This profile is an example profile to test the capabilities of train-pwsh and inspec-pwsh. The controls in this profile are a subset of the Microsoft 365 profile, and most details below explain the CIS Benchmarks the latter profile.
Please refer to the documentation for train-pwsh and inspec-pwsh for details on how to use those tools.
- Controls 1.1.3 and 1.2.1 are examples of Microsoft Graph module in use. This uses the graph/exchange pwsh session from the pwsh_single_session_executor resource.
- Control 1.3.6 is an example of Microsoft ExchangeOnline module in use. This uses the graph/exchange pwsh session from the pwsh_single_session_executor resource.
- Control 7.2.3 is an example of Microsoft Powershell.PnP module in use. This uses the teams/pnp pwsh session from the pwsh_single_session_executor resource.
- Control 8.5.3 is an example of Microsoft Teams module in use. This uses the teams/pnp pwsh session from the pwsh_single_session_executor resource.
- Control 8.6.1 is an example of Microsoft Teams module in use. This uses the exchange and teams pwsh session from the pwsh_exchange_executor and pwsh_teams_executor resources respectively.
This example profile mainly a custom resource named pwsh_single_session_executor. Within it, there are two functions named run_script_in_graph_exchange and run_script_in_teams_pnp. The names of these methods imply which modules in powershell they connect to. The goal of these methods is to establish one session for commands that connect to graph/exchange and one session for commands that connect to teams/pnp. The result of this will allow the microsoft profile to run its controls much more quickly.
Control 8.6.1 in particular is an example of using two separate resources, one to run exchange commands and the other to run teams commands.
This InSpec Profile was created to facilitate testing and auditing of CIS Microsoft 365 Foundations Benchmark
infrastructure and applications when validating compliancy with Center for Internet Security (CIS) Benchmark
requirements.
- Profile Version: 3.0.0
- Benchmark Date: 2024-04-29
- Benchmark Version: 3.1.0
This profile was developed to reduce the time it takes to perform a security checks based upon the CIS Guidance from the Center for Internet Security (CIS).
The results of a profile run will provide information needed to support an Authority to Operate (ATO) decision for the applicable technology.
The CIS Microsoft 365 Foundations Benchmark CIS Profile uses the InSpec open-source compliance validation language to support automation of the required compliance, security and policy testing for Assessment and Authorization (A&A) and Authority to Operate (ATO) decisions and Continuous Authority to Operate (cATO) processes.
- CIS Benchmark Information
- Getting Started
- Running the Profile
- Using Heimdall for Viewing Test Results
- Control Descriptions
The Center for Internet Security, Inc. (CIS®) create and maintain a set of Critical Security Controls (CIS Controls) for applications, computer systems and networks connected to the Department of Defense (DoD). These guidelines are the primary security standards used by the DoD agencies. In addition to defining security guidelines, the CISs also stipulate how security training should proceed and when security checks should occur. Organizations must stay compliant with these guidelines or they risk having their access to the DoD terminated.
Requirements associated with the CIS Microsoft 365 Foundations Benchmark are derived from the Security Requirements Guides and align to the National Institute of Standards and Technology (NIST) Special Publication (SP) 800-53 Security Controls, DoD Control Correlation Identifier and related standards.
The CIS Microsoft 365 Foundations Benchmark profile checks were developed to provide technical implementation validation to the defined DoD requirements, the guidance can provide insight for any organizations wishing to enhance their security posture and can be tailored easily for use in your organization.
For maximum flexibility/accessibility cinc-auditor
, the open-source packaged binary version of Chef InSpec should be used,
compiled by the CINC (CINC Is Not Chef) project in coordination with Chef using Chef's always-open-source InSpec source code.
For more information see CINC Home
It is intended and recommended that CINC-auditor and this profile executed from a "runner" host (such as a DevOps orchestration server, an administrative management system, or a developer's workstation/laptop) against the target. This can be any Unix/Linux/MacOS or Windows runner host, with access to the Internet.
Tip
For the best security of the runner, always install on the runner the latest version of CINC-auditor and any other supporting language components.
To install CINC-auditor on a UNIX/Linux/MacOS platform use the following command:
curl -L https://omnitruck.cinc.sh/install.sh | sudo bash -s -- -P cinc-auditor
To install CINC-auditor on a Windows platform (Powershell) use the following command:
. { iwr -useb https://omnitruck.cinc.sh/install.ps1 } | iex; install -project cinc-auditor
To confirm successful install of cinc-auditor:
cinc-auditor -v
Latest versions and other installation options are available at CINC Auditor site.
