private/tests/TestMeta.json

{
  "21809": {
    "TestId": "21809",
    "ImplementationCost": "Low",
    "UserImpact": "Low",
    "RiskLevel": "High",
    "Category": "Access control",
    "Title": "Admin consent workflow is enabled",
    "TenantType": [
      "Workforce",
      "External"
    ]
  },
  "21897": {
    "TestId": "21897",
    "ImplementationCost": "High",
    "UserImpact": "High",
    "RiskLevel": "Medium",
    "Category": "Access control",
    "Title": "All app assignment and group membership is governed",
    "TenantType": [
      "Workforce",
      "External"
    ]
  },
  "21894": {
    "TestId": "21894",
    "ImplementationCost": "Medium",
    "UserImpact": "Low",
    "RiskLevel": "Low",
    "Category": "Access control",
    "Title": "All certificates Microsoft Entra Application Registrations and Service Principals must be issued by an approved certification authority",
    "TenantType": [
      "Workforce",
      "External"
    ]
  },
  "21867": {
    "TestId": "21867",
    "ImplementationCost": "Medium",
    "UserImpact": "Low",
    "RiskLevel": "Low",
    "Category": "Access control",
    "Title": "All enterprise applications have owners",
    "TenantType": [
      "Workforce",
      "External"
    ]
  },
  "21929": {
    "TestId": "21929",
    "ImplementationCost": "Medium",
    "UserImpact": "Medium",
    "RiskLevel": "Medium",
    "Category": "Access control",
    "Title": "All entitlement management packages that apply to guests have expirations or access reviews configured in their assignment policies",
    "TenantType": [
      "Workforce",
      "External"
    ]
  },
  "21878": {
    "TestId": "21878",
    "ImplementationCost": "Medium",
    "UserImpact": "Medium",
    "RiskLevel": "Medium",
    "Category": "Access control",
    "Title": "All entitlement management policies have an expiration date",
    "TenantType": [
      "Workforce",
      "External"
    ]
  },
  "21879": {
    "TestId": "21879",
    "ImplementationCost": "Medium",
    "UserImpact": "Medium",
    "RiskLevel": "Medium",
    "Category": "Access control",
    "Title": "All entitlement management policies that apply to External users require approval",
    "TenantType": [
      "Workforce",
      "External"
    ]
  },
  "21832": {
    "TestId": "21832",
    "ImplementationCost": "Low",
    "UserImpact": "Low",
    "RiskLevel": "Medium",
    "Category": "Access control",
    "Title": "All groups in Conditional Access policies belong to a restricted management administrative unit",
    "TenantType": [
      "Workforce"
    ]
  },
  "21877": {
    "TestId": "21877",
    "ImplementationCost": "High",
    "UserImpact": "High",
    "RiskLevel": "Medium",
    "Category": "Access control",
    "Title": "All guests have a sponsor",
    "TenantType": [
      "Workforce",
      "External"
    ]
  },
  "21899": {
    "TestId": "21899",
    "ImplementationCost": "Low",
    "UserImpact": "Low",
    "RiskLevel": "Medium",
    "Category": "Access control",
    "Title": "All privileged role assignments have a recipient that can receive notifications",
    "TenantType": [
      "Workforce",
      "External"
    ]
  },
  "21887": {
    "TestId": "21887",
    "ImplementationCost": "Medium",
    "UserImpact": "Low",
    "RiskLevel": "Medium",
    "Category": "Access control",
    "Title": "All registered redirect URIs must have proper DNS records and ownerships",
    "TenantType": [
      "Workforce",
      "External"
    ]
  },
  "21864": {
    "TestId": "21864",
    "ImplementationCost": "High",
    "UserImpact": "Low",
    "RiskLevel": "High",
    "Category": "Access control",
    "Title": "All risk detections are triaged",
    "TenantType": [
      "Workforce",
      "External"
    ]
  },
  "21862": {
    "TestId": "21862",
    "ImplementationCost": "High",
    "UserImpact": "Low",
    "RiskLevel": "Medium",
    "Category": "Access control",
    "Title": "All risky workload identities are triaged",
    "TenantType": [
      "Workforce",
      "External"
    ]
  },
  "22659": {
    "TestId": "22659",
    "ImplementationCost": "High",
    "UserImpact": "Low",
    "RiskLevel": "High",
    "Category": "Access control",
    "Title": "All risky workload identity sign ins are triaged",
    "TenantType": [
      "Workforce",
      "External"
    ]
  },
  "21892": {
    "TestId": "21892",
    "ImplementationCost": "High",
    "UserImpact": "High",
    "RiskLevel": "Medium",
    "Category": "Access control",
    "Title": "All sign-in activity comes from managed devices",
    "TenantType": [
      "Workforce",
      "External"
    ]
  },
  "21898": {
    "TestId": "21898",
    "ImplementationCost": "High",
    "UserImpact": "Medium",
    "RiskLevel": "Medium",
    "Category": "Access control",
    "Title": "All supported access lifecycle resources are managed with entitlement management packages",
    "TenantType": [
      "Workforce",
      "External"
    ]
  },
  "21784": {
    "TestId": "21784",
    "ImplementationCost": "Medium",
