Monitor identity and access
The security perimeter has evolved from a network perimeter to an identity perimeter. With this development, security is less about defending your network, and more about managing the security of your apps, data, and users.
By monitoring the activities and configuration settings related to identity, you can take proactive actions before an incident takes place, or reactive actions to stop attempted attacks.
What identity and access safeguards does Security Center provide?
Azure Security Center has two dedicated security controls for ensuring you're meeting your organization's identity and security requirements:
Manage access and permissions - We encourage you to adopt the least privilege access model and ensure you grant your users only the access necessary for them to do their jobs. This control also includes recommendations for implementing role-based access control (RBAC) to control access to your resources.
Enable MFA - With MFA enabled, your accounts are more secure, and users can still authenticate to almost any application with single sign-on.
Example recommendations for identity and access
Examples of recommendations you might see in these two controls on Security Center's Recommendations page:
- MFA should be enabled on accounts with owner permissions on your subscription
- A maximum of 3 owners should be designated for your subscription
- External accounts with read permissions should be removed from your subscription
- Deprecated accounts should be removed from your subscription (Deprecated accounts are accounts that are no longer needed, and blocked from signing in by Azure Active Directory)
For more information about these recommendations and the others you might see in these controls, see Identity and Access recommendations.
There are some limitations to Security Center's identity and access protections:
- Identity recommendations aren't available for subscriptions with more than 600 accounts. In such cases, these recommendations will be listed under "unavailable assessments".
- Identity recommendations aren't available for Cloud Solution Provider (CSP) partner's admin agents.
- Identity recommendations don’t identify accounts that are managed with a privileged identity management (PIM) system. If you're using a PIM tool, you may see inaccurate results in the Manage access and permissions control.
Multi-factor authentication (MFA) and Azure Active Directory
Enabling MFA requires Azure Active Directory (AD) tenant permissions.
- If you have a premium edition of AD, enable MFA using Conditional Access.
- If you're using AD free edition, enable security defaults as described in Azure Active Directory documentation.
Identify accounts without multi-factor authentication (MFA) enabled
To see which accounts don't have MFA enabled, use the following Azure Resource Graph query. The query returns all unhealthy resources - accounts - of the recommendation "MFA should be enabled on accounts with owner permissions on your subscription".
Open Azure Resource Graph Explorer.
Enter the following query and select Run query.
securityresources | where type == "microsoft.security/assessments" | where properties.displayName == "MFA should be enabled on accounts with owner permissions on your subscription" | where properties.status.code == "Unhealthy"
additionalDataproperty reveals the list of account object IDs for accounts that don't have MFA enforced.
The accounts are shown as object IDs rather than account names to protect the privacy of the account holders.
Alternatively, you can use Security Center's REST API method Assessments - Get.
To learn more about recommendations that apply to other Azure resource types, see the following article: