You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/governance/policy/samples/australia-ism.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,7 +1,7 @@
1
1
---
2
2
title: Regulatory Compliance details for Australian Government ISM PROTECTED
3
3
description: Details of the Australian Government ISM PROTECTED Regulatory Compliance built-in initiative. Each control is mapped to one or more Azure Policy definitions that assist with assessment.
4
-
ms.date: 05/01/2024
4
+
ms.date: 05/24/2024
5
5
ms.topic: sample
6
6
ms.custom: generated
7
7
---
@@ -11,7 +11,7 @@ The following article details how the Azure Policy Regulatory Compliance built-i
11
11
definition maps to **compliance domains** and **controls** in Australian Government ISM PROTECTED.
12
12
For more information about this compliance standard, see
13
13
[Australian Government ISM PROTECTED](https://www.cyber.gov.au/acsc/view-all-content/ism). To understand
14
-
_Ownership_, see [Azure Policy policy definition](../concepts/definition-structure.md#policy-type) and
14
+
_Ownership_, review the [policy type](../concepts/definition-structure-basics.md#policy-type) and
15
15
[Shared responsibility in the cloud](../../../security/fundamentals/shared-responsibility.md).
16
16
17
17
The following mappings are to the **Australian Government ISM PROTECTED** controls. Many of the controls
Copy file name to clipboardExpand all lines: articles/governance/policy/samples/azure-security-benchmark.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,7 +1,7 @@
1
1
---
2
2
title: Regulatory Compliance details for Microsoft cloud security benchmark
3
3
description: Details of the Microsoft cloud security benchmark Regulatory Compliance built-in initiative. Each control is mapped to one or more Azure Policy definitions that assist with assessment.
4
-
ms.date: 05/01/2024
4
+
ms.date: 05/24/2024
5
5
ms.topic: sample
6
6
ms.custom: generated
7
7
---
@@ -11,7 +11,7 @@ The following article details how the Azure Policy Regulatory Compliance built-i
11
11
definition maps to **compliance domains** and **controls** in Microsoft cloud security benchmark.
12
12
For more information about this compliance standard, see
13
13
[Microsoft cloud security benchmark](/security/benchmark/azure/introduction). To understand
14
-
_Ownership_, see [Azure Policy policy definition](../concepts/definition-structure.md#policy-type) and
14
+
_Ownership_, review the [policy type](../concepts/definition-structure-basics.md#policy-type) and
15
15
[Shared responsibility in the cloud](../../../security/fundamentals/shared-responsibility.md).
16
16
17
17
The following mappings are to the **Microsoft cloud security benchmark** controls. Many of the controls
|[Email notification for high severity alerts should be enabled](https://portal.azure.com/#blade/Microsoft_Azure_Policy/PolicyDetailBlade/definitionId/%2Fproviders%2FMicrosoft.Authorization%2FpolicyDefinitions%2F6e2593d9-add6-4083-9c9b-4b7d2188c899)|To ensure the relevant people in your organization are notified when there is a potential security breach in one of your subscriptions, enable email notifications for high severity alerts in Security Center. |AuditIfNotExists, Disabled |[1.1.0](https://github.com/Azure/azure-policy/blob/master/built-in-policies/policyDefinitions/Security%20Center/ASC_Email_notification.json)|
536
+
|[Email notification for high severity alerts should be enabled](https://portal.azure.com/#blade/Microsoft_Azure_Policy/PolicyDetailBlade/definitionId/%2Fproviders%2FMicrosoft.Authorization%2FpolicyDefinitions%2F6e2593d9-add6-4083-9c9b-4b7d2188c899)|To ensure the relevant people in your organization are notified when there is a potential security breach in one of your subscriptions, enable email notifications for high severity alerts in Security Center. |AuditIfNotExists, Disabled |[1.2.0](https://github.com/Azure/azure-policy/blob/master/built-in-policies/policyDefinitions/Security%20Center/ASC_Email_notification.json)|
537
537
|[Email notification to subscription owner for high severity alerts should be enabled](https://portal.azure.com/#blade/Microsoft_Azure_Policy/PolicyDetailBlade/definitionId/%2Fproviders%2FMicrosoft.Authorization%2FpolicyDefinitions%2F0b15565f-aa9e-48ba-8619-45960f2c314d)|To ensure your subscription owners are notified when there is a potential security breach in their subscription, set email notifications to subscription owners for high severity alerts in Security Center. |AuditIfNotExists, Disabled |[2.1.0](https://github.com/Azure/azure-policy/blob/master/built-in-policies/policyDefinitions/Security%20Center/ASC_Email_notification_to_subscription_owner.json)|
538
538
|[Subscriptions should have a contact email address for security issues](https://portal.azure.com/#blade/Microsoft_Azure_Policy/PolicyDetailBlade/definitionId/%2Fproviders%2FMicrosoft.Authorization%2FpolicyDefinitions%2F4f4f78b8-e367-4b10-a341-d9a4ad5cf1c7)|To ensure the relevant people in your organization are notified when there is a potential security breach in one of your subscriptions, set a security contact to receive email notifications from Security Center. |AuditIfNotExists, Disabled |[1.0.1](https://github.com/Azure/azure-policy/blob/master/built-in-policies/policyDefinitions/Security%20Center/ASC_Security_contact_email.json)|
Copy file name to clipboardExpand all lines: articles/governance/policy/samples/canada-federal-pbmm.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,7 +1,7 @@
1
1
---
2
2
title: Regulatory Compliance details for Canada Federal PBMM
3
3
description: Details of the Canada Federal PBMM Regulatory Compliance built-in initiative. Each control is mapped to one or more Azure Policy definitions that assist with assessment.
4
-
ms.date: 05/01/2024
4
+
ms.date: 05/24/2024
5
5
ms.topic: sample
6
6
ms.custom: generated
7
7
---
@@ -11,7 +11,7 @@ The following article details how the Azure Policy Regulatory Compliance built-i
11
11
definition maps to **compliance domains** and **controls** in Canada Federal PBMM.
12
12
For more information about this compliance standard, see
13
13
[Canada Federal PBMM](https://www.canada.ca/en/government/system/digital-government/digital-government-innovations/cloud-services/government-canada-security-control-profile-cloud-based-it-services.html). To understand
14
-
_Ownership_, see [Azure Policy policy definition](../concepts/definition-structure.md#policy-type) and
14
+
_Ownership_, review the [policy type](../concepts/definition-structure-basics.md#policy-type) and
15
15
[Shared responsibility in the cloud](../../../security/fundamentals/shared-responsibility.md).
16
16
17
17
The following mappings are to the **Canada Federal PBMM** controls. Many of the controls
Copy file name to clipboardExpand all lines: articles/governance/policy/samples/cis-azure-1-1-0.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,7 +1,7 @@
1
1
---
2
2
title: Regulatory Compliance details for CIS Microsoft Azure Foundations Benchmark 1.1.0
3
3
description: Details of the CIS Microsoft Azure Foundations Benchmark 1.1.0 Regulatory Compliance built-in initiative. Each control is mapped to one or more Azure Policy definitions that assist with assessment.
4
-
ms.date: 05/01/2024
4
+
ms.date: 05/24/2024
5
5
ms.topic: sample
6
6
ms.custom: generated
7
7
---
@@ -11,7 +11,7 @@ The following article details how the Azure Policy Regulatory Compliance built-i
11
11
definition maps to **compliance domains** and **controls** in CIS Microsoft Azure Foundations Benchmark 1.1.0.
12
12
For more information about this compliance standard, see
13
13
[CIS Microsoft Azure Foundations Benchmark 1.1.0](https://www.cisecurity.org/benchmark/azure/). To understand
14
-
_Ownership_, see [Azure Policy policy definition](../concepts/definition-structure.md#policy-type) and
14
+
_Ownership_, review the [policy type](../concepts/definition-structure-basics.md#policy-type) and
15
15
[Shared responsibility in the cloud](../../../security/fundamentals/shared-responsibility.md).
16
16
17
17
The following mappings are to the **CIS Microsoft Azure Foundations Benchmark 1.1.0** controls. Many of the controls
|[Email notification for high severity alerts should be enabled](https://portal.azure.com/#blade/Microsoft_Azure_Policy/PolicyDetailBlade/definitionId/%2Fproviders%2FMicrosoft.Authorization%2FpolicyDefinitions%2F6e2593d9-add6-4083-9c9b-4b7d2188c899)|To ensure the relevant people in your organization are notified when there is a potential security breach in one of your subscriptions, enable email notifications for high severity alerts in Security Center. |AuditIfNotExists, Disabled |[1.1.0](https://github.com/Azure/azure-policy/blob/master/built-in-policies/policyDefinitions/Security%20Center/ASC_Email_notification.json)|
421
+
|[Email notification for high severity alerts should be enabled](https://portal.azure.com/#blade/Microsoft_Azure_Policy/PolicyDetailBlade/definitionId/%2Fproviders%2FMicrosoft.Authorization%2FpolicyDefinitions%2F6e2593d9-add6-4083-9c9b-4b7d2188c899)|To ensure the relevant people in your organization are notified when there is a potential security breach in one of your subscriptions, enable email notifications for high severity alerts in Security Center. |AuditIfNotExists, Disabled |[1.2.0](https://github.com/Azure/azure-policy/blob/master/built-in-policies/policyDefinitions/Security%20Center/ASC_Email_notification.json)|
422
422
423
423
### Ensure that 'Send email also to subscription owners' is set to 'On'
Copy file name to clipboardExpand all lines: articles/governance/policy/samples/cis-azure-1-3-0.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,7 +1,7 @@
1
1
---
2
2
title: Regulatory Compliance details for CIS Microsoft Azure Foundations Benchmark 1.3.0
3
3
description: Details of the CIS Microsoft Azure Foundations Benchmark 1.3.0 Regulatory Compliance built-in initiative. Each control is mapped to one or more Azure Policy definitions that assist with assessment.