    "UserImpact": "Low",
    "RiskLevel": "Medium",
    "Category": "Access control",
    "Title": "All user sign in activity uses phishing-resistant authentication methods",
    "TenantType": [
      "Workforce",
      "External"
    ]
  },
  "21888": {
    "TestId": "21888",
    "ImplementationCost": "Low",
    "UserImpact": "Low",
    "RiskLevel": "High",
    "Category": "Access control",
    "Title": "App registrations must not have dangling or abandoned domain redirect URIs",
    "TenantType": [
      "Workforce",
      "External"
    ]
  },
  "21895": {
    "TestId": "21895",
    "ImplementationCost": "High",
    "UserImpact": "Low",
    "RiskLevel": "Low",
    "Category": "Access control",
    "Title": "Application Certificate Credentials are managed using HSM",
    "TenantType": [
      "Workforce",
      "External"
    ]
  },
  "21886": {
    "TestId": "21886",
    "ImplementationCost": "Medium",
    "UserImpact": "Low",
    "RiskLevel": "Medium",
    "Category": "Access control",
    "Title": "Applications that use Microsoft Entra for authentication and support provisioning are configured",
    "TenantType": [
      "Workforce",
      "External"
    ]
  },
  "21841": {
    "TestId": "21841",
    "ImplementationCost": "Low",
    "UserImpact": "Low",
    "RiskLevel": "Low",
    "Category": "Access control",
    "Title": "Authenticator app report suspicious activity is enabled",
    "TenantType": [
      "Workforce",
      "External"
    ]
  },
  "21802": {
    "TestId": "21802",
    "ImplementationCost": "Low",
    "UserImpact": "Low",
    "RiskLevel": "Medium",
    "Category": "Access control",
    "Title": "Authenticator app shows sign-in context",
    "TenantType": [
      "Workforce",
      "External"
    ]
  },
  "21912": {
    "TestId": "21912",
    "ImplementationCost": "Low",
    "UserImpact": "Low",
    "RiskLevel": "High",
    "Category": "Access control",
    "Title": "Azure resources used by Microsoft Entra only allow access from privileged roles",
    "TenantType": [
      "Workforce",
      "External"
    ]
  },
  "21881": {
    "TestId": "21881",
    "ImplementationCost": "Medium",
    "UserImpact": "Low",
    "RiskLevel": "High",
    "Category": "Access control",
    "Title": "Azure subscriptions used by Identity Governance are secured consistently with Identity Governance roles",
    "TenantType": [
      "Workforce",
      "External"
    ]
  },
  "21842": {
    "TestId": "21842",
    "ImplementationCost": "Low",
    "UserImpact": "Low",
    "RiskLevel": "Low",
    "Category": "Access control",
    "Title": "Block administrators from using SSPR",
    "TenantType": [
      "Workforce"
    ]
  },
  "21799": {
    "TestId": "21799",
    "ImplementationCost": "Medium",
    "UserImpact": "Low",
    "RiskLevel": "High",
    "Category": "Access control",
    "Title": "Block high risk sign-ins",
    "TenantType": [
      "Workforce",
      "External"
    ]
  },
  "21844": {
    "TestId": "21844",
    "ImplementationCost": "High",
    "UserImpact": "Low",
    "RiskLevel": "Low",
    "Category": "Access control",
    "Title": "Block legacy Azure AD PowerShell module",
    "TenantType": [
      "Workforce"
    ]
  },
  "21843": {
    "TestId": "21843",
    "ImplementationCost": "High",
    "UserImpact": "Low",
    "RiskLevel": "Low",
    "Category": "Access control",
    "Title": "Block legacy Microsoft Online PowerShell module",
    "TenantType": [
      "Workforce"
    ]
  },
  "21831": {
    "TestId": "21831",
    "ImplementationCost": "Low",
    "UserImpact": "Low",
    "RiskLevel": "Medium",
    "Category": "Access control",
    "Title": "Conditional Access protected actions are enabled",
    "TenantType": [
      "Workforce"
    ]
  },
  "21834": {
    "TestId": "21834",
    "ImplementationCost": "Low",
    "UserImpact": "Low",
    "RiskLevel": "Low",
    "Category": "Access control",
    "Title": "Directory sync account is locked down to specific named location",
    "TenantType": [
      "Workforce"
    ]
  },
  "22101": {
    "TestId": "22101",
    "ImplementationCost": "Medium",
    "UserImpact": "Low",
    "RiskLevel": "High",
    "Category": "Access control",
    "Title": "Disable ciamlogin endpoints when custom domain enabled",
    "TenantType": [
      "External"
    ]
  },
  "21848": {
    "TestId": "21848",
    "ImplementationCost": "Low",
    "UserImpact": "Low",
    "RiskLevel": "Low",
    "Category": "Access control",
    "Title": "Enable custom banned passwords",
    "TenantType": [
      "Workforce",
      "External"
    ]
  },
  "22102": {
    "TestId": "22102",
    "ImplementationCost": "Medium",
    "UserImpact": "Low",
    "RiskLevel": "High",
    "Category": "Access control",
    "Title": "Enable custom domain",
    "TenantType": [
      "External"
    ]
  },
  "21893": {
    "TestId": "21893",
    "ImplementationCost": "Medium",
    "UserImpact": "Medium",
    "RiskLevel": "Low",
    "Category": "Access control",
    "Title": "Enable Microsoft Entra ID Protection policy to enforce multifactor authentication registration",
