You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/governance/blueprints/samples/iso27001-ase-sql-workload/control-mapping.md
+6-29Lines changed: 6 additions & 29 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -11,11 +11,7 @@ ms.topic: sample
11
11
The following article details how the Azure Blueprints ISO 27001 ASE/SQL Workload blueprint sample
12
12
maps to the ISO 27001 controls.
13
13
14
-
The following mappings are to the **ISO 27001:2013** controls. Use the navigation on the right to
15
-
jump directly to a specific control mapping. Many of the mapped controls are implemented with an [Azure Policy](../../../policy/overview.md)
16
-
initiative. To review the complete initiative, open **Policy** in the Azure portal and select the
17
-
**Definitions** page. Then, find and select the **\[Preview\] Audit ISO 27001:2013 controls and deploy
18
-
specific VM Extensions to support audit requirements** built-in policy initiative.
14
+
The following mappings are to the **ISO 27001:2013** controls. Use the navigation on the right to jump directly to a specific control mapping. Many of the mapped controls are implemented with an [Azure Policy](../../../policy/overview.md) initiative. To review the complete initiative, open **Policy** in the Azure portal and select the **Definitions** page. Then, find and select the **\[Preview\] Audit ISO 27001:2013 controls and deploy specific VM Extensions to support audit requirements** built-in policy initiative.
19
15
20
16
> [!IMPORTANT]
21
17
> Each control below is associated with one or more [Azure Policy](../../../policