last sync: 2024-Sep-19 17:51:32 UTC

Microsoft Managed Control 1342 - Authenticator Management | Hardware Token-Based Authentication | Regulatory Compliance - Identification and Authentication

Azure BuiltIn Policy definition

Source Azure Portal
Display name Microsoft Managed Control 1342 - Authenticator Management | Hardware Token-Based Authentication
Id 283a4e29-69d5-4c94-b99e-29acf003c899
Version 1.0.0
Details on versioning
Versioning Versions supported for Versioning: 0
Built-in Versioning [Preview]
Category Regulatory Compliance
Microsoft Learn
Description Microsoft implements this Identification and Authentication control
Additional metadata Name/Id: ACF1342 / Microsoft Managed Control 1342
Category: Identification and Authentication
Title: Authenticator Management | Hardware Token-Based Authentication
Ownership: Customer, Microsoft
Description: The information system, for hardware token-based authentication, employs mechanisms that satisfy eAuth Level 4 and FIPS 140-2 requirements.
Requirements: Azure uses multifactor authentication for network access by Azure personnel using eAuth Level 4 and FIPS 140-2 compliant Thales smart cards. Microsoft’s corporate PKI has been established to provide a variety of digital certificate services to support operations for Azure and for the Microsoft corporation. The Microsoft corporate PKI functions as the Certificate Authority (CA) and Registration Authority (RA) and provides directory services to manage keys and certificates. The certificates are signed by an internal Microsoft CA and are validated against that CA's public key. Azure also checks certificates against certificate revocation lists. The Azure PKI Certificate Practice Statement (CPS) document governs PKI operations and sets forth the business, legal, and technical practices for approving, issuing, managing, using, revoking, and renewing digital certificates. PKI certificates are stored within smart cards and authorized access to the corresponding private keys are enforced. Access to certs is restricted via PIN requirements to gain access to the certificate stored on the card. The Azure PKI intermediate CA servers are members of only internally rooted PKI chains, permitting the issuance of certificates to users and computers within the Azure AD environments. Azure validates the certificates by constructing a certification path with status information to an accepted trust anchor.
Mode Indexed
Type Static
Preview False
Deprecated False
Effect Fixed
audit
RBAC role(s) none
Rule aliases none
Rule resource types IF (2)
Microsoft.Resources/subscriptions
Microsoft.Resources/subscriptions/resourceGroups
Compliance Not a Compliance control
Initiatives usage none
History none
JSON compare n/a
JSON
api-version=2021-06-01
EPAC