CISA M365

CISA M365

This MCP server implements VariousPolicies according to CSA BOD 25-01 requirements for Microsoft 365 cloud services

DynamicEndpoints

Remote Shell Execution
AI Integration Systems
Visit Server

Tools

configure_authenticator_context

Configure Microsoft Authenticator to show login context (MS.AAD.3.3v1)

complete_auth_methods_migration

Set Authentication Methods Manage Migration to Complete (MS.AAD.3.4v1)

enforce_pam

Enforce PAM system for privileged role assignments (MS.AAD.7.5v1)

enforce_privileged_mfa

Enforce phishing-resistant MFA for privileged roles (MS.AAD.3.6v1)

restrict_app_registration

Allow only administrators to register applications (MS.AAD.5.1v1)

restrict_app_consent

Allow only administrators to consent to applications (MS.AAD.5.2v1)

configure_admin_consent

Configure admin consent workflow for applications (MS.AAD.5.3v1)

restrict_group_consent

Prevent group owners from consenting to applications (MS.AAD.5.4v1)

enforce_granular_roles

Enforce use of granular roles instead of Global Administrator (MS.AAD.7.2v1)

disable_password_expiry

Disable password expiration (MS.AAD.6.1v1)

enforce_cloud_accounts

Enforce cloud-only accounts for privileged users (MS.AAD.7.3v1)

configure_global_admin_approval

Configure approval requirement for Global Administrator activation (MS.AAD.7.6v1)

configure_role_alerts

Configure alerts for privileged role assignments (MS.AAD.7.7v1)

configure_admin_alerts

Configure alerts for Global Administrator activation (MS.AAD.7.8v1)

get_policy_status

Get current status of all CISA M365 security policies

block_legacy_auth

Block legacy authentication (MS.AAD.1.1v1)

block_high_risk_users

Block users detected as high risk (MS.AAD.2.1v1)

configure_global_admins

Configure Global Administrator role assignments (MS.AAD.7.1v1)

block_high_risk_signins

Block sign-ins detected as high risk (MS.AAD.2.3v1)

enforce_phishing_resistant_mfa

Enforce phishing-resistant MFA for all users (MS.AAD.3.1v1)

enforce_alternative_mfa

Enforce alternative MFA method if phishing-resistant MFA not enforced (MS.AAD.3.2v1)

README

CISA M365 MCP Server

smithery badge A Model Context Protocol (MCP) server implementing CISA Binding Operational Directive 25-01 security controls for Microsoft 365 (Azure AD/Entra ID).

Table of Contents

Overview

This MCP server provides tools for configuring and managing Microsoft 365 security settings in accordance with BOD 25-01 requirements. It integrates with Microsoft Graph API to enforce security controls, monitor compliance, and provide detailed reporting.

Key Features

  • Legacy authentication controls
  • Risk-based access controls
  • Multi-factor authentication management
  • Application registration and consent controls
  • Password policy management
  • Privileged role management
  • Cloud-only account enforcement
  • PAM system integration
  • Comprehensive compliance reporting
  • Token-based authentication
  • Type-safe argument validation
  • Detailed error handling and logging

Security Controls

MS.AAD.1.1v1

Due Date: 06/20/2025

Block legacy authentication:

  • Disables legacy authentication protocols
  • Reduces attack surface
  • Improves security posture

Implementation details:

await graphClient
  .api('/policies/authenticationMethodsPolicy')
  .patch({
    allowLegacyAuthentication: false,
    blockLegacyAuthenticationMethods: true,
  });

MS.AAD.2.1v1 & MS.AAD.2.3v1

Due Date: 06/20/2025

Block high-risk users and sign-ins:

  • Blocks users detected as high risk
  • Blocks sign-ins detected as high risk
  • Leverages Microsoft's threat intelligence

Implementation details:

await graphClient
  .api('/policies/identitySecurityDefaultsEnforcementPolicy')
  .patch({
    blockHighRiskUsers: true,
    riskLevelForBlocking: 'high',
  });

MS.AAD.3.1v1, MS.AAD.3.2v1, MS.AAD.3.3v1

Due Date: 06/20/2025

MFA configuration:

  • Enforces phishing-resistant MFA
  • Configures alternative MFA methods
  • Shows login context in Microsoft Authenticator

