-
Notifications
You must be signed in to change notification settings - Fork 1.6k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
feat(microsoft365): add new check entra_admin_users_sign_in_frequency_enabled
#7020
base: master
Are you sure you want to change the base?
Conversation
…d-existing-checks-not-to-add-resource-id-and-name' of https://github.com/prowler-cloud/prowler into PRWLR-6016-ensure-sign-in-frequency-is-enabled-and-browser-sessions-are-not-persistent-for-administrative-users
Codecov ReportAttention: Patch coverage is
Additional details and impacted files@@ Coverage Diff @@
## master #7020 +/- ##
==========================================
- Coverage 88.70% 88.68% -0.02%
==========================================
Files 1200 1201 +1
Lines 34832 34915 +83
==========================================
+ Hits 30897 30966 +69
- Misses 3935 3949 +14
Flags with carried forward coverage won't be shown. Click here to find out more.
|
…bled-and-browser-sessions-are-not-persistent-for-administrative-users
|
||
report = CheckReportMicrosoft365( | ||
metadata=self.metadata(), | ||
resource=entra_client.conditional_access_policies, |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
resource=entra_client.conditional_access_policies, | |
resource={}, |
We cannot pass a dict as a resource.
): | ||
report = CheckReportMicrosoft365( | ||
metadata=self.metadata(), | ||
resource=entra_client.conditional_access_policies, |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
resource=entra_client.conditional_access_policies, | |
resource=policy, |
Same here, we cannot pass the entire dictionary as a resource.
"ResourceIdTemplate": "", | ||
"Severity": "high", | ||
"ResourceType": "", | ||
"Description": "Ensure Sign-in frequency periodic reauthentication does not exceed 4 hours for E3 tenants, or 24 hours for E5 tenants using Privileged Identity Management.", |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
We are not checking the period of the sign-in frequency, only if it is enabled. Check if it is necessary to check the period, please.
Context
In
Microsoft Entra ID
, authentication sessions for administrative users must be carefully managed to reduce security risks. Persistent browser sessions and long reauthentication intervals can increase the risk of unauthorized access, especially if an administrator's session remains active on a compromised or shared device.Conditional Access policies
allow organizations to enforce stricter authentication requirements for high-privileged users, ensuring security best practices are followed.Description
This check ensures that Sign-in frequency is enabled and that browser sessions are not persistent for administrative users in
Microsoft Entra ID
. Organizations should enforce periodic reauthentication to no more than4 hours
for tenants.Additionally, the Persistent browser session setting should be configured to
Never persistent
to prevent session cookies from being stored, reducing the risk of session hijacking. Implementing these policies helps minimize attack surfaces by requiring administrators to authenticate frequently and preventing session persistence across browsing sessions.Checklist
API
License
By submitting this pull request, I confirm that my contribution is made under the terms of the Apache 2.0 license.