-
The latest
released
version of the profile is intended for use in A&A testing, as well as providing formal results to Authorizing Officials and Identity and Access Management (IAM)s. Please use thereleased
versions of the profile in these types of workflows. -
The
main
branch is a development branch that will become the next release of the profile. Themain
branch is intended for use in developing and testing merge requests for the next release of the profile, and is not intended be used for formal and ongoing testing on systems.
This profile uses InSpec Inputs to provide flexibility during testing. Inputs allow for customizing the behavior of Chef InSpec profiles.
InSpec Inputs are defined in the inspec.yml
file. The inputs
configured in this
file are profile definitions and defaults for the profile extracted from the profile
guidances and contain metadata that describe the profile, and shouldn't be modified.
InSpec provides several methods for customizing profile behaviors at run-time that does not require
modifying the inspec.yml
file itself (see Using Customized Inputs).
The following inputs are permitted to be configured in an inputs .yml
file (often named inputs.yml)
for the profile to run correctly on a specific environment, while still complying with the security
guidance document intent. This is important to prevent confusion when test results are passed downstream
to different stakeholders under the security guidance name used by this profile repository
For changes beyond the inputs cited in this section, users can create an organizationally-named overlay repository. For more information on developing overlays, reference the MITRE SAF Training
Example of tailoring Inputs While Still Complying with the security guidance document for the profile:
#Controls using this input:
#1.1.3, 1.2.1, 1.2.2, 1.3.1, 1.3.3, 1.3.6,
#2.1.1, 2.1.2, 2.1.3, 2.1.4, 2.1.5, 2.1.6, 2.1.7, 2.1.8, 2.1.9, 2.1.10, 2.1.14, 2.4.4,
#3.1.1, 3.2.2,
#5.1.1.1, 5.1.2.2, 5.1.2.3, 5.1.3.1, 5.1.5.2, 5.1.8.1, 5.2.2.3, 5.2.3.4,
#6.1.1, 6.1.2, 6.1.3, 6.1.4, 6.2.1, 6.2.2, 6.2.3, 6.3.1, 6.5.1, 6.5.2, 6.5.3,
#7.2.1, 7.2.2, 7.2.3, 7.2.4, 7.2.5, 7.2.6, 7.2.7, 7.2.9, 7.2.10, 7.3.1, 7.3.2, 7.3.4,
#8.1.1, 8.1.2, 8.2.1, 8.5.1, 8.5.2, 8.5.3, 8.5.4, 8.5.5, 8.5.6, 8.5.7, 8.5.8, 8.6.1
- name: client_id
sensitive: true
description: 'Client ID for Microsoft 365'
type: String
required: true
#Controls using this input:
#1.1.3, 1.2.1, 1.2.2, 1.3.1,
#5.1.1.1, 5.1.2.2, 5.1.2.3, 5.1.3.1, 5.1.5.2, 5.1.8.1, 5.2.3.4,
#7.2.1, 7.2.2, 7.2.3, 7.2.4, 7.2.5, 7.2.6, 7.2.7, 7.2.9, 7.2.10, 7.3.1, 7.3.2, 7.3.4,
#8.1.1, 8.1.2, 8.2.1, 8.5.1, 8.5.2, 8.5.3, 8.5.4, 8.5.5, 8.5.6, 8.5.7, 8.5.8, 8.6.1
- name: tenant_id
sensitive: true
description: 'Tenant ID for Microsoft 365'
type: String
required: true
#Controls using this input:
#1.1.3, 1.2.1, 1.2.2, 1.3.1,
#5.1.1.1, 5.1.2.2, 5.1.2.3, 5.1.3.1, 5.1.5.2, 5.1.8.1, 5.2.3.4,
#7.2.1, 7.2.2, 7.2.3, 7.2.4, 7.2.5, 7.2.6, 7.2.7, 7.2.9, 7.2.10, 7.3.1, 7.3.2, 7.3.4,
#8.1.2
- name: client_secret
sensitive: true
description: 'Client Secret for Microsoft 365'
type: String
required: true
#Controls using this input:
#1.2.2, 1.3.3, 1.3.6,
#2.1.1, 2.1.2, 2.1.3, 2.1.4, 2.1.5, 2.1.6, 2.1.7, 2.1.8, 2.1.9, 2.1.10, 2.1.14, 2.4.4,
#3.1.1, 3.2.2,
#5.2.2.3,
#6.1.1, 6.1.2, 6.1.3, 6.1.4, 6.2.1, 6.2.2, 6.2.3, 6.3.1, 6.5.1, 6.5.2, 6.5.3,
#7.2.1, 7.2.2, 7.2.3, 7.2.4, 7.2.5, 7.2.6, 7.2.7, 7.2.9, 7.2.10, 7.3.1, 7.3.2, 7.3.4,
#8.1.1, 8.1.2, 8.2.1, 8.5.1, 8.5.2, 8.5.3, 8.5.4, 8.5.5, 8.5.6, 8.5.7, 8.5.8, 8.6.1
- name: certificate_path
sensitive: true
description: 'Certificate path for M365'
type: String
required: true
#Controls using this input:
#1.2.2, 1.3.3, 1.3.6,
#2.1.1, 2.1.2, 2.1.3, 2.1.4, 2.1.5, 2.1.6, 2.1.7, 2.1.8, 2.1.9, 2.1.10, 2.1.14, 2.4.4,
#3.1.1, 3.2.2,
#5.2.2.3,
#6.1.1, 6.1.2, 6.1.3, 6.1.4, 6.2.1, 6.2.2, 6.2.3, 6.3.1, 6.5.1, 6.5.2, 6.5.3,
#7.2.1, 7.2.2, 7.2.3, 7.2.4, 7.2.5, 7.2.6, 7.2.7, 7.2.9, 7.2.10, 7.3.1, 7.3.2, 7.3.4,
#8.1.1, 8.1.2, 8.2.1, 8.5.1, 8.5.2, 8.5.3, 8.5.4, 8.5.5, 8.5.6, 8.5.7, 8.5.8, 8.6.1
- name: certificate_password
sensitive: true
description: 'Password for certificate for M365'
type: String
required: true
#Controls using this input:
#1.2.2, 1.3.1, 1.3.3, 1.3.6,
#2.1.1, 2.1.2, 2.1.3, 2.1.4, 2.1.5, 2.1.6, 2.1.7, 2.1.8, 2.1.9, 2.1.10, 2.1.14, 2.4.4,
#3.1.1, 3.2.2,
#5.2.2.3,
#6.1.1, 6.1.2, 6.1.3, 6.1.4, 6.2.1, 6.2.2, 6.2.3, 6.3.1, 6.5.1, 6.5.2, 6.5.3,
#8.6.1
- name: organization
sensitive: true
description: 'M365 Organization'
type: String
required: true
#Controls using this input:
#2.1.6
- name: notify_outbound_spam_recipients
sensitive: true
description: 'Email address to notify administrator for Exchange Online Spam Policies'
type: Array
required: true
#Controls using this input:
#2.1.6
- name: bcc_suspicious_outbound_additional_recipients
sensitive: true
description: 'BCC email address to notify additional recipients for Exchange Online Spam Policies'
type: Array
required: true
#Controls using this input:
#2.1.8
- name: spf_domains
sensitive: true
description: 'Array of domains needed to check for SPF record'
type: Array
required: true
#Controls using this input:
#2.1.10
- name: dmarc_domains
sensitive: true
description: 'Array of DMARC records to check'
type: Array
required: true
#Controls using this input:
#2.1.10
- name: reporting_mail_address
sensitive: true
description: 'Reporting mail address needed for DMARC check'
type: String
required: true
#Controls using this input:
#2.1.10
- name: moera_domains
sensitive: true
description: 'Array of MOERA records to check'
type: Array
required: true
#Controls using this input:
#3.2.2
- name: permitted_exceptions_teams_locations
sensitive: true
description: 'Permitted exceptions for teams locations'
type: Array
required: true
#Controls using this input:
#6.2.1
- name: internal_domains_transport_rule
sensitive: true
description: 'Domains internal to the organization to be checked'
type: Array
required: true
#Controls using this input:
#6.2.3
- name: email_addresses_bypass_external_tagging
sensitive: true
description: 'Email address list that are allowed to bypass external tagging'
type: Array
required: true
#Controls using this input:
#6.5.2
- name: mailtipslargeaudiencethreshold_value
sensitive: true
description: 'MailTipsLargeAudienceThreshold value to check for in MailTips setting'
required: true
#Controls using this input:
#6.5.2
- name: authorized_domains_teams_admin_center
sensitive: true
description: 'List of authorized domains for AllowedDomains option in Teams Admin Center'
type: Array
required: true
#Controls using this input:
#8.6.1
- name: reporting_email_addresses_for_malicious_messages
sensitive: true
description: 'Email addresses to check to report malicious messages in Teams and Defender'
type: Array
required: true
#Controls using this input:
#7.2.1, 7.2.2, 7.2.3, 7.2.4, 7.2.5, 7.2.6, 7.2.7, 7.2.9, 7.2.10, 7.3.1, 7.3.2, 7.3.4,
- name: sharepoint_admin_url
sensitive: true
description: 'SharePoint Admin URL to connect to'
type: String
required: true
#Controls using this input:
#7.2.6
- name: domains_trusted_by_organization
sensitive: true
description: 'Domains that are trusted by organization in SharePoint'
type: Array
required: true
#Controls using this input:
#7.2.9
- name: external_user_expiry_in_days_spo_threshold
sensitive: true
description: 'Threshold in days to check for external user expiry in SharePoint'
value: 30
required: true
#Controls using this input:
#7.2.10
- name: email_attestation_re_auth_days_spo_threshold
sensitive: true
description: 'Threshold in days to check for email attestation auth in SharePoint'
value: 15
required: true
#Controls using this input:
#7.3.2
- name: trusted_domains_guids
sensitive: true
description: 'Domain GUIDs trusted from the on premises environment'
type: Array
required: true
Note
Inputs are variables that are referenced by control(s) in the profile that implement them.
