Automatic forwarding to external domains SHALL be disabled. |
MS.EXO.2.2v2 | An SPF policy SHALL be published for each domain that fails all non-approved senders. |
MS.EXO.4.1v1 | A DMARC policy SHALL be published for every second-level domain. |
MS.EXO.4.2v1 | The DMARC message rejection option SHALL be p=reject. |
MS.EXO.4.3v1 | The DMARC point of contact for aggregate reports SHALL include [email protected]. |
MS.EXO.5.1v1 | SMTP AUTH SHALL be disabled. |
MS.EXO.6.1v1 | Contact folders SHALL NOT be shared with all domains. |
MS.EXO.6.2v1 | Calendar details SHALL NOT be shared with all domains. |
MS.EXO.7.1v1 | External sender warnings SHALL be implemented. |
MS.EXO.13.1v1 | Mailbox auditing SHALL be enabled. |
Power Platform
MS.POWERPLATFORM.1.1v1 | The ability to create production and sandbox environments SHALL be restricted to admins. |
MS.POWERPLATFORM.1.2v1 | The ability to create trial environments SHALL be restricted to admins. |
MS.POWERPLATFORM.2.1v1 | A DLP policy SHALL be created to restrict connector access in the default Power Platform environment. |
MS.POWERPLATFORM.3.1v1 | Power Platform tenant isolation SHALL be enabled. |
SharePoint Online and OneDrive
MS.SHAREPOINT.1.1v1 | External sharing for SharePoint SHALL be limited to Existing Guests or Only People in your Organization. |
MS.SHAREPOINT.1.2v1 | External sharing for OneDrive SHALL be limited to Existing Guests or Only People in your Organization. |
MS.SHAREPOINT.2.1v1 | File and folder default sharing scope SHALL be set to Specific People (only the people the user specifies). |
MS.SHAREPOINT.2.2v1 | File and folder default sharing permissions SHALL be set to View only. |
Microsoft Teams
MS.TEAMS.1.2v1 | Anonymous users SHALL NOT be enabled to start meetings. |
MS.TEAMS.2.1v1 | External access for users SHALL only be enabled on a per-domain basis. |
MS.TEAMS.2.2v1 | Unmanaged users SHALL NOT be enabled to initiate contact with internal users. |
MS.TEAMS.3.1v1 | Contact with Skype users SHALL be blocked. |
MS.TEAMS.4.1v1 | Teams email integration SHALL be disabled. |
Additional configurations
In addition to the required configurations, the following configurations can also be evaluated:
Microsoft 365 (M365)
Microsoft Entra ID
MS.AAD.2.2v1 | A notification SHOULD be sent to the administrator when high-risk users are detected. |
MS.AAD.3.7v1 | Managed devices SHOULD be required for authentication. |
MS.AAD.3.8v1 | Managed Devices SHOULD be required to register MFA. |
MS.AAD.7.9v1 | User activation of other highly privileged roles SHOULD trigger an alert. |
MS.AAD.8.1v1 | Guest users SHOULD have limited or restricted access to Microsoft Entra ID directory objects. |
MS.AAD.8.2v1 | Only users with the Guest Inviter role SHOULD be able to invite guest users. |
Microsoft Defender
MS.DEFENDER.2.1v1 | User impersonation protection SHOULD be enabled for sensitive accounts in both the standard and strict preset policies. |
MS.DEFENDER.2.2v1 | Domain impersonation protection SHOULD be enabled for domains owned by the agency in both the standard and strict preset policies. |
MS.DEFENDER.2.3v1 | Domain impersonation protection SHOULD be added for important partners in both the standard and strict preset policies. |
MS.DEFENDER.3.1v1 | Safe attachments SHOULD be enabled for SharePoint, OneDrive, and Microsoft Teams. |
MS.DEFENDER.4.2v1 | The custom policy SHOULD be applied to Exchange, OneDrive, SharePoint, Teams chat, and Devices. |
MS.DEFENDER.4.3v1 | The action for the custom policy SHOULD be set to block sharing sensitive information with everyone. |
MS.DEFENDER.4.4v1 | Notifications to inform users and help educate them on the proper use of sensitive information SHOULD be enabled in the custom policy. |
Exchange Online
MS.EXO.3.1v1 | DKIM SHOULD be enabled for all domains. |
MS.EXO.4.4v1 | An agency point of contact SHOULD be included for aggregate and failure reports. |
MS.EXO.12.1v1 | IP allow lists SHOULD NOT be created. |
MS.EXO.12.2v1 | Safe lists SHOULD NOT be enabled. |
Power Platform
MS.POWERPLATFORM.2.2v1 | Non-default environments SHOULD have at least one DLP policy affecting them. |
MS.POWERPLATFORM.5.1v1 | The ability to create Power Pages sites SHOULD be restricted to admins. |
SharePoint Online and OneDrive
MS.SHAREPOINT.1.3v1 | External sharing SHALL be restricted to approved external domains and/or users in approved security groups per interagency collaboration needs. |
MS.SHAREPOINT.3.1v1 | Expiration days for Anyone links SHALL be set to 30 days or less. |
MS.SHAREPOINT.3.2v1 | The allowable file and folder permissions for links SHALL be set to View only. |
MS.SHAREPOINT.3.3v1 | Reauthentication days for people who use a verification code SHALL be set to 30 days or less. |
Microsoft Teams
MS.TEAMS.1.1v1 | External meeting participants SHOULD NOT be enabled to request control of shared desktops or windows. |
MS.TEAMS.1.3v1 | Anonymous users and dial-in callers SHOULD NOT be admitted automatically. |
MS.TEAMS.1.4v1 | Internal users SHOULD be admitted automatically. |
MS.TEAMS.1.5v1 | Dial-in users SHOULD NOT be enabled to bypass the lobby. |
MS.TEAMS.1.6v1 | Meeting recording SHOULD be disabled. |
MS.TEAMS.1.7v1 | Record an event SHOULD be set to Organizer can record. |
MS.TEAMS.2.3v1 | Internal users SHOULD NOT be enabled to initiate contact with unmanaged users. |
MS.TEAMS.5.1v1 | Agencies SHOULD only allow installation of Microsoft apps approved by the agency. |
MS.TEAMS.5.2v1 | Agencies SHOULD only allow installation of third-party apps approved by the agency. |
MS.TEAMS.5.3v1 | Agencies SHOULD only allow installation of custom apps approved by the agency. |
How Tenable can help
Tenable Vulnerability Management and Nessus customers can audit the posture of their Microsoft 365 environment with the CISA SCuBA for Microsoft 365 audit files:
- CISA SCuBA Microsoft 365 Entra ID
- CISA SCuBA Microsoft 365 Defender
- CISA SCuBA Microsoft 365 Exchange Online
- CISA SCuBA Microsoft 365 Power Platform
- CISA SCuBA Microsoft 365 SharePoint Online OneDrive
- CISA SCuBA Microsoft 365 Teams
More details for configuring your SCuBA Microsoft 365 environment for Compliance Auditing are available at Configure Azure for a Compliance Audit.
- Risk-based Vulnerability Management
- Vulnerability Management
- Government