    "TenantType": [
      "Workforce",
      "External"
    ]
  },
  "21964": {
    "TestId": "21964",
    "ImplementationCost": "Low",
    "UserImpact": "Low",
    "RiskLevel": "Low",
    "Category": "Access control",
    "Title": "Enable protected actions to secure Conditional Access policy creation and changes",
    "TenantType": [
      "Workforce",
      "External"
    ]
  },
  "21870": {
    "TestId": "21870",
    "ImplementationCost": "Low",
    "UserImpact": "Low",
    "RiskLevel": "Low",
    "Category": "Access control",
    "Title": "Enable SSPR",
    "TenantType": [
      "Workforce",
      "External"
    ]
  },
  "22100": {
    "TestId": "22100",
    "ImplementationCost": "Medium",
    "UserImpact": "Low",
    "RiskLevel": "High",
    "Category": "Access control",
    "Title": "Enable WAF for ciamlogin endpoints",
    "TenantType": [
      "External"
    ]
  },
  "21869": {
    "TestId": "21869",
    "ImplementationCost": "Medium",
    "UserImpact": "Low",
    "RiskLevel": "Medium",
    "Category": "Access control",
    "Title": "Enterprise applications must require explicit assignment or scoped provisioning",
    "TenantType": [
      "Workforce",
      "External"
    ]
  },
  "21859": {
    "TestId": "21859",
    "ImplementationCost": "Medium",
    "UserImpact": "Low",
    "RiskLevel": "Medium",
    "Category": "Access control",
    "Title": "GDAP admin least privilege",
    "TenantType": [
      "Workforce",
      "External"
    ]
  },
  "21822": {
    "TestId": "21822",
    "ImplementationCost": "High",
    "UserImpact": "Medium",
    "RiskLevel": "Medium",
    "Category": "Access control",
    "Title": "Guest access is limited to approved tenants",
    "TenantType": [
      "Workforce"
    ]
  },
  "21821": {
    "TestId": "21821",
    "ImplementationCost": "Medium",
    "UserImpact": "Medium",
    "RiskLevel": "Medium",
    "Category": "Access control",
    "Title": "Guest access is restricted",
    "TenantType": [
      "Workforce"
    ]
  },
  "21857": {
    "TestId": "21857",
    "ImplementationCost": "Medium",
    "UserImpact": "Low",
    "RiskLevel": "Medium",
    "Category": "Access control",
    "Title": "Guest identities are lifecycle managed with access reviews",
    "TenantType": [
      "Workforce",
      "External"
    ]
  },
  "21823": {
    "TestId": "21823",
    "ImplementationCost": "Medium",
    "UserImpact": "Medium",
    "RiskLevel": "Medium",
    "Category": "Access control",
    "Title": "Guest self-service sign up via user flow is disabled",
    "TenantType": [
      "Workforce"
    ]
  },
  "22128": {
    "TestId": "22128",
    "ImplementationCost": "Medium",
    "UserImpact": "Low",
    "RiskLevel": "High",
    "Category": "Access control",
    "Title": "Guests are not assigned high privileged directory roles",
    "TenantType": [
      "Workforce",
      "External"
    ]
  },
  "21824": {
    "TestId": "21824",
    "ImplementationCost": "Low",
    "UserImpact": "Medium",
    "RiskLevel": "Medium",
    "Category": "Access control",
    "Title": "Guests don't have long lived sign-in sessions",
    "TenantType": [
      "Workforce"
    ]
  },
  "21868": {
    "TestId": "21868",
    "ImplementationCost": "Medium",
    "UserImpact": "Low",
    "RiskLevel": "Medium",
    "Category": "Access control",
    "Title": "Guests don't own apps in the tenant",
    "TenantType": [
      "Workforce",
      "External"
    ]
  },
  "21858": {
    "TestId": "21858",
    "ImplementationCost": "Medium",
    "UserImpact": "Low",
    "RiskLevel": "Medium",
    "Category": "Access control",
    "Title": "Inactive guest identities are removed from the tenant",
    "TenantType": [
      "Workforce",
      "External"
    ]
  },
  "22098": {
    "TestId": "22098",
    "ImplementationCost": "Low",
    "UserImpact": "Low",
    "RiskLevel": "Medium",
    "Category": "Access control",
    "Title": "Integrate Entra Audit logs with Azure Monitor",
    "TenantType": [
      "External"
    ]
  },
  "22099": {
    "TestId": "22099",
    "ImplementationCost": "Low",
    "UserImpact": "Low",
    "RiskLevel": "Medium",
    "Category": "Access control",
    "Title": "Integrate Entra Sign-In logs with Azure Monitor",
    "TenantType": [
      "External"
    ]
  },
  "21953": {
    "TestId": "21953",
    "ImplementationCost": "Low",
    "UserImpact": "Low",
    "RiskLevel": "Low",
    "Category": "Access control",
    "Title": "Local Admin Password Solution is deployed",
    "TenantType": [
      "Workforce",
      "External"
    ]
  },
  "21955": {
    "TestId": "21955",
    "ImplementationCost": "Low",
    "UserImpact": "Low",
    "RiskLevel": "Low",
    "Category": "Access control",
    "Title": "Manage the local administrators on Microsoft Entra joined devices",
    "TenantType": [
      "Workforce",
      "External"
    ]
  },
  "21803": {
    "TestId": "21803",
    "ImplementationCost": "Medium",
    "UserImpact": "Low",
    "RiskLevel": "High",