4
-
ms.date: 05/01/2024
4
+
ms.date: 05/24/2024
5
5
ms.topic: sample
6
6
ms.custom: generated
7
7
---
@@ -11,7 +11,7 @@ The following article details how the Azure Policy Regulatory Compliance built-i
11
11
definition maps to **compliance domains** and **controls** in CIS Microsoft Azure Foundations Benchmark 1.3.0.
12
12
For more information about this compliance standard, see
13
13
[CIS Microsoft Azure Foundations Benchmark 1.3.0](https://www.cisecurity.org/benchmark/azure/). To understand
14
-
_Ownership_, see [Azure Policy policy definition](../concepts/definition-structure.md#policy-type) and
14
+
_Ownership_, review the [policy type](../concepts/definition-structure-basics.md#policy-type) and
15
15
[Shared responsibility in the cloud](../../../security/fundamentals/shared-responsibility.md).
16
16
17
17
The following mappings are to the **CIS Microsoft Azure Foundations Benchmark 1.3.0** controls. Many of the controls
|[Email notification for high severity alerts should be enabled](https://portal.azure.com/#blade/Microsoft_Azure_Policy/PolicyDetailBlade/definitionId/%2Fproviders%2FMicrosoft.Authorization%2FpolicyDefinitions%2F6e2593d9-add6-4083-9c9b-4b7d2188c899)|To ensure the relevant people in your organization are notified when there is a potential security breach in one of your subscriptions, enable email notifications for high severity alerts in Security Center. |AuditIfNotExists, Disabled |[1.1.0](https://github.com/Azure/azure-policy/blob/master/built-in-policies/policyDefinitions/Security%20Center/ASC_Email_notification.json)|
406
+
|[Email notification for high severity alerts should be enabled](https://portal.azure.com/#blade/Microsoft_Azure_Policy/PolicyDetailBlade/definitionId/%2Fproviders%2FMicrosoft.Authorization%2FpolicyDefinitions%2F6e2593d9-add6-4083-9c9b-4b7d2188c899)|To ensure the relevant people in your organization are notified when there is a potential security breach in one of your subscriptions, enable email notifications for high severity alerts in Security Center. |AuditIfNotExists, Disabled |[1.2.0](https://github.com/Azure/azure-policy/blob/master/built-in-policies/policyDefinitions/Security%20Center/ASC_Email_notification.json)|
407
407
408
408
### Ensure that Azure Defender is set to On for App Service
Copy file name to clipboardExpand all lines: articles/governance/policy/samples/cis-azure-1-4-0.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,7 +1,7 @@
1
1
---
2
2
title: Regulatory Compliance details for CIS Microsoft Azure Foundations Benchmark 1.4.0
3
3
description: Details of the CIS Microsoft Azure Foundations Benchmark 1.4.0 Regulatory Compliance built-in initiative. Each control is mapped to one or more Azure Policy definitions that assist with assessment.
4
-
ms.date: 05/01/2024
4
+
ms.date: 05/24/2024
5
5
ms.topic: sample
6
6
ms.custom: generated
7
7
---
@@ -11,7 +11,7 @@ The following article details how the Azure Policy Regulatory Compliance built-i
11
11
definition maps to **compliance domains** and **controls** in CIS Microsoft Azure Foundations Benchmark 1.4.0.
12
12
For more information about this compliance standard, see
13
13
[CIS Microsoft Azure Foundations Benchmark 1.4.0](https://www.cisecurity.org/benchmark/azure/). To understand
14
-
_Ownership_, see [Azure Policy policy definition](../concepts/definition-structure.md#policy-type) and
14
+
_Ownership_, review the [policy type](../concepts/definition-structure-basics.md#policy-type) and
15
15
[Shared responsibility in the cloud](../../../security/fundamentals/shared-responsibility.md).
16
16
17
17
The following mappings are to the **CIS Microsoft Azure Foundations Benchmark 1.4.0** controls. Many of the controls
|[Email notification for high severity alerts should be enabled](https://portal.azure.com/#blade/Microsoft_Azure_Policy/PolicyDetailBlade/definitionId/%2Fproviders%2FMicrosoft.Authorization%2FpolicyDefinitions%2F6e2593d9-add6-4083-9c9b-4b7d2188c899)|To ensure the relevant people in your organization are notified when there is a potential security breach in one of your subscriptions, enable email notifications for high severity alerts in Security Center. |AuditIfNotExists, Disabled |[1.1.0](https://github.com/Azure/azure-policy/blob/master/built-in-policies/policyDefinitions/Security%20Center/ASC_Email_notification.json)|
390
+
|[Email notification for high severity alerts should be enabled](https://portal.azure.com/#blade/Microsoft_Azure_Policy/PolicyDetailBlade/definitionId/%2Fproviders%2FMicrosoft.Authorization%2FpolicyDefinitions%2F6e2593d9-add6-4083-9c9b-4b7d2188c899)|To ensure the relevant people in your organization are notified when there is a potential security breach in one of your subscriptions, enable email notifications for high severity alerts in Security Center. |AuditIfNotExists, Disabled |[1.2.0](https://github.com/Azure/azure-policy/blob/master/built-in-policies/policyDefinitions/Security%20Center/ASC_Email_notification.json)|
391
391
392
392
### Ensure that Microsoft Defender for App Service is set to 'On'
Copy file name to clipboardExpand all lines: articles/governance/policy/samples/cis-azure-2-0-0.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,7 +1,7 @@
1
1
---
2
2
title: Regulatory Compliance details for CIS Microsoft Azure Foundations Benchmark 2.0.0
3
3
description: Details of the CIS Microsoft Azure Foundations Benchmark 2.0.0 Regulatory Compliance built-in initiative. Each control is mapped to one or more Azure Policy definitions that assist with assessment.
4
-
ms.date: 05/01/2024
4
+
ms.date: 05/24/2024
5
5
ms.topic: sample
6
6
ms.custom: generated
7
7
---
@@ -11,7 +11,7 @@ The following article details how the Azure Policy Regulatory Compliance built-i
11
11
definition maps to **compliance domains** and **controls** in CIS Microsoft Azure Foundations Benchmark 2.0.0.
12
12
For more information about this compliance standard, see
13
13
[CIS Microsoft Azure Foundations Benchmark 2.0.0](https://www.cisecurity.org/benchmark/azure/). To understand
14
-
_Ownership_, see [Azure Policy policy definition](../concepts/definition-structure.md#policy-type) and
14
+
_Ownership_, review the [policy type](../concepts/definition-structure-basics.md#policy-type) and
15
15
[Shared responsibility in the cloud](../../../security/fundamentals/shared-responsibility.md).
16
16
17
17
The following mappings are to the **CIS Microsoft Azure Foundations Benchmark 2.0.0** controls. Many of the controls
|[Email notification for high severity alerts should be enabled](https://portal.azure.com/#blade/Microsoft_Azure_Policy/PolicyDetailBlade/definitionId/%2Fproviders%2FMicrosoft.Authorization%2FpolicyDefinitions%2F6e2593d9-add6-4083-9c9b-4b7d2188c899)|To ensure the relevant people in your organization are notified when there is a potential security breach in one of your subscriptions, enable email notifications for high severity alerts in Security Center. |AuditIfNotExists, Disabled |[1.1.0](https://github.com/Azure/azure-policy/blob/master/built-in-policies/policyDefinitions/Security%20Center/ASC_Email_notification.json)|
466
+
|[Email notification for high severity alerts should be enabled](https://portal.azure.com/#blade/Microsoft_Azure_Policy/PolicyDetailBlade/definitionId/%2Fproviders%2FMicrosoft.Authorization%2FpolicyDefinitions%2F6e2593d9-add6-4083-9c9b-4b7d2188c899)|To ensure the relevant people in your organization are notified when there is a potential security breach in one of your subscriptions, enable email notifications for high severity alerts in Security Center. |AuditIfNotExists, Disabled |[1.2.0](https://github.com/Azure/azure-policy/blob/master/built-in-policies/policyDefinitions/Security%20Center/ASC_Email_notification.json)|
467
467
468
468
### Ensure that Microsoft Defender for Cloud Apps integration with Microsoft Defender for Cloud is Selected
0 commit comments