|
| 1 | +--- |
| 2 | +reviewed: 2024-04-27 |
| 3 | +severity: Critical |
| 4 | +pillar: Security |
| 5 | +category: SE:07 Encryption |
| 6 | +resource: Entra Domain Services |
| 7 | +online version: https://azure.github.io/PSRule.Rules.Azure/en/rules/Azure.EntraDS.TLS/ |
| 8 | +--- |
| 9 | + |
| 10 | +# Disable TLS v1 |
| 11 | + |
| 12 | +## SYNOPSIS |
| 13 | + |
| 14 | +Disable TLS v1 for Microsoft Entra Domain Services. |
| 15 | + |
| 16 | +## DESCRIPTION |
| 17 | + |
| 18 | +By default, Microsoft Entra Domain Services enables the use of ciphers and protocols such as TLS v1. |
| 19 | +These ciphers may be required for some legacy applications, but are considered weak and can be disabled if not required. |
| 20 | + |
| 21 | +Older TLS versions such as 1.0 and 1.1 are no longer considered secure by industry standards, such as PCI DSS. |
| 22 | + |
| 23 | +## RECOMMENDATION |
| 24 | + |
| 25 | +Consider disabling TLS v1 which is considered weak and can be disabled if not required. |
| 26 | + |
| 27 | +## EXAMPLES |
| 28 | + |
| 29 | +### Configure with Azure template |
| 30 | + |
| 31 | +To deploy domains that pass this rule: |
| 32 | + |
| 33 | +- Set the `properties.domainSecuritySettings.tlsV1` property to `Disabled`. |
| 34 | + |
| 35 | +For example: |
| 36 | + |
| 37 | +```json |
| 38 | +{ |
| 39 | + "type": "Microsoft.AAD/domainServices", |
| 40 | + "apiVersion": "2022-12-01", |
| 41 | + "name": "[parameters('name')]", |
| 42 | + "location": "[parameters('location')]", |
| 43 | + "properties": { |
| 44 | + "ldapsSettings": { |
| 45 | + "ldaps": "Enabled" |
| 46 | + }, |
| 47 | + "domainSecuritySettings": { |
| 48 | + "ntlmV1": "Disabled", |
| 49 | + "tlsV1": "Disabled", |
| 50 | + "kerberosRc4Encryption": "Disabled" |
| 51 | + } |
| 52 | + } |
| 53 | +} |
| 54 | +``` |
| 55 | + |
| 56 | +### Configure with Bicep |
| 57 | + |
| 58 | +To deploy domains that pass this rule: |
| 59 | + |
| 60 | +- Set the `properties.domainSecuritySettings.tlsV1` property to `Disabled`. |
| 61 | + |
| 62 | +For example: |
| 63 | + |
| 64 | +```bicep |
| 65 | +resource ds 'Microsoft.AAD/domainServices@2022-12-01' = { |
| 66 | + name: name |
| 67 | + location: location |
| 68 | + properties: { |
| 69 | + ldapsSettings: { |
| 70 | + ldaps: 'Enabled' |
| 71 | + } |
| 72 | + domainSecuritySettings: { |
| 73 | + ntlmV1: 'Disabled' |
| 74 | + tlsV1: 'Disabled' |
| 75 | + kerberosRc4Encryption: 'Disabled' |
| 76 | + } |
| 77 | + } |
| 78 | +} |
| 79 | +``` |
| 80 | + |
| 81 | +## LINKS |
| 82 | + |
| 83 | +- [SE:07 Encryption](https://learn.microsoft.com/azure/well-architected/security/encryption) |
| 84 | +- [Harden a Microsoft Entra Domain Services managed domain](https://learn.microsoft.com/entra/identity/domain-services/secure-your-domain) |
| 85 | +- [DP-3: Encrypt sensitive data in transit](https://learn.microsoft.com/security/benchmark/azure/baselines/azure-active-directory-domain-services-security-baseline#dp-3-encrypt-sensitive-data-in-transit) |
| 86 | +- [Azure deployment reference](https://learn.microsoft.com/azure/templates/microsoft.aad/domainservices) |
0 commit comments