They are declared (defined) and given a default value in the inspec.yml
file.
Customized inputs may be used at the CLI by providing an input file or a flag at execution time.
-
Using the
--input
flagExample:
[inspec or cinc-auditor] exec <my-profile.tar.gz> --input disable_slow_controls=true
-
Using the
--input-file
flag.Example:
[inspec or cinc-auditor] exec <my-profile.tar.gz> --input-file=<my_inputs_file.yml>
Tip
For additional information about input
file examples reference the MITRE SAF Training
Chef InSpec Resources:
The Gemfile provided contains all the necessary ruby dependencies for checking the profile controls.
All action are conducted using ruby
(gemstone/programming language). Currently inspec
commands have been tested with ruby version 3.1.2. A higher version of ruby is not guaranteed to
provide the expected results. Any modern distribution of Ruby comes with Bundler preinstalled by default.
Install ruby based on the OS being used, see Installing Ruby
After installing ruby
install the necessary dependencies by invoking the bundler command
(must be in the same directory where the Gemfile is located):
bundle install
Linting and validating controls:
bundle exec rake [inspec or cinc-auditor]:check # Validate the InSpec Profile
bundle exec rake lint # Run RuboCop Linter
bundle exec rake lint:auto_correct # Autocorrect RuboCop offenses (only when it's safe)
bundle exec rake pre_commit_checks # Pre-commit checks
Ensure the controls are ready to be committed into the repo:
bundle exec rake pre_commit_checks
This option is best used when network connectivity is available and policies permit access to the hosting repository.
# Using `pwsh` transport
time bundle exec inspec exec . -t pwsh://pwsh-options --input-file=inputs.yml
The JSON results output file can be loaded into Heimdall-Lite or Heimdall-Server for a user-interactive, graphical view of the profile scan results.
Heimdall-Lite is a browser only
viewer that allows you to easily view your results directly and locally rendered in your browser.
Heimdall-Server is configured with a data-services backend
allowing for data persistency to a database (PostgreSQL).
For more detail on feature capabilities see Heimdall Features
Heimdall can export your results into a DISA Checklist (CKL) file for easily uploading into eMass using the Heimdall Export
function.
Depending on your environment restrictions, the SAF CLI can be used to run a local docker instance
of Heimdall-Lite via the saf view:heimdall
command.
Additionally both Heimdall applications can be deployed via docker, kubernetes, or the installation packages.
Center for Internet Security (CIS)
MITRE Security Automation Framework Team
© 2018-2025 The MITRE Corporation.
Approved for Public Release; Distribution Unlimited. Case Number 18-3678.
MITRE hereby grants express written permission to use, reproduce, distribute, modify, and otherwise leverage this software to the extent permitted by the licensed terms provided in the LICENSE.md file included with this project.
This software was produced for the U. S. Government under Contract Number HHSM-500-2012-00008I, and is subject to Federal Acquisition Regulation Clause 52.227-14, Rights in Data-General.
No other use other than that granted to the U. S. Government, or to those acting on behalf of the U. S. Government under that Clause is authorized without the express written permission of The MITRE Corporation.
For further information, please contact The MITRE Corporation, Contracts Management Office, 7515 Colshire Drive, McLean, VA 22102-7539, (703) 983-6000.
CIS Benchmarks are published by Center for Internet Security