    "Category": "Access control",
    "Title": "Migrate from legacy MFA and SSPR policies",
    "TenantType": [
      "Workforce",
      "External"
    ]
  },
  "21984": {
    "TestId": "21984",
    "ImplementationCost": "Low",
    "UserImpact": "Low",
    "RiskLevel": "Low",
    "Category": "Access control",
    "Title": "No Active low priority Entra recommendations found",
    "TenantType": [
      "Workforce",
      "External"
    ]
  },
  "21983": {
    "TestId": "21983",
    "ImplementationCost": "Low",
    "UserImpact": "Low",
    "RiskLevel": "Medium",
    "Category": "Access control",
    "Title": "No Active Medium priority Entra recommendations found",
    "TenantType": [
      "Workforce",
      "External"
    ]
  },
  "21882": {
    "TestId": "21882",
    "ImplementationCost": "Medium",
    "UserImpact": "Low",
    "RiskLevel": "Medium",
    "Category": "Access control",
    "Title": "No nested groups in PIM for groups",
    "TenantType": [
      "Workforce",
      "External"
    ]
  },
  "21839": {
    "TestId": "21839",
    "ImplementationCost": "Low",
    "UserImpact": "Low",
    "RiskLevel": "Low",
    "Category": "Access control",
    "Title": "Passkey authentication method enabled",
    "TenantType": [
      "Workforce",
      "External"
    ]
  },
  "21811": {
    "TestId": "21811",
    "ImplementationCost": "Low",
    "UserImpact": "Low",
    "RiskLevel": "Medium",
    "Category": "Access control",
    "Title": "Password expiration is disabled",
    "TenantType": [
      "Workforce",
      "External"
    ]
  },
  "21847": {
    "TestId": "21847",
    "ImplementationCost": "Low",
    "UserImpact": "Low",
    "RiskLevel": "Medium",
    "Category": "Access control",
    "Title": "Password protection for on-premises is enabled",
    "TenantType": [
      "Workforce"
    ]
  },
  "21854": {
    "TestId": "21854",
    "ImplementationCost": "Medium",
    "UserImpact": "Low",
    "RiskLevel": "Medium",
    "Category": "Access control",
    "Title": "Privileged roles aren't assigned to stale identities",
    "TenantType": [
      "Workforce",
      "External"
    ]
  },
  "21855": {
    "TestId": "21855",
    "ImplementationCost": "Medium",
    "UserImpact": "Low",
    "RiskLevel": "Medium",
    "Category": "Access control",
    "Title": "Privileged roles have access reviews",
    "TenantType": [
      "Workforce",
      "External"
    ]
  },
  "21825": {
    "TestId": "21825",
    "ImplementationCost": "Low",
    "UserImpact": "Medium",
    "RiskLevel": "Medium",
    "Category": "Access control",
    "Title": "Privileged user sessions don't have long lived sign-in sessions",
    "TenantType": [
      "Workforce"
    ]
  },
  "21889": {
    "TestId": "21889",
    "ImplementationCost": "Medium",
    "UserImpact": "Medium",
    "RiskLevel": "Low",
    "Category": "Access control",
    "Title": "Reduce the user-visible password surface area",
    "TenantType": [
      "Workforce",
      "External"
    ]
  },
  "21872": {
    "TestId": "21872",
    "ImplementationCost": "Low",
    "UserImpact": "Medium",
    "RiskLevel": "High",
    "Category": "Access control",
    "Title": "Require multifactor authentication for device join and device registration using user action",
    "TenantType": [
      "Workforce"
    ]
  },
  "21891": {
    "TestId": "21891",
    "ImplementationCost": "Low",
    "UserImpact": "Low",
    "RiskLevel": "High",
    "Category": "Access control",
    "Title": "Require password reset notifications for administrator roles",
    "TenantType": [
      "Workforce",
      "External"
    ]
  },
  "21890": {
    "TestId": "21890",
    "ImplementationCost": "Low",
    "UserImpact": "Medium",
    "RiskLevel": "Medium",
    "Category": "Access control",
    "Title": "Require password reset notifications for user roles",
    "TenantType": [
      "Workforce",
      "External"
    ]
  },
  "21797": {
    "TestId": "21797",
    "ImplementationCost": "Medium",
    "UserImpact": "High",
    "RiskLevel": "High",
    "Category": "Access control",
    "Title": "Restrict access to high risk users",
    "TenantType": [
      "Workforce",
      "External"
    ]
  },
  "21808": {
    "TestId": "21808",
    "ImplementationCost": "Low",
    "UserImpact": "Medium",
    "RiskLevel": "High",
    "Category": "Access control",
    "Title": "Restrict device code flow",
    "TenantType": [
      "Workforce",
      "External"
    ]
  },
  "21954": {
    "TestId": "21954",
    "ImplementationCost": "Low",
    "UserImpact": "Low",
    "RiskLevel": "Low",
    "Category": "Access control",
    "Title": "Restrict nonadministrator users from recovering the BitLocker keys for their owned devices",
    "TenantType": [
      "Workforce",
      "External"
    ]
  },
  "21806": {
    "TestId": "21806",
    "ImplementationCost": "Medium",
    "UserImpact": "Low",
    "RiskLevel": "High",
    "Category": "Access control",
    "Title": "Secure the MFA registration (My Security Info) page",
    "TenantType": [
      "Workforce",
      "External"
