Description:

Restricting Subscription entering AAD directory and Subscription leaving AAD directory to Permit no one prevents unauthorized movement of Azure subscriptions between tenants and helps maintain strong tenant security and governance.


Rationale:

Restricting subscriptions from entering or leaving the directory prevents unauthorized tenant transfers, protects billing and resource ownership, and helps maintain tenant security and governance.


Impact:

Positive: Ensures strict governance over subscription lifecycle, prevents hijacking or accidental transfer, and ensures compliance with organizational security policies.
Negative: Administrators must use formal approval processes for subscription migrations, which may add operational overhead.


Default Value:

The default configuration may allow certain privileged roles to initiate subscription transfers unless explicitly restricted.


Pre-Requisites:

  • Global Administrator or Privileged Role Administrator permissions

  • Microsoft Entra ID access

  • Access to Tenant Properties and Cross-Tenant Settings


Test Plan:

  1. Sign in to the Azure Portal at https://portal.azure.com

  2. Open Microsoft Entra ID

  3. Select Properties

  4. Open Access management for Azure resources

  5. Verify the Access management for Azure resources toggle is set to Off

  6. Confirm subscriptions cannot enter or leave the directory

  1. If the toggle is set to On, follow the implementation steps

Implementation Steps:

  1. Sign in to the Azure Portal at https://portal.azure.com

  2. Open Microsoft Entra ID

  3. Select Properties

  4. Open Access management for Azure resources

  5. Set the Access management for Azure resources toggle to Off

  1. Save the changes

Backout Plan:

  1. Sign in to the Azure Portal at https://portal.azure.com

  2. Open Microsoft Entra ID

  3. Select Properties

  4. Open Access management for Azure resources

  5. Set the Access management for Azure resources toggle to On

  6. Save the changes

Reference: