Skip to main content

lacework-global-515

1.1.4 Ensure that 'Restore multi-factor authentication on all remembered devices' is Enabled (Manual)

Profile Applicability

• Level 1

Description

Do not allow users to remember multi-factor authentication on devices.

Rationale

Remembering Multi-Factor Authentication (MFA) for devices and browsers allows users to have the option to bypass MFA for a set number of days after performing a successful sign-in using MFA. This can enhance usability by minimizing the number of times a user may need to perform two-step verification on the same device. However, if an account or device is compromised, remembering MFA for trusted devices may affect security. Hence, it is recommended that users not be allowed to bypass MFA.

Impact

For every login attempt, the user will be required to perform multi-factor authentication.

Audit

From Azure Portal

  1. From Azure Home select the Portal Menu
  2. Select the Azure Active Directory
  3. Then Users
  4. Select All Users
  5. Click on Per-User MFA button on the top bar
  6. Select User(s) and click on Manage user settings in the right column
  7. Ensure that Restore multi-factor authentication on all remembered devices is enabled

Please note that at this point of time, there is no API/CLI mechanism available to programmatically conduct security assessment for this recommendation.

Remediation

From Azure Portal

  1. From Azure Home select the Portal Menu
  2. Select Azure Active Directory
  3. Then Users
  4. Select All Users
  5. Click on Per-User MFA button on the top bar
  6. Select User(s) and click on Manage user settings in the right column
  7. Enable Restore multi-factor authentication on all remembered devices

Please note that at this point of time, there is no Azure CLI or other API commands available to programmatically conduct security configuration for this recommendation.

References

https://docs.microsoft.com/en-us/azure/active-directory/authentication/howto-mfa-mfasettings#remember-multi-factor-authentication
https://docs.microsoft.com/en-us/security/benchmark/azure/security-controls-v3-identity-management#im-4-use-strong-authentication-controls-for-all-azure-active-directory-based-access