Skip to main content
Version: 2.1.0

CISA.MS.AAD.7.6 - Activation of the Global Administrator role SHALL require approval.

Overview

Activation of the Global Administrator role SHALL require approval.

Rationale: Requiring approval for a user to activate Global Administrator, which provides unfettered access, makes it more challenging for an attacker to compromise the tenant with stolen credentials and it provides visibility of activities indicating a compromise is taking place.

Remediation action:

  1. In Entra admin center select Identity governance and Privileged Identity Management.
  2. Under Manage, select Microsoft Entra roles.
  3. Under Manage, select Roles.
  4. Select the Global Administrator role in the list.
  5. Click Settings.
  6. Click Edit.
  7. Select the Require approval to activate option.
  8. Click Update.
  9. Review the list of groups that are actively assigned to the Global Administrator role. If any of the groups are enrolled in PIM for Groups, then also apply the same configurations under step 2 above to each PIM group's Member settings.

Test Metadata

FieldValue
Test IDCISA.MS.AAD.7.6
SeverityHigh
SuiteCISA
CategoryEntra ID P2
PowerShell testTest-MtCisaRequireActivationApproval
TagsCISA, CISA.MS.AAD.7.6, Entra ID P2, MS.AAD, MS.AAD.7.6

Source

  • Pester test: tests/cisa/entra/Test-MtCisaRequireActivationApproval.Tests.ps1
  • PowerShell source: powershell/public/cisa/entra/Test-MtCisaRequireActivationApproval.ps1