Skip to main content
Version: 2.1.1-preview

CISA.MS.AAD.3.6 - Phishing-resistant MFA SHALL be required for highly privileged roles.

Overview​

Phishing-resistant MFA SHALL be required for highly privileged roles.

Rationale: This is a backup security policy to help protect privileged access to the tenant if the conditional access policy, which requires MFA for all users, is disabled or misconfigured.

Remediation action:​

Create a conditional access policy enforcing phishing-resistant MFA for highly privileged roles. Configure the following policy settings in the new conditional access policy, per the values below:

  1. In Entra under Protection and Conditional Access, select Policies.
  2. Click on New policy
  3. Under New Conditional Access policy, configure the following policy settings in the new conditional access policy, per the values below:
    • Users > Include > Select users and groups > Directory roles > select each of the roles listed in the Highly Privileged Roles listed.
    • Target resources > Cloud apps > All cloud apps
    • Access controls > Grant > Grant Access > Require authentication strength > Phishing-resistant MFA
  4. Click Save.

Test Metadata​

FieldValue
Test IDCISA.MS.AAD.3.6
SeverityHigh
SuiteCISA
CategoryEntra ID P1
PowerShell testTest-MtCisaPrivilegedPhishResistant
TagsCISA, CISA.MS.AAD.3.6, Entra ID P1, MS.AAD, MS.AAD.3.6

Source​

  • Pester test: tests/cisa/entra/Test-MtCisaPrivilegedPhishResistant.Tests.ps1
  • PowerShell source: powershell/public/cisa/entra/Test-MtCisaPrivilegedPhishResistant.ps1