Skip to main content
โ† All controls
AC-2 / AC-6 / CM-7 NIST SP 800-53 Rev 5

Restrict who can register apps + consent to apps

Demonstrate that application registration and consent permissions are restricted to authorized roles, preventing standard users from creating or approving applications that could access organizational data or identities.

Description

What this control does

This control restricts which users or groups within an identity platform (typically Azure AD / Entra ID, Google Workspace, or Okta) can register new OAuth/OIDC applications and grant consent for applications to access organizational resources. It prevents unauthorized users from creating malicious applications that harvest credentials, exfiltrate data, or impersonate legitimate services. By limiting app registration and consent permissions to designated administrators or security-approved roles, organizations reduce the attack surface for OAuth abuse and shadow IT proliferation.

Control objective

What auditing this proves

Demonstrate that application registration and consent permissions are restricted to authorized roles, preventing standard users from creating or approving applications that could access organizational data or identities.

Associated risks

Risks this control addresses

  • Malicious insiders register rogue OAuth applications to harvest user credentials or tokens through phishing-style consent prompts
  • External attackers exploit compromised user accounts to register applications with persistent access to email, files, or identity data even after credential resets
  • Users grant consent to unvetted third-party applications with excessive permissions, enabling data exfiltration to external services
  • Shadow IT proliferates as business users deploy unauthorized SaaS integrations without security review, creating unmanaged data flows
  • Illicit consent grants create persistent backdoors that remain active after initial breach remediation, enabling attacker re-entry
  • Applications registered by departing employees persist with access to organizational resources due to lack of governance
  • Consent phishing campaigns trick users into authorizing malicious applications disguised as legitimate productivity tools

Testing procedure

How an auditor verifies this control

  1. Export the identity platform's tenant-level settings for user application registration permissions (e.g., Azure AD portal 'Users can register applications' setting or equivalent).
  2. Review the consent policy configuration to identify which users or roles can consent to applications and under what conditions (admin-only, risk-based, delegated consent policies).
  3. Enumerate all custom roles or directory roles that include application registration or consent permissions (e.g., Application Administrator, Cloud Application Administrator).
  4. Select a sample of five standard non-administrative user accounts from different departments and business units.
  5. Attempt to register a test application using each sampled user account credentials or simulate the registration workflow to confirm denial.
  6. Review audit logs for the past 90 days to identify any application registrations or consent grants performed by non-authorized users.
  7. Interview identity platform administrators to confirm the business process for requesting application registration and consent approvals, including ticketing or change control workflows.
  8. Validate that documented procedures align with technical enforcement by cross-referencing approved application lists against logged registration events.
Evidence required Collect screenshots or JSON exports of tenant-level user settings showing disabled app registration for standard users, consent policy configurations specifying admin-only or delegated approval flows, and role assignment reports showing membership in privileged roles. Obtain audit log extracts for application registration events (e.g., Azure AD 'Add application' or 'Consent to application' events) spanning the audit period, including actor identity, timestamp, and application details. Capture documented change management tickets or approval workflows for legitimate application onboarding requests.
Pass criteria Standard users are technically prevented from registering applications or granting consent without administrative approval, privileged roles are assigned only to authorized personnel, and audit logs show no unauthorized application registrations or consent grants in the review period.

Where this control is tested

Audit programs including this control