You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Enhance clarity on secure configuration responsibilities
Clarified responsibilities for customers regarding secure configurations and emphasized the importance of appropriate settings for security implications. Added context about Microsoft's recommended secure defaults for admin accounts.
Copy file name to clipboardExpand all lines: articles/azure-government/compliance/recommended-secure-configuration.md
+9-7Lines changed: 9 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -12,7 +12,7 @@ ms.date: 02/06/2026
12
12
13
13
FedRAMP Rev 5 has mandated the following Secure Configuration Guide requirements for all Cloud Service Providers at [Secure Configuration Guide](https://www.fedramp.gov/docs/rev5/balance/secure-configuration-guide/).
14
14
15
-
Azure provides the instructions and guidelines for the customers to meet these requirements.
15
+
Azure provides the instructions and guidelines for the customers to meet these requirements. Customers are responsible for ensuring that their services are configured appropriately to meet these requirements.
16
16
17
17
## Recommended secure configuration
18
18
@@ -60,7 +60,7 @@ Microsoft Learn documents the built‑in administrative roles that are authorize
60
60
61
61
These roles have the ability to alter authentication requirements, disable protections, and grant or revoke privileged access, making their governance critical.
62
62
63
-
Azure provides guidance to protect administrator sign-in, enforce MFA, conditional access, and protected admin workstations which detail how to securely access top-level administrative accounts in Azure. For more information, see [Privileged roles and permissions](/entra/identity/role-based-access-control/privileged-roles-permissions).
63
+
Azure provides guidance to help customers protect administrator sign-in, enforce MFA, conditional access, and protected admin workstations which detail how to securely access top-level administrative accounts in Azure. For more information, see [Privileged roles and permissions](/entra/identity/role-based-access-control/privileged-roles-permissions).
64
64
65
65
Azure defines critical roles (Global/Privileged Role Admin), separation of duties, least‑privilege configuration and provides guidance to manage emergency access admin accounts in Entra ID – Guidance on creating and managing highly privileged break-glass global admin accounts (for emergency scenarios) to securely configure top-level administrative accounts with instructions to implement at [Microsoft cloud security benchmark – Privileged access](/security/benchmark/azure/mcsb-privileged-access) and [Azure identity & access security best practices](/azure/security/fundamentals/identity-management-best-practices).
66
66
@@ -77,7 +77,7 @@ SCG-CSO-RSC Requirement: Explanations of security-related settings that can be o
77
77
78
78
SCG-CSO-RSC Recommendation: Explanations of security-related settings that can be operated only by privileged accounts and their security implications.
79
79
80
-
Microsoft Learn publicly documents tenant‑wide identity and access security settings that are **operated only by top‑level administrative roles** (for example, Global Administrator, Privileged Role Administrator, Conditional Access Administrator). These settings have direct and significant security implications because they control how privileged accounts authenticate, how legacy attack paths are blocked, and how identity risk is mitigated across the tenant. The security settings are described below.
80
+
Microsoft Learn publicly documents tenant‑wide identity and access security settings that are **operated only by top‑level administrative roles** (for example, Global Administrator, Privileged Role Administrator, Conditional Access Administrator). It is important for customers to ensure appropriate configuration as these settings have direct and significant security implications because they control how privileged accounts authenticate, how legacy attack paths are blocked, and how identity risk is mitigated across the tenant. The security settings are described below.
@@ -203,6 +203,8 @@ When the tenant is first provisioned Azure enforces the below ensuring newly cre
203
203
- Configure two break-glass accounts with restricted usage and continuous monitoring
204
204
- Alignment to **Azure Policy** + **Defender for Cloud** FedRAMP initiatives
205
205
206
+
These are Microsoft’s recommended secure defaults for newly created admin or high privilege accounts.
207
+
206
208
When identities, subscriptions, or resources are created, **Security defaults** + **Conditional Access** give a hardened starting posture; **Azure Policy** applies baseline guardrails at MG/sub scopes so new assets inherit secure defaults automatically.
207
209
208
210
**Microsoft Learn:**
@@ -233,14 +235,14 @@ Providers SHOULD offer the capability to compare all current settings for top-le
233
235
234
236
Azure supports SCG-ENH-CMP through built‑in security baseline comparison capabilities across **Microsoft Entra ID** top-level and privileged accounts and tenant‑level security settings.
235
237
236
-
Azure provides multiple mechanisms that allow customers to compare the current configuration of top-level and privileged identities against Microsoft’s published secure‑by‑default baseline. Azure provides built‑in comparison tools—Secure Score, Microsoft Entra ID Protection, Privileged Identity Management (PIM), Access Reviews, and Defender for Cloud—that continuously evaluate the configuration of all top-level and privileged accounts against Microsoft’s published secure-by-default identity baselines. These services surface deviations, provide gap analyses, and supply prescriptive remediation guidance, ensuring customers can easily compare current settings to recommended secure defaults at any time.
238
+
Azure provides multiple mechanisms that allow customers to compare the current configuration of top-level and privileged identities against Microsoft’s published secure‑by‑default baseline. Azure provides built‑in comparison tools—Secure Score, Microsoft Entra ID Protection, Privileged Identity Management (PIM), Access Reviews, and Defender for Cloud—that continuously evaluate the configuration of all top-level and privileged accounts against Microsoft’s published secure-by-default identity baselines. These services surface deviations, provide gap analyses, and supply prescriptive remediation guidance, allowing customers to easily compare current settings to recommended secure defaults at any time.
237
239
238
240
#### How Azure fulfills comparison capability
239
241
240
242
##### 1. Microsoft Entra ID Protection Baseline
241
243
242
244
- Microsoft publishes secure configuration baselines for identity.
243
-
- Microsoft Entra compares current tenant settings—including MFA enforcement, risky sign‑in detection, password protection, and conditional access posture—against Microsoft's recommended defaults.
245
+
- Microsoft Entra compares current tenant settings—including MFA enforcement, risky sign‑in detection, password protection, and conditional access posture—to Microsoft's recommended defaults.
244
246
- Deviations surface as alerts or "unmet recommendations".
245
247
246
248
**Microsoft Learn:**
@@ -266,7 +268,7 @@ Each control includes:
266
268
- Gap analysis
267
269
- Remediation guidance
268
270
269
-
This directly supports the requirement to compare*all current settings* against recommended defaults.
271
+
This compares*all current settings* against recommended defaults.
@@ -306,7 +308,7 @@ PIM provides a built‑in control comparison:
306
308
For hybrid and cloud resources:
307
309
308
310
- Identity and entitlement management controls map to secure defaults.
309
-
- Defender for Cloud surfaces misconfigurations and recommends compliant baseline settings. Azure supports this requirement through built‑in security baseline comparison capabilities across Microsoft Entra ID privileged accounts and tenant‑level security settings.
311
+
- Defender for Cloud surfaces misconfigurations and recommends compliant baseline settings. Azure employs built‑in security baseline comparison capabilities across Microsoft Entra ID privileged accounts and tenant‑level security settings.
310
312
311
313
**Microsoft Learn:**[Manage security posture with Microsoft Defender for Cloud (official Learn module)](/training/modules/microsoft-defender-cloud-security-posture/)
0 commit comments