Implementation details:

await graphClient
  .api('/policies/authenticationMethodsPolicy')
  .patch({
    policies: {
      fido2: {
        isEnabled: true,
        isSelfServiceRegistrationAllowed: true,
      },
      windowsHelloForBusiness: {
        isEnabled: true,
        isSelfServiceRegistrationAllowed: true,
      },
    },
  });

MS.AAD.5.1v1, MS.AAD.5.2v1, MS.AAD.5.3v1, MS.AAD.5.4v1

Due Date: 06/20/2025

Application controls:

  • Restricts app registration to admins
  • Restricts app consent to admins
  • Configures admin consent workflow
  • Blocks group owner consent

Implementation details:

await graphClient
  .api('/policies/applicationRegistrationManagement')
  .patch({
    restrictAppRegistration: true,
    restrictNonAdminUsers: true,
  });

MS.AAD.6.1v1

Due Date: 06/20/2025

Password policy:

  • Disables password expiration
  • Follows modern security best practices

Implementation details:

await graphClient
  .api('/policies/passwordPolicy')
  .patch({
    passwordExpirationPolicy: {
      passwordExpirationDays: 0,
      neverExpire: true,
    },
  });

MS.AAD.7.1v1 through MS.AAD.7.8v1

Due Date: 06/20/2025

Privileged role management:

  • Limits Global Administrator count
  • Enforces granular roles
  • Requires cloud-only accounts
  • Enforces PAM system usage
  • Configures approval workflows
  • Sets up alerting

Implementation details:

await graphClient
  .api('/policies/roleManagementPolicies')
  .patch({
    enforceGranularRoles: true,
    blockGlobalAdminForGeneralUse: true,
    requireApprovalForGlobalAdmin: true,
  });

Architecture

Components

  1. Server Class

    • Handles MCP protocol implementation
    • Manages tool registration and execution
    • Implements error handling and logging
  2. Authentication

    • Token-based authentication with Microsoft Graph API
    • Automatic token refresh
    • Secure credential management
  3. Graph Client

    • Wrapper around Microsoft Graph API
    • Type-safe request/response handling
    • Retry logic and error handling
  4. Tools

    • Legacy authentication control
    • Risk-based access management
    • MFA configuration
    • Application control
    • Password policy management
    • Role management
    • Alert configuration
    • Policy status reporting

Data Flow

graph TD
    A[MCP Client] -->|Request| B[MCP Server]
    B -->|Authentication| C[Token Manager]
    C -->|Access Token| D[Graph Client]
    D -->|API Calls| E[Microsoft Graph]
    E -->|Response| D
    D -->|Results| B
    B -->|Response| A

Prerequisites

  • Node.js 18.x or higher
  • Microsoft 365 tenant with admin access
  • Azure AD application with required permissions:
    • Policy.ReadWrite.All
    • RoleManagement.ReadWrite.All
    • User.Read.All
    • Application.ReadWrite.All

Installation

Installing via Smithery

To install CISA M365 MCP Server automatically via Smithery:

npx -y @smithery/cli install cisa-m365

You can also directly copy the MCP settings and definitions from Smithery Protocol Directory and add the MCP server to your Claude or LLM setup that supports MCP protocol.

  1. Clone the repository:
git clone https://github.com/DynamicEndpoints/BOD-25-01-CSA-MCP.git
cd cisa-m365
  1. Install dependencies:
npm install
  1. Build the server:
npm run build

Configuration

  1. Create Azure AD application:

    • Navigate to Azure Portal > Azure Active Directory
    • Register a new application
    • Add required API permissions
    • Create a client secret
  2. Configure environment variables:

cp .env.example .env

Edit .env file:

TENANT_ID=your-tenant-id
CLIENT_ID=your-client-id
CLIENT_SECRET=your-client-secret
  1. Configure MCP settings:
{
  "mcpServers": {
    "cisa-m365": {
      "command": "node",
      "args": ["path/to/cisa-m365/build/index.js"],
      "env": {
        "TENANT_ID": "your-tenant-id",
        "CLIENT_ID": "your-client-id",
        "CLIENT_SECRET": "your-client-secret"
      }
    }
  }
}

Usage

Available Tools

block_legacy_auth

Block legacy authentication methods.

{}

block_high_risk_users

Block users detected as high risk.

{}

enforce_phishing_resistant_mfa

Enforce phishing-resistant MFA for all users.