    ]
  },
  "21840": {
    "TestId": "21840",
    "ImplementationCost": "Low",
    "UserImpact": "Low",
    "RiskLevel": "Low",
    "Category": "Access control",
    "Title": "Security key attestation is enforced",
    "TenantType": [
      "Workforce",
      "External"
    ]
  },
  "21838": {
    "TestId": "21838",
    "ImplementationCost": "Low",
    "UserImpact": "Low",
    "RiskLevel": "Low",
    "Category": "Access control",
    "Title": "Security key authentication method enabled",
    "TenantType": [
      "Workforce",
      "External"
    ]
  },
  "22072": {
    "TestId": "22072",
    "ImplementationCost": "Medium",
    "UserImpact": "Medium",
    "RiskLevel": "Medium",
    "Category": "Access control",
    "Title": "Self-Service Password Reset does not use Q & A",
    "TenantType": [
      "Workforce",
      "External"
    ]
  },
  "21896": {
    "TestId": "21896",
    "ImplementationCost": "Medium",
    "UserImpact": "Low",
    "RiskLevel": "Medium",
    "Category": "Access control",
    "Title": "Service principals don't have certificates or credentials associated with them",
    "TenantType": [
      "Workforce",
      "External"
    ]
  },
  "23183": {
    "TestId": "23183",
    "ImplementationCost": "High",
    "UserImpact": "Low",
    "RiskLevel": "High",
    "Category": "Access control",
    "Title": "Service principals use safe redirect URIs",
    "TenantType": [
      "Workforce",
      "External"
    ]
  },
  "21849": {
    "TestId": "21849",
    "ImplementationCost": "Low",
    "UserImpact": "Low",
    "RiskLevel": "Medium",
    "Category": "Access control",
    "Title": "Smart lockout duration is set to a minimum of 60",
    "TenantType": [
      "Workforce",
      "External"
    ]
  },
  "21850": {
    "TestId": "21850",
    "ImplementationCost": "Low",
    "UserImpact": "Low",
    "RiskLevel": "Medium",
    "Category": "Access control",
    "Title": "Smart lockout threshold isn't greater than 10",
    "TenantType": [
      "Workforce",
      "External"
    ]
  },
  "21845": {
    "TestId": "21845",
    "ImplementationCost": "Low",
    "UserImpact": "Low",
    "RiskLevel": "Low",
    "Category": "Access control",
    "Title": "Temporary access pass is enabled",
    "TenantType": [
      "Workforce",
      "External"
    ]
  },
  "21846": {
    "TestId": "21846",
    "ImplementationCost": "Low",
    "UserImpact": "Low",
    "RiskLevel": "Low",
    "Category": "Access control",
    "Title": "Temporary access pass restricted to one-time use",
    "TenantType": [
      "Workforce",
      "External"
    ]
  },
  "21775": {
    "TestId": "21775",
    "ImplementationCost": "Low",
    "UserImpact": "Medium",
    "RiskLevel": "Low",
    "Category": "Access control",
    "Title": "Tenant app management policy is configured",
    "TenantType": [
      "Workforce",
      "External"
    ]
  },
  "21874": {
    "TestId": "21874",
    "ImplementationCost": "Medium",
    "UserImpact": "Medium",
    "RiskLevel": "Medium",
    "Category": "Access control",
    "Title": "Tenant does have controls to selectively onboard External organizations (cross-tenant access polices and domain-based allow/deny lists)",
    "TenantType": [
      "Workforce",
      "External"
    ]
  },
  "21875": {
    "TestId": "21875",
    "ImplementationCost": "Medium",
    "UserImpact": "Medium",
    "RiskLevel": "Medium",
    "Category": "Access control",
    "Title": "Tenant has all External organizations allowed to collaborate as Connected Organization",
    "TenantType": [
      "Workforce",
      "External"
    ]
  },
  "21793": {
    "TestId": "21793",
    "ImplementationCost": "Medium",
    "UserImpact": "Low",
    "RiskLevel": "High",
    "Category": "Access control",
    "Title": "Tenant restrictions v2 are configured",
    "TenantType": [
      "Workforce",
      "External"
    ]
  },
  "21941": {
    "TestId": "21941",
    "ImplementationCost": "Medium",
    "UserImpact": "Low",
    "RiskLevel": "Medium",
    "Category": "Access control",
    "Title": "Token protection policies are configured",
    "TenantType": [
      "Workforce",
      "External"
    ]
  },
  "21865": {
    "TestId": "21865",
    "ImplementationCost": "Low",
    "UserImpact": "Low",
    "RiskLevel": "Medium",
    "Category": "Access control",
    "Title": "Trusted network locations are configured to increase quality of risk detections",
    "TenantType": [
      "Workforce",
      "External"
    ]
  },
  "21985": {
    "TestId": "21985",
    "ImplementationCost": "Medium",
    "UserImpact": "Medium",
    "RiskLevel": "Medium",
    "Category": "Access control",
    "Title": "Turn off Seamless SSO if there are is no usage",
    "TenantType": [
      "Workforce",
      "External"
    ]
  },
  "21829": {
    "TestId": "21829",
    "ImplementationCost": "High",
    "UserImpact": "High",
    "RiskLevel": "High",
    "Category": "Access control",
    "Title": "Use cloud authentication",
    "TenantType": [
      "Workforce"
    ]
  },
  "21876": {
