last sync: 2025-Jun-30 17:25:56 UTC

[Deprecated]: App Service apps should have 'Client Certificates (Incoming client certificates)' enabled

Azure BuiltIn Policy definition

Source Azure Portal
Display name [Deprecated]: App Service apps should have 'Client Certificates (Incoming client certificates)' enabled
Id 5bb220d9-2698-4ee4-8404-b9c30c9df609
Version 3.1.0-deprecated
Details on versioning
Versioning Versions supported for Versioning: 1
3.1.0 (3.1.0-deprecated)
Built-in Versioning [Preview]
Category App Service
Microsoft Learn
Description Client certificates allow for the app to request a certificate for incoming requests. Only clients that have a valid certificate will be able to reach the app. This policy has been replaced by a new policy with the same name because Http 2.0 doesn't support client certificates.
Cloud environments AzureCloud = true
AzureUSGovernment = unknown
AzureChinaCloud = unknown
Available in AzUSGov Unknown, no evidence if Policy definition is/not available in AzureUSGovernment
Assessment(s) Assessments count: 1
Assessment Id: ca4e6a5a-3a9a-bad3-798a-d420a1d9bd6d
DisplayName: Web apps should request an SSL certificate for all incoming requests
Description: Web apps should be configured to request an SSL certificate for all incoming requests.
This is done using client certificates, which ensure that only clients with a valid certificate can access the app.
If this is not implemented, unauthorized clients may be able to access the app, potentially leading to security breaches and data leaks.
Therefore, it is crucial to enforce this security measure to protect the app and its data.

Remediation description: To set Client Certificates for your Web App:
1. Navigate to Azure App Service 2. Select Configuration 3. Go to the General Settings tab 4. Set Incoming Client Certificates to Require.
For more information, visit here: https://aka.ms/auth-tls
Categories: AppServices
Severity: Medium
preview: True
Mode Indexed
Type BuiltIn
Preview False
Deprecated True
Effect Default
Disabled
Allowed
Audit, Disabled
RBAC role(s) none
Rule aliases IF (1)
Alias Namespace ResourceType Path PathIsDefault DefaultPath Modifiable
Microsoft.Web/sites/clientCertEnabled Microsoft.Web sites properties.clientCertEnabled True False
Rule resource types IF (1)
Compliance
The following 5 compliance controls are associated with this Policy definition '[Deprecated]: App Service apps should have 'Client Certificates (Incoming client certificates)' enabled' (5bb220d9-2698-4ee4-8404-b9c30c9df609)
Control Domain Control Name MetadataId Category Title Owner Requirements Description Info Policy#
CIS_Azure_2.0.0 9.4 CIS_Azure_2.0.0_9.4 CIS Microsoft Azure Foundations Benchmark recommendation 9.4 9 Ensure the web app has 'Client Certificates (Incoming client certificates)' set to 'On' Shared Utilizing and maintaining client certificates will require additional work to obtain and manage replacement and key rotation. Client certificates allow for the app to request a certificate for incoming requests. Only clients that have a valid certificate will be able to reach the app. The TLS mutual authentication technique in enterprise environments ensures the authenticity of clients to the server. If incoming client certificates are enabled, then only an authenticated client who has valid certificates can access the app. link 3
DORA_2022_2554 9.3a DORA_2022_2554_9.3a DORA 2022 2554 9.3a 9 Implement Secure Data Transfer Solutions for ICT Systems Shared n/a Leverage information and communication technology (ICT) solutions and processes that ensure the security of data transfer methods to protect against unauthorized access and data breaches. 50
K_ISMS_P_2018 2.10.1 K_ISMS_P_2018_2.10.1 K ISMS P 2018 2.10.1 2.10 Establish Procedures for Managing the Security of System Operations Shared n/a Establish and implement operating procedures for managing the security of system operations such as designating system administrators, updating policies, changing rulesets, monitoring events, managing policy implementations or exceptions. 455
K_ISMS_P_2018 2.10.2 K_ISMS_P_2018_2.10.2 K ISMS P 2018 2.10.2 2.10 Establish Protective Measures for Administrator Privileges and Security Configurations Shared n/a Establish and implement protective measures with regard to administrator privileges and security configurations to ensure that important information and personal information are not exposed as a result of unauthorized access by service type or misconfigurations. 431
K_ISMS_P_2018 2.10.5 K_ISMS_P_2018_2.10.5 K ISMS P 2018 2.10.5 2.10 Establish Secure Data Transmission Procedures with External Organizations Shared n/a Establish secure transmission policies, transmission methods, and technical measures for protecting personal information and important information if transmitting data to external organizations. Agreement on management responsibilities for data transmission must be established. 30
Initiatives usage
Initiative DisplayName Initiative Id Initiative Category State Type polSet in AzUSGov
CIS Microsoft Azure Foundations Benchmark v2.0.0 06f19060-9e68-4070-92ca-f15cc126059e Regulatory Compliance GA BuiltIn unknown
DORA 2022 2554 f9c0485f-da8e-43b5-961e-58ebd54b907c Regulatory Compliance GA BuiltIn unknown
K ISMS P 2018 e0782c37-30da-4a78-9f92-50bfe7aa2553 Regulatory Compliance GA BuiltIn unknown
History
Date/Time (UTC ymd) (i) Change type Change detail
2023-12-08 20:47:07 change Minor, new suffix: deprecated (3.0.0 > 3.1.0-deprecated)
2022-09-19 17:41:40 change Major (2.0.0 > 3.0.0)
2022-07-01 16:32:34 change Major (1.0.0 > 2.0.0)
2019-11-12 19:11:12 add 5bb220d9-2698-4ee4-8404-b9c30c9df609
JSON compare
compare mode: version left: version right:
JSON
api-version=2021-06-01
EPAC