Skip to content

Commit 2a0bd50

Browse files
authored
Merge pull request #105501 from msmbaldwin/security-baselines
Updates security baseline articles
2 parents 817fc81 + 724ae4a commit 2a0bd50

File tree

4 files changed

+202
-133
lines changed

4 files changed

+202
-133
lines changed

articles/batch/security-baseline.md

Lines changed: 58 additions & 38 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ manager: rkarlin
66

77
ms.service: security
88
ms.topic: conceptual
9-
ms.date: 02/22/2020
9+
ms.date: 02/28/2020
1010
ms.author: mbaldwin
1111
ms.custom: security-benchmark
1212

@@ -56,7 +56,7 @@ Understand Network Security provided by Azure Security Center:
5656

5757
https://docs.microsoft.com/azure/security-center/security-center-network-recommendations
5858

59-
**Azure Security Center monitoring**: Currently not available
59+
**Azure Security Center monitoring**: Yes
6060

6161
**Responsibility**: Customer
6262

@@ -273,7 +273,7 @@ How to remotely connect to your Azure Batch pool nodes:
273273

274274
https://docs.microsoft.com/azure/batch/batch-api-basics#error-handling
275275

276-
**Azure Security Center monitoring**: Currently not available
276+
**Azure Security Center monitoring**: Yes
277277

278278
**Responsibility**: Customer
279279

@@ -325,7 +325,7 @@ https://docs.microsoft.com/azure/batch/batch-diagnostics
325325

326326
**Guidance**: Use Windows Defender on your individual batch nodes in the case of Windows operating systems, or provide your own anti-malware solution if you are using Linux.
327327

328-
**Azure Security Center monitoring**: Currently not available
328+
**Azure Security Center monitoring**: Yes
329329

330330
**Responsibility**: Customer
331331

@@ -468,7 +468,7 @@ How to monitor users identity and access activity in Azure Security Center:
468468

469469
https://docs.microsoft.com/azure/security-center/security-center-identity-access
470470

471-
**Azure Security Center monitoring**: Currently not available
471+
**Azure Security Center monitoring**: Yes
472472

473473
**Responsibility**: Customer
474474

@@ -513,7 +513,7 @@ How to use Azure Identity Access Reviews:
513513

514514
https://docs.microsoft.com/azure/active-directory/governance/access-reviews-overview
515515

516-
**Azure Security Center monitoring**: Currently not available
516+
**Azure Security Center monitoring**: Yes
517517

518518
**Responsibility**: Customer
519519

@@ -526,7 +526,7 @@ How to integrate Azure Activity Logs into Azure Monitor:
526526

527527
https://docs.microsoft.com/azure/active-directory/reports-monitoring/howto-integrate-activity-logs-with-log-analytics
528528

529-
**Azure Security Center monitoring**: Currently not available
529+
**Azure Security Center monitoring**: Yes
530530

531531
**Responsibility**: Customer
532532

@@ -553,7 +553,7 @@ https://docs.microsoft.com/azure/sentinel/quickstart-onboard
553553

554554
**Responsibility**: Customer
555555

556-
### 3.13: Provide Microsoft with access to relevant customer data during support scenarios
556+
### 3.13: <div>Provide Microsoft with access to relevant customer data during support scenarios<br></div>
557557

558558
**Guidance**: Not available; Customer Lockbox not yet supported for Azure Batch. List of Customer Lockbox supported services: https://docs.microsoft.com/azure/security/fundamentals/customer-lockbox-overview#supported-services-and-scenarios-in-general-availability
559559

@@ -616,9 +616,9 @@ How to secure Azure Storage Accounts:
616616

617617
https://docs.microsoft.com/azure/storage/common/storage-security-guide
618618

619-
**Azure Security Center monitoring**: Yes
619+
**Azure Security Center monitoring**: Currently not available
620620

621-
**Responsibility**: Customer
621+
**Responsibility**: Shared
622622

623623
### 4.4: Encrypt all sensitive information in transit
624624

@@ -656,7 +656,7 @@ How to secure Azure Storage Accounts:
656656

657657
https://docs.microsoft.com/azure/storage/common/storage-security-guide
658658

659-
**Azure Security Center monitoring**: Yes
659+
**Azure Security Center monitoring**: Currently not available
660660

661661
**Responsibility**: Shared
662662

@@ -692,7 +692,7 @@ Understand customer data protection in Azure:
692692

693693
https://docs.microsoft.com/azure/security/fundamentals/protection-customer-data
694694

695-
**Azure Security Center monitoring**: Yes
695+
**Azure Security Center monitoring**: Currently not available
696696

697697
**Responsibility**: Shared
698698

@@ -706,7 +706,7 @@ How to manage encryption keys for Azure Storage Accounts:
706706

707707
https://docs.microsoft.com/azure/storage/common/storage-encryption-keys-portal
708708

709-
**Azure Security Center monitoring**: Currently not available
709+
**Azure Security Center monitoring**: Yes
710710

711711
**Responsibility**: Customer
712712

@@ -730,7 +730,7 @@ How to enable additional logging/auditing for an Azure Storage Account:
730730

731731
https://docs.microsoft.com/azure/storage/common/storage-monitor-storage-account
732732

733-
**Azure Security Center monitoring**: Currently not available
733+
**Azure Security Center monitoring**: Yes
734734

735735
**Responsibility**: Customer
736736

@@ -753,7 +753,7 @@ Optionally, if you have a Rapid7, Qualys, or any other vulnerability management
753753

754754
**Guidance**: Microsoft to maintain and update base Azure Batch Pool node images. Ensure Azure Batch Pool nodes' operating system remains patched for the duration of the cluster lifetime which may require enabling automatic updates, monitoring the nodes, or performing periodic reboots.
755755

756-
**Azure Security Center monitoring**: Currently not available
756+
**Azure Security Center monitoring**: Yes
757757

758758
**Responsibility**: Shared
759759

@@ -790,7 +790,7 @@ Optionally, if you have a Rapid7, Qualys, or any other vulnerability management
790790
**Guidance**: Use Azure Resource Graph to query/discover all resources (such as compute, storage, network, etc.) within your subscription(s). Ensure that you have appropriate (read) permissions in your tenant and are able to enumerate all Azure subscriptions as well as resources within your subscriptions.
791791

792792

793-
Although classic Azure resources may be discovered via Resource Graph, it is highly recommended to create and use Azure Resource Manager resources going forward.
793+
Although classic Azure resources may be discovered via Resource Graph, it is highly recommended to create and use Azure Resource Manager (ARM) resources going forward.
794794

795795

796796
How to create queries with Azure Graph:
@@ -865,10 +865,13 @@ https://docs.microsoft.com/azure/azure-resource-manager/resource-group-using-tag
865865
- Not allowed resource types
866866
- Allowed resource types
867867

868+
868869
Use Azure Resource Graph to query/discover resources within your subscription(s). Ensure that all Azure resources present in the environment are approved.
869870

871+
870872
How to configure and manage Azure Policy: https://docs.microsoft.com/azure/governance/policy/tutorials/create-and-manage
871873

874+
872875
How to create queries with Azure Graph: https://docs.microsoft.com/azure/governance/resource-graph/first-query-portal
873876

874877
**Azure Security Center monitoring**: Currently not available
@@ -903,16 +906,15 @@ How to create queries with Azure Graph: https://docs.microsoft.com/azure/governa
903906

904907
**Guidance**: Use Azure policy to put restrictions on the type of resources that can be created in customer subscription(s) using the following built-in policy definitions:
905908

909+
906910
- Not allowed resource types
907911
- Allowed resource types
908912

909-
How to configure and manage Azure Policy:
910913

911-
https://docs.microsoft.com/azure/governance/policy/tutorials/create-and-manage
914+
How to configure and manage Azure Policy: https://docs.microsoft.com/azure/governance/policy/tutorials/create-and-manage
912915

913-
How to deny a specific resource type with Azure Policy:
914916

915-
https://docs.microsoft.com/azure/governance/policy/samples/not-allowed-resource-types
917+
How to deny a specific resource type with Azure Policy: https://docs.microsoft.com/azure/governance/policy/samples/not-allowed-resource-types
916918

917919
**Azure Security Center monitoring**: Currently not available
918920

@@ -926,14 +928,12 @@ https://docs.microsoft.com/azure/governance/policy/samples/not-allowed-resource-
926928

927929
**Responsibility**: Customer
928930

929-
### 6.11: Limit Users' Ability to interact with Azure Resource Manager via Scripts
931+
### 6.11: <div>Limit Users' Ability to interact with Azure Resource Manager via Scripts</div>
930932

931933
**Guidance**: Use Azure Conditional Access to limit users' ability to interact with Azure Resource Manager by configuring "Block access" for the "Microsoft Azure Management" App.
932934

933935

934-
How to configure Conditional Access to block access to Azure Resource Manager:
935-
936-
https://docs.microsoft.com/azure/role-based-access-control/conditional-access-azure-management
936+
How to configure Conditional Access to block access to Azure Resource Manager: https://docs.microsoft.com/azure/role-based-access-control/conditional-access-azure-management
937937

938938
**Azure Security Center monitoring**: Currently not available
939939

@@ -951,8 +951,7 @@ This is not applicable to Azure Batch, as users (non-administrators) of the Azur
951951

952952
### 6.13: Physically or Logically Segregate High Risk Applications
953953

954-
**Guidance**: Not available,
955-
954+
**Guidance**: Not applicable,
956955
Benchmark is intended for web applications running on Azure App Service or IaaS instances.
957956

958957
**Azure Security Center monitoring**: Not applicable
@@ -968,10 +967,14 @@ Benchmark is intended for web applications running on Azure App Service or IaaS
968967
**Guidance**: Use Azure Policy aliases in the "Microsoft.Batch" namespace to create custom policies to audit or enforce the configuration of your Azure Batch accounts and pools.
969968

970969

971-
How to view available Azure Policy Aliases: https://docs.microsoft.com/powershell/module/az.resources/get-azpolicyalias?view=azps-3.3.0
970+
How to view available Azure Policy Aliases:
972971

972+
https://docs.microsoft.com/powershell/module/az.resources/get-azpolicyalias?view=azps-3.3.0
973973

974-
How to configure and manage Azure Policy: https://docs.microsoft.com/azure/governance/policy/tutorials/create-and-manage
974+
975+
How to configure and manage Azure Policy:
976+
977+
https://docs.microsoft.com/azure/governance/policy/tutorials/create-and-manage
975978

976979
**Azure Security Center monitoring**: Not applicable
977980

@@ -993,8 +996,10 @@ How to configure and manage Azure Policy: https://docs.microsoft.com/azure/gover
993996
- Microsoft.Storage
994997
- Microsoft.Network
995998

999+
9961000
How to configure and manage Azure Policy: https://docs.microsoft.com/azure/governance/policy/tutorials/create-and-manage
9971001

1002+
9981003
Understand Azure Policy Effects: https://docs.microsoft.com/azure/governance/policy/concepts/effects
9991004

10001005
**Azure Security Center monitoring**: Not applicable
@@ -1011,11 +1016,17 @@ Understand Azure Policy Effects: https://docs.microsoft.com/azure/governance/pol
10111016

10121017
### 7.5: Securely Store Configuration of Azure Resources
10131018

1014-
**Guidance**: If using custom Azure policy definitions for your Azure Batch accounts, pools, or related resources, use Azure DevOps/Repos to securely store and manage your code.
1019+
**Guidance**: If using custom Azure policy definitions for your Azure Batch accounts, pools, or related resources, use Azure Repos to securely store and manage your code.
1020+
1021+
1022+
How to store code in Azure DevOps:
10151023

1016-
How to store code in Azure DevOps: https://docs.microsoft.com/azure/devops/repos/git/gitworkflow?view=azure-devops
1024+
https://docs.microsoft.com/azure/devops/repos/git/gitworkflow?view=azure-devops
10171025

1018-
Azure Repos Documentation: https://docs.microsoft.com/azure/devops/repos/index?view=azure-devops
1026+
1027+
Azure Repos Documentation:
1028+
1029+
https://docs.microsoft.com/azure/devops/repos/index?view=azure-devops
10191030