    "TestId": "21876",
    "ImplementationCost": "Low",
    "UserImpact": "Low",
    "RiskLevel": "Medium",
    "Category": "Access control",
    "Title": "Use PIM for Microsoft Entra privileged roles",
    "TenantType": [
      "Workforce",
      "External"
    ]
  },
  "21776": {
    "TestId": "21776",
    "ImplementationCost": "Low",
    "UserImpact": "Medium",
    "RiskLevel": "Medium",
    "Category": "Access control",
    "Title": "User consent settings are restricted",
    "TenantType": [
      "Workforce",
      "External"
    ]
  },
  "21804": {
    "TestId": "21804",
    "ImplementationCost": "Medium",
    "UserImpact": "Low",
    "RiskLevel": "High",
    "Category": "Access control",
    "Title": "Weak authentication methods are disabled",
    "TenantType": [
      "Workforce",
      "External"
    ]
  },
  "21883": {
    "TestId": "21883",
    "ImplementationCost": "Low",
    "UserImpact": "Low",
    "RiskLevel": "High",
    "Category": "Access control",
    "Title": "Workload identities are configured with risk-based policies",
    "TenantType": [
      "Workforce",
      "External"
    ]
  },
  "21884": {
    "TestId": "21884",
    "ImplementationCost": "Medium",
    "UserImpact": "Low",
    "RiskLevel": "Medium",
    "Category": "Access control",
    "Title": "Workload identities based on known networks are configured",
    "TenantType": [
      "Workforce",
      "External"
    ]
  },
  "21885": {
    "TestId": "21885",
    "ImplementationCost": "High",
    "UserImpact": "Low",
    "RiskLevel": "High",
    "Category": "Application management",
    "Title": "App registrations use safe redirect URIs",
    "TenantType": [
      "Workforce",
      "External"
    ]
  },
  "21992": {
    "TestId": "21992",
    "ImplementationCost": "High",
    "UserImpact": "Low",
    "RiskLevel": "High",
    "Category": "Application management",
    "Title": "Application Certificates need to be rotated on a regular basis",
    "TenantType": [
      "Workforce",
      "External"
    ]
  },
  "21778": {
    "TestId": "21778",
    "ImplementationCost": "High",
    "UserImpact": "Low",
    "RiskLevel": "Medium",
    "Category": "Application management",
    "Title": "Line-of-business and partner apps use MSAL",
    "TenantType": [
      "Workforce",
      "External"
    ]
  },
  "21780": {
    "TestId": "21780",
    "ImplementationCost": "High",
    "UserImpact": "Low",
    "RiskLevel": "Medium",
    "Category": "Application management",
    "Title": "No usage of ADAL in the tenant",
    "TenantType": [
      "Workforce",
      "External"
    ]
  },
  "21779": {
    "TestId": "21779",
    "ImplementationCost": "Medium",
    "UserImpact": "Low",
    "RiskLevel": "Medium",
    "Category": "Application management",
    "Title": "Use recent versions of Microsoft Applications",
    "TenantType": [
      "Workforce",
      "External"
    ]
  },
  "21836": {
    "TestId": "21836",
    "ImplementationCost": "Medium",
    "UserImpact": "Low",
    "RiskLevel": "Medium",
    "Category": "Application management",
    "Title": "Workload identities assigned privileged roles",
    "TenantType": [
      "Workforce",
      "External"
    ]
  },
  "21837": {
    "TestId": "21837",
    "ImplementationCost": "Low",
    "UserImpact": "Low",
    "RiskLevel": "Low",
    "Category": "Device management",
    "Title": "Limit the maximum number of devices per user to 10",
    "TenantType": [
      "Workforce"
    ]
  },
  "21863": {
    "TestId": "21863",
    "ImplementationCost": "High",
    "UserImpact": "Low",
    "RiskLevel": "High",
    "Category": "Monitoring",
    "Title": "All high-risk sign-ins are triaged",
    "TenantType": [
      "Workforce",
      "External"
    ]
  },
  "21861": {
    "TestId": "21861",
    "ImplementationCost": "High",
    "UserImpact": "Low",
    "RiskLevel": "High",
    "Category": "Monitoring",
    "Title": "All high-risk users are triaged",
    "TenantType": [
      "Workforce",
      "External"
    ]
  },
  "21866": {
    "TestId": "21866",
    "ImplementationCost": "Medium",
    "UserImpact": "Low",
    "RiskLevel": "Medium",
    "Category": "Monitoring",
    "Title": "All Microsoft Entra recommendations are addressed",
    "TenantType": [
      "Workforce",
      "External"
    ]
  },
  "22124": {
    "TestId": "22124",
    "ImplementationCost": "Medium",
    "UserImpact": "Medium",
    "RiskLevel": "High",
    "Category": "Monitoring",
    "Title": "High priority Entra recommendations are addressed",
    "TenantType": [
      "Workforce",
      "External"
    ]
  },
  "21798": {
    "TestId": "21798",
    "ImplementationCost": "Low",
    "UserImpact": "Low",
    "RiskLevel": "High",
    "Category": "Monitoring",
    "Title": "ID Protection notifications enabled",
    "TenantType": [
      "Workforce",
      "External"
    ]
  },
  "21789": {
    "TestId": "21789",
    "ImplementationCost": "Low",
    "UserImpact": "Low",
    "RiskLevel": "Medium",
    "Category": "Monitoring",
    "Title": "Tenant creation events are triaged",
