Skip to content

Commit 01d745a

Browse files
authored
Enhance clarity on secure configuration responsibilities
Clarified responsibilities for customers regarding secure configurations and emphasized the importance of appropriate settings for security implications. Added context about Microsoft's recommended secure defaults for admin accounts.
1 parent ad2ae41 commit 01d745a

1 file changed

Lines changed: 9 additions & 7 deletions

File tree

articles/azure-government/compliance/recommended-secure-configuration.md

Lines changed: 9 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.date: 02/06/2026
1212

1313
FedRAMP Rev 5 has mandated the following Secure Configuration Guide requirements for all Cloud Service Providers at [Secure Configuration Guide](https://www.fedramp.gov/docs/rev5/balance/secure-configuration-guide/).
1414

15-
Azure provides the instructions and guidelines for the customers to meet these requirements.
15+
Azure provides the instructions and guidelines for the customers to meet these requirements. Customers are responsible for ensuring that their services are configured appropriately to meet these requirements.
1616

1717
## Recommended secure configuration
1818

@@ -60,7 +60,7 @@ Microsoft Learn documents the built‑in administrative roles that are authorize
6060

6161
These roles have the ability to alter authentication requirements, disable protections, and grant or revoke privileged access, making their governance critical.
6262

63-
Azure provides guidance to protect administrator sign-in, enforce MFA, conditional access, and protected admin workstations which detail how to securely access top-level administrative accounts in Azure. For more information, see [Privileged roles and permissions](/entra/identity/role-based-access-control/privileged-roles-permissions).
63+
Azure provides guidance to help customers protect administrator sign-in, enforce MFA, conditional access, and protected admin workstations which detail how to securely access top-level administrative accounts in Azure. For more information, see [Privileged roles and permissions](/entra/identity/role-based-access-control/privileged-roles-permissions).
6464

6565
Azure defines critical roles (Global/Privileged Role Admin), separation of duties, least‑privilege configuration and provides guidance to manage emergency access admin accounts in Entra ID – Guidance on creating and managing highly privileged break-glass global admin accounts (for emergency scenarios) to securely configure top-level administrative accounts with instructions to implement at [Microsoft cloud security benchmark – Privileged access](/security/benchmark/azure/mcsb-privileged-access) and [Azure identity & access security best practices](/azure/security/fundamentals/identity-management-best-practices).
6666

@@ -77,7 +77,7 @@ SCG-CSO-RSC Requirement: Explanations of security-related settings that can be o
7777

7878
SCG-CSO-RSC Recommendation: Explanations of security-related settings that can be operated only by privileged accounts and their security implications.
7979

80-
Microsoft Learn publicly documents tenant‑wide identity and access security settings that are **operated only by top‑level administrative roles** (for example, Global Administrator, Privileged Role Administrator, Conditional Access Administrator). These settings have direct and significant security implications because they control how privileged accounts authenticate, how legacy attack paths are blocked, and how identity risk is mitigated across the tenant. The security settings are described below.
80+
Microsoft Learn publicly documents tenant‑wide identity and access security settings that are **operated only by top‑level administrative roles** (for example, Global Administrator, Privileged Role Administrator, Conditional Access Administrator). It is important for customers to ensure appropriate configuration as these settings have direct and significant security implications because they control how privileged accounts authenticate, how legacy attack paths are blocked, and how identity risk is mitigated across the tenant. The security settings are described below.
8181

8282
#### 1. Security defaults (tenant‑wide secure‑by‑default controls)
8383

@@ -203,6 +203,8 @@ When the tenant is first provisioned Azure enforces the below ensuring newly cre
203203
- Configure two break-glass accounts with restricted usage and continuous monitoring
204204
- Alignment to **Azure Policy** + **Defender for Cloud** FedRAMP initiatives
205205

206+
These are Microsoft’s recommended secure defaults for newly created admin or high privilege accounts.
207+
206208
When identities, subscriptions, or resources are created, **Security defaults** + **Conditional Access** give a hardened starting posture; **Azure Policy** applies baseline guardrails at MG/sub scopes so new assets inherit secure defaults automatically.
207209

208210
**Microsoft Learn:**
@@ -233,14 +235,14 @@ Providers SHOULD offer the capability to compare all current settings for top-le
233235

234236
Azure supports SCG-ENH-CMP through built‑in security baseline comparison capabilities across **Microsoft Entra ID** top-level and privileged accounts and tenant‑level security settings.
235237

236-
Azure provides multiple mechanisms that allow customers to compare the current configuration of top-level and privileged identities against Microsoft’s published secure‑by‑default baseline. Azure provides built‑in comparison tools—Secure Score, Microsoft Entra ID Protection, Privileged Identity Management (PIM), Access Reviews, and Defender for Cloud—that continuously evaluate the configuration of all top-level and privileged accounts against Microsoft’s published secure-by-default identity baselines. These services surface deviations, provide gap analyses, and supply prescriptive remediation guidance, ensuring customers can easily compare current settings to recommended secure defaults at any time.
238+
Azure provides multiple mechanisms that allow customers to compare the current configuration of top-level and privileged identities against Microsoft’s published secure‑by‑default baseline. Azure provides built‑in comparison tools—Secure Score, Microsoft Entra ID Protection, Privileged Identity Management (PIM), Access Reviews, and Defender for Cloud—that continuously evaluate the configuration of all top-level and privileged accounts against Microsoft’s published secure-by-default identity baselines. These services surface deviations, provide gap analyses, and supply prescriptive remediation guidance, allowing customers to easily compare current settings to recommended secure defaults at any time.
237239

238240
#### How Azure fulfills comparison capability
239241

240242
##### 1. Microsoft Entra ID Protection Baseline
241243

242244
- Microsoft publishes secure configuration baselines for identity.
243-
- Microsoft Entra compares current tenant settings—including MFA enforcement, risky sign‑in detection, password protection, and conditional access posture—against Microsoft's recommended defaults.
245+
- Microsoft Entra compares current tenant settings—including MFA enforcement, risky sign‑in detection, password protection, and conditional access posture—to Microsoft's recommended defaults.
244246
- Deviations surface as alerts or "unmet recommendations".
245247

246248
**Microsoft Learn:**
@@ -266,7 +268,7 @@ Each control includes:
266268
- Gap analysis
267269
- Remediation guidance
268270

269-
This directly supports the requirement to compare *all current settings* against recommended defaults.
271+
This compares *all current settings* against recommended defaults.
270272

271273
**Microsoft Learn:** [Microsoft Entra Identity Secure Score](/entra/identity/monitoring-health/concept-identity-secure-score)
272274

@@ -306,7 +308,7 @@ PIM provides a built‑in control comparison:
306308
For hybrid and cloud resources:
307309

308310
- Identity and entitlement management controls map to secure defaults.
309-
- Defender for Cloud surfaces misconfigurations and recommends compliant baseline settings. Azure supports this requirement through built‑in security baseline comparison capabilities across Microsoft Entra ID privileged accounts and tenant‑level security settings.
311+
- Defender for Cloud surfaces misconfigurations and recommends compliant baseline settings. Azure employs built‑in security baseline comparison capabilities across Microsoft Entra ID privileged accounts and tenant‑level security settings.
310312

311313
**Microsoft Learn:** [Manage security posture with Microsoft Defender for Cloud (official Learn module)](/training/modules/microsoft-defender-cloud-security-posture/)
312314

0 commit comments

Comments
 (0)