10201031
**Azure Security Center monitoring**: Not applicable
10211032

@@ -1026,9 +1037,14 @@ Azure Repos Documentation: https://docs.microsoft.com/azure/devops/repos/index?v
10261037
**Guidance**: If using custom images for your Azure Batch pools, use Role-based access control (RBAC) to ensure only authorized users may access the images.
10271038

10281039

1029-
Understand RBAC in Azure: https://docs.microsoft.com/azure/role-based-access-control/rbac-and-directory-admin-roles
1040+
Understand RBAC in Azure:
1041+
1042+
https://docs.microsoft.com/azure/role-based-access-control/rbac-and-directory-admin-roles
1043+
10301044

1031-
How to configure RBAC in Azure: https://docs.microsoft.com/azure/role-based-access-control/quickstart-assign-role-user-portal
1045+
How to configure RBAC in Azure:
1046+
1047+
https://docs.microsoft.com/azure/role-based-access-control/quickstart-assign-role-user-portal
10321048

10331049
**Azure Security Center monitoring**: Currently not available
10341050

@@ -1061,7 +1077,7 @@ https://docs.microsoft.com/azure/governance/policy/tutorials/create-and-manage
10611077
**Guidance**: Use Azure Policy aliases in the "Microsoft.Batch" namespace to create custom policies to audit or enforce the configuration of your Azure Batch instance. You may also use any built-in policies created specifically for Azure Batch or the resources used by Azure Batch, such as:
10621078

10631079
- Subnets should be associated with a Network Security Group
1064-
- Storage Accounts should use a virtual network service endpoint
1080+
-Storage Accounts should use a virtual network service endpoint
10651081
- Diagnostic logs in Batch accounts should be enabled
10661082

10671083
How to view available Azure Policy Aliases: https://docs.microsoft.com/powershell/module/az.resources/get-azpolicyalias?view=azps-3.3.0
@@ -1100,7 +1116,7 @@ How to provide Key Vault authentication with a managed identity:
11001116

11011117
https://docs.microsoft.com/azure/key-vault/managed-identity
11021118

1103-
**Azure Security Center monitoring**: Currently not available
1119+
**Azure Security Center monitoring**: Yes
11041120

11051121
**Responsibility**: Customer
11061122

@@ -1190,7 +1206,7 @@ How to backup key vault keys in Azure:
11901206

11911207
https://docs.microsoft.com/powershell/module/azurerm.keyvault/backup-azurekeyvaultkey?view=azurermps-6.13.0
11921208

1193-
**Azure Security Center monitoring**: Currently not available
1209+
**Azure Security Center monitoring**: Yes
11941210

11951211
**Responsibility**: Customer
11961212

@@ -1208,7 +1224,7 @@ How to restore a Customer Managed Key with PowerShell:
12081224

12091225
https://docs.microsoft.com/powershell/module/azurerm.keyvault/restore-azurekeyvaultkey?view=azurermps-6.13.0
12101226

1211-
**Azure Security Center monitoring**: Currently not available
1227+
**Azure Security Center monitoring**: Not applicable
12121228

12131229
**Responsibility**: Customer
12141230

@@ -1221,7 +1237,7 @@ How to enable Soft Delete in Azure Key Vault:
12211237

12221238
https://docs.microsoft.com/azure/key-vault/key-vault-soft-delete-powershell
12231239

1224-
**Azure Security Center monitoring**: Currently not available
1240+
**Azure Security Center monitoring**: Yes
12251241

12261242
**Responsibility**: Customer
12271243

@@ -1328,3 +1344,7 @@ https://gallery.technet.microsoft.com/Cloud-Red-Teaming-b837392e
13281344

13291345
**Responsibility**: Shared
13301346

1347+
## Next steps
1348+
1349+
- See the [Azure Security Benchmark](https://docs.microsoft.com/azure/security/benchmarks/overview)
1350+
- Learn more about [Azure Security Baselines](https://docs.microsoft.com/azure/security/benchmarks/security-baselines-overview)

0 commit comments

Comments
 (0)