    "TenantType": [
      "Workforce"
    ]
  },
  "21820": {
    "TestId": "21820",
    "ImplementationCost": "Medium",
    "UserImpact": "Low",
    "RiskLevel": "Low",
    "Category": "Privileged access",
    "Title": "Activation alert for all privileged role assignments",
    "TenantType": [
      "Workforce"
    ]
  },
  "21819": {
    "TestId": "21819",
    "ImplementationCost": "Low",
    "UserImpact": "Low",
    "RiskLevel": "Medium",
    "Category": "Privileged access",
    "Title": "Activation alert for Global Administrator role assignments",
    "TenantType": [
      "Workforce"
    ]
  },
  "21818": {
    "TestId": "21818",
    "ImplementationCost": "Low",
    "UserImpact": "Low",
    "RiskLevel": "High",
    "Category": "Privileged access",
    "Title": "Activation alert for highly privileged role assignments",
    "TenantType": [
      "Workforce"
    ]
  },
  "21815": {
    "TestId": "21815",
    "ImplementationCost": "High",
    "UserImpact": "Low",
    "RiskLevel": "High",
    "Category": "Privileged access",
    "Title": "All privileged role assignments are activated just in time and not permanently active",
    "TenantType": [
      "Workforce"
    ]
  },
  "21816": {
    "TestId": "21816",
    "ImplementationCost": "Low",
    "UserImpact": "Low",
    "RiskLevel": "Low",
    "Category": "Privileged access",
    "Title": "All privileged role assignments are managed with PIM",
    "TenantType": [
      "Workforce"
    ]
  },
  "21833": {
    "TestId": "21833",
    "ImplementationCost": "High",
    "UserImpact": "Low",
    "RiskLevel": "Low",
    "Category": "Privileged access",
    "Title": "Directory Sync account credentials haven't been rotated recently",
    "TenantType": [
      "Workforce"
    ]
  },
  "21835": {
    "TestId": "21835",
    "ImplementationCost": "Low",
    "UserImpact": "Low",
    "RiskLevel": "Low",
    "Category": "Privileged access",
    "Title": "Emergency account exists",
    "TenantType": [
      "Workforce"
    ]
  },
  "21817": {
    "TestId": "21817",
    "ImplementationCost": "Medium",
    "UserImpact": "Low",
    "RiskLevel": "High",
    "Category": "Privileged access",
    "Title": "Global Administrator role activation triggers an approval workflow",
    "TenantType": [
      "Workforce"
    ]
  },
  "21788": {
    "TestId": "21788",
    "ImplementationCost": "Low",
    "UserImpact": "Low",
    "RiskLevel": "High",
    "Category": "Privileged access",
    "Title": "Global Administrators don't have standing elevated access to all Azure subscriptions in the tenant",
    "TenantType": [
      "Workforce"
    ]
  },
  "21813": {
    "TestId": "21813",
    "ImplementationCost": "Low",
    "UserImpact": "Low",
    "RiskLevel": "Low",
    "Category": "Privileged access",
    "Title": "High Global Administrator to privileged user ratio",
    "TenantType": [
      "Workforce"
    ]
  },
  "21830": {
    "TestId": "21830",
    "ImplementationCost": "Medium",
    "UserImpact": "Low",
    "RiskLevel": "High",
    "Category": "Privileged access",
    "Title": "Highly privileged roles are only activated in a PAW/SAW device",
    "TenantType": [
      "Workforce"
    ]
  },
  "21812": {
    "TestId": "21812",
    "ImplementationCost": "Low",
    "UserImpact": "Low",
    "RiskLevel": "Low",
    "Category": "Privileged access",
    "Title": "Maximum number of Global Administrators doesn't exceed eight users",
    "TenantType": [
      "Workforce"
    ]
  },
  "21800": {
    "TestId": "21800",
    "ImplementationCost": null,
    "UserImpact": null,
    "RiskLevel": null,
    "Category": null,
    "Title": "All user sign-in activity uses strong authentication methods",
    "TenantType": [
      "Workforce",
      "External"
    ]
  },
  "21773": {
    "TestId": "21773",
    "ImplementationCost": null,
    "UserImpact": null,
    "RiskLevel": null,
    "Category": null,
    "Title": "Applications don't have certificates with expiration longer than 180 days",
    "TenantType": [
      "Workforce",
      "External"
    ]
  },
  "21772": {
    "TestId": "21772",
    "ImplementationCost": null,
    "UserImpact": null,
    "RiskLevel": null,
    "Category": null,
    "Title": "Applications don't have secrets configured",
    "TenantType": [
      "Workforce",
      "External"
    ]
  },
  "21828": {
    "TestId": "21828",
    "ImplementationCost": null,
    "UserImpact": null,
    "RiskLevel": null,
    "Category": null,
    "Title": "Authentication transfer is blocked",
    "TenantType": [
      "Workforce",
      "External"
    ]
  },
  "21796": {
    "TestId": "21796",
    "ImplementationCost": null,
    "UserImpact": null,
    "RiskLevel": null,
    "Category": null,
    "Title": "Block legacy authentication policy is configured",
    "TenantType": [
      "Workforce"
    ]
  },
  "21810": {
    "TestId": "21810",
    "ImplementationCost": null,
    "UserImpact": null,
    "RiskLevel": null,
    "Category": null,
    "Title": "Checking Resource-Specific Consent is restricted",
