Incoming client certificates should be required to be 'On'
Warning: This rule will be deprecated 18 December 2023 as part of the update to Azure CIS version 2.0.0
Description
Client certificates allow for an app to request a certificate for incoming requests. Only clients that have a valid certificate can reach the app.
Rationale
The TLS mutual authentication technique in enterprise environments ensures the authenticity of clients to the server. If incoming client certificates are enabled, only an authenticated client who has valid certificates can access the app.
From the console
- Login to Azure Portal using https://portal.azure.com
- Go to App Services
- Click on each app
- Under the Settings section, click on Configuration
- Under Incoming client certificates, set the Client Certificate Mode option to Require.
From the command line
To set incoming client certificates value for an existing app, run the following command: az webapp update --resource-group <RESOURCE_GROUP_NAME> --name <APP_NAME> --set clientCertEnabled=true'
Impact
Using and maintaining client certificates requires additional work to obtain and manage key replacement and rotation.
References
- https://docs.microsoft.com/en-us/azure/security/benchmarks/security-controls-v2-data-protection#dp-4-encrypt-sensitive-information-in-transit
CIS Controls
Version 7 14 - Controlled Access Based on the Need to Know