last sync: 2024-Nov-25 18:54:24 UTC

Microsoft Managed Control 1059 - Remote Access | Regulatory Compliance - Access Control

Azure BuiltIn Policy definition

Source Azure Portal
Display name Microsoft Managed Control 1059 - Remote Access
Id a29b5d9f-4953-4afe-b560-203a6410b6b4
Version 1.0.0
Details on versioning
Versioning Versions supported for Versioning: 0
Built-in Versioning [Preview]
Category Regulatory Compliance
Microsoft Learn
Description Microsoft implements this Access Control control
Additional metadata Name/Id: ACF1059 / Microsoft Managed Control 1059
Category: Access Control
Title: Remote Access - Usage, Requirements, And Implementation Guidance
Ownership: Customer, Microsoft
Description: The organization: Establishes and documents usage restrictions, configuration/connection requirements, and implementation guidance for each type of remote access allowed; and
Requirements: There are several authentication steps to be able to access Azure resources remotely. Authorized Microsoft personnel utilize Microsoft-issued Secure Admin Workstations (SAWs) and connect remotely to Azure from the Corporate Network (CorpNet). Microsoft internal user connections originate in CorpNet passing via the CorpNet Firewall through Azure-managed load balancers. Users are identified by a unique AD identifier and password on CorpNet via multifactor authentication. If a user is not at a physical Microsoft location, remote access to CorpNet also requires corporate MSFTVPN connectivity using Microsoft-issued smart card certificates and PIN-based authentication. Once authenticated through CorpNet, Microsoft personnel access the Azure environment in one of two ways – via the VPN or via the Jumpbox, Debug Server, and Network Hop Box infrastructure. This VPN provides direct access via RDP and SSH to the assets. Alternatively, personnel can log into Jumpboxes and Debug servers for server access and Network Hop Boxes for network device access. Once through the VPN, Jumpbox, Debug server, or Network Hop Box, the user can access Azure assets. Jumpboxes and Debug Servers Jumpboxes are servers in Azure datacenters that provide remote access paths into the Azure production environment. Azure users log into these Jumpboxes to perform routine maintenance, emergency repairs, diagnosis, and administration of Azure production environment. Access to the Jumpboxes via RDP is restricted to CorpNet and requires multifactor authentication using the user's AD credential and a smart card. Access to Jumpboxes is restricted to designated OneIdentity security groups. Similar to Jumpboxes, Debug servers are non-domain-joined servers located entirely within the Azure production environment. users connect to Debug servers via RDP using specific, CorpNet-exposed endpoints before accessing Azure assets. Access to Debug servers is similarly restricted to designated OneIdentity security groups. Network Hop Boxes Network Hop Boxes are the network device equivalent of the server Jumpboxes for Azure network devices. VPN The following methods are utilized via SSL VPN to access Azure production assets: * Public Key Infrastructure (PKI) to enable secure communication between the certificate server to the target asset by utilizing CRL Validation * Leveraging Azure Active Directory (AAD) through utilization of multifactor authentication via smart card from the identity server to the target asset
Mode Indexed
Type Static
Preview False
Deprecated False
Effect Fixed
audit
RBAC role(s) none
Rule aliases none
Rule resource types IF (2)
Microsoft.Resources/subscriptions
Microsoft.Resources/subscriptions/resourceGroups
Compliance Not a Compliance control
Initiatives usage none
History none
JSON compare n/a
JSON
api-version=2021-06-01
EPAC