    "TenantType": [
      "Workforce",
      "External"
    ]
  },
  "21807": {
    "TestId": "21807",
    "ImplementationCost": null,
    "UserImpact": null,
    "RiskLevel": null,
    "Category": null,
    "Title": "Creating new applications and service principles is restricted to privileged users",
    "TenantType": [
      "Workforce"
    ]
  },
  "21860": {
    "TestId": "21860",
    "ImplementationCost": null,
    "UserImpact": null,
    "RiskLevel": null,
    "Category": null,
    "Title": "Diagnostic settings are configured for all Microsoft Entra logs",
    "TenantType": [
      "Workforce",
      "External"
    ]
  },
  "21851": {
    "TestId": "21851",
    "ImplementationCost": null,
    "UserImpact": null,
    "RiskLevel": null,
    "Category": null,
    "Title": "Guest access is protected by strong authentication methods",
    "TenantType": [
      "Workforce"
    ]
  },
  "21791": {
    "TestId": "21791",
    "ImplementationCost": null,
    "UserImpact": null,
    "RiskLevel": null,
    "Category": null,
    "Title": "Guests can't invite other guests",
    "TenantType": [
      "Workforce"
    ]
  },
  "21792": {
    "TestId": "21792",
    "ImplementationCost": null,
    "UserImpact": null,
    "RiskLevel": null,
    "Category": null,
    "Title": "Guests have restricted access to directory objects",
    "TenantType": [
      "Workforce"
    ]
  },
  "21771": {
    "TestId": "21771",
    "ImplementationCost": null,
    "UserImpact": null,
    "RiskLevel": null,
    "Category": null,
    "Title": "Inactive applications don't have highly privileged built-in roles",
    "TenantType": [
      "Workforce",
      "External"
    ]
  },
  "21770": {
    "TestId": "21770",
    "ImplementationCost": null,
    "UserImpact": null,
    "RiskLevel": null,
    "Category": null,
    "Title": "Inactive applications don't have highly privileged Microsoft Graph API permissions",
    "TenantType": [
      "Workforce",
      "External"
    ]
  },
  "21774": {
    "TestId": "21774",
    "ImplementationCost": null,
    "UserImpact": null,
    "RiskLevel": null,
    "Category": null,
    "Title": "Microsoft services applications don't have credentials configured",
    "TenantType": [
      "Workforce",
      "External"
    ]
  },
  "21795": {
    "TestId": "21795",
    "ImplementationCost": null,
    "UserImpact": null,
    "RiskLevel": null,
    "Category": null,
    "Title": "No legacy authentication sign-in activity",
    "TenantType": [
      "Workforce"
    ]
  },
  "21790": {
    "TestId": "21790",
    "ImplementationCost": null,
    "UserImpact": null,
    "RiskLevel": null,
    "Category": null,
    "Title": "Outbound cross-tenant access settings are configured",
    "TenantType": [
      "Workforce",
      "External"
    ]
  },
  "21787": {
    "TestId": "21787",
    "ImplementationCost": null,
    "UserImpact": null,
    "RiskLevel": null,
    "Category": null,
    "Title": "Permissions to create new tenants is limited to the Tenant Creator role",
    "TenantType": [
      "Workforce"
    ]
  },
  "21814": {
    "TestId": "21814",
    "ImplementationCost": null,
    "UserImpact": null,
    "RiskLevel": null,
    "Category": null,
    "Title": "Privileged accounts are cloud native identities",
    "TenantType": [
      "Workforce"
    ]
  },
  "21782": {
    "TestId": "21782",
    "ImplementationCost": null,
    "UserImpact": null,
    "RiskLevel": null,
    "Category": null,
    "Title": "Privileged accounts have phishing-resistant methods registered",
    "TenantType": [
      "Workforce"
    ]
  },
  "21783": {
    "TestId": "21783",
    "ImplementationCost": null,
    "UserImpact": null,
    "RiskLevel": null,
    "Category": null,
    "Title": "Privileged Microsoft Entra built-in roles are targeted with Conditional Access policies to enforce phishing-resistant methods",
    "TenantType": [
      "Workforce"
    ]
  },
  "21781": {
    "TestId": "21781",
    "ImplementationCost": null,
    "UserImpact": null,
    "RiskLevel": null,
    "Category": null,
    "Title": "Privileged users sign in with phishing-resistant methods",
    "TenantType": [
      "Workforce"
    ]
  },
  "21777": {
    "TestId": "21777",
    "ImplementationCost": null,
    "UserImpact": null,
    "RiskLevel": null,
    "Category": null,
    "Title": "App Instance Property Lock is configured for all multitenant applications",
    "TenantType": [
      "Workforce",
      "External"
    ]
  },
  "21786": {
    "TestId": "21786",
    "ImplementationCost": null,
    "UserImpact": null,
    "RiskLevel": null,
    "Category": null,
    "Title": "User sign-in activity uses token protection",
    "TenantType": [
      "Workforce",
      "External"
    ]
  },
  "21801": {
    "TestId": "21801",
    "ImplementationCost": null,
    "UserImpact": null,
    "RiskLevel": null,
    "Category": null,
    "Title": "Users have strong authentication methods configured",
    "TenantType": [
      "Workforce",
      "External"
    ]
  }
}