{}

configure_global_admins

Configure Global Administrator role assignments.

{
  "userIds": ["user1-id", "user2-id"]
}

get_policy_status

Get current status of all security policies.

{}

Example Usage

// Block legacy authentication
const result = await client.callTool('block_legacy_auth', {});

// Get policy status
const status = await client.callTool('get_policy_status', {});

API Reference

Policy Settings API

interface PolicySettings {
  legacyAuthentication: {
    blocked: boolean;
    compliant: boolean;
  };
  highRiskUsers: {
    blocked: boolean;
    compliant: boolean;
  };
  mfa: {
    phishingResistant: boolean;
    alternativeEnabled: boolean;
    compliant: boolean;
  };
  applications: {
    registrationRestricted: boolean;
    consentRestricted: boolean;
    compliant: boolean;
  };
  passwords: {
    expirationDisabled: boolean;
    compliant: boolean;
  };
  roles: {
    globalAdminCount: number;
    granularRolesEnforced: boolean;
    pamEnforced: boolean;
    compliant: boolean;
  };
}

Error Handling

The server implements comprehensive error handling:

  1. Authentication Errors

    • Token acquisition failures
    • Permission issues
    • Tenant configuration problems
  2. API Errors

    • Graph API request failures
    • Rate limiting
    • Service unavailability
  3. Validation Errors

    • Invalid arguments
    • Missing required parameters
    • Type mismatches
  4. Runtime Errors

    • Network issues
    • Timeout problems
    • Resource constraints

Example error response:

{
  "error": {
    "code": "InvalidParams",
    "message": "Invalid role assignment arguments",
    "details": {
      "parameter": "userIds",
      "constraint": "Must have between 2 and 8 users",
      "received": "1 user"
    }
  }
}

Testing

  1. Run unit tests:
npm test
  1. Run integration tests:
npm run test:integration
  1. Run compliance tests:
npm run test:compliance

Security Considerations

  1. Authentication

    • Use secure token storage
    • Implement token rotation
    • Monitor for suspicious activity
  2. API Access

    • Follow least privilege principle
    • Regular permission audits
    • Monitor API usage
  3. Data Protection

    • No sensitive data logging
    • Secure configuration storage
    • Regular security scans
  4. Compliance

    • Regular compliance checks
    • Automated policy verification
    • Audit logging

Contributing

  1. Fork the repository
  2. Create a feature branch
  3. Make your changes
  4. Run tests
  5. Submit a pull request

Guidelines:

  • Follow existing code style
  • Add tests for new features
  • Update documentation
  • Keep commits atomic

License

MIT

Recommended Servers

playwright-mcp

playwright-mcp

A Model Context Protocol server that enables LLMs to interact with web pages through structured accessibility snapshots without requiring vision models or screenshots.

Official
Featured
TypeScript
E2B

E2B

Using MCP to run code via e2b.

Official
Featured
Neon Database

Neon Database

MCP server for interacting with Neon Management API and databases

Official
Featured
Qdrant Server

Qdrant Server

This repository is an example of how to create a MCP server for Qdrant, a vector search engine.

Official
Featured
AIO-MCP Server

AIO-MCP Server

🚀 All-in-one MCP server with AI search, RAG, and multi-service integrations (GitLab/Jira/Confluence/YouTube) for AI-enhanced development workflows. Folk from

Featured
Local
React MCP

React MCP

react-mcp integrates with Claude Desktop, enabling the creation and modification of React apps based on user prompts

Featured
Local
Atlassian Integration

Atlassian Integration

Model Context Protocol (MCP) server for Atlassian Cloud products (Confluence and Jira). This integration is designed specifically for Atlassian Cloud instances and does not support Atlassian Server or Data Center deployments.

Featured
Any OpenAI Compatible API Integrations

Any OpenAI Compatible API Integrations

Integrate Claude with Any OpenAI SDK Compatible Chat Completion API - OpenAI, Perplexity, Groq, xAI, PyroPrompts and more.

Featured
Exa MCP

Exa MCP

A Model Context Protocol server that enables AI assistants like Claude to perform real-time web searches using the Exa AI Search API in a safe and controlled manner.

Featured
MySQL Server

MySQL Server

Allows AI assistants to list tables, read data, and execute SQL queries through a controlled interface, making database exploration and analysis safer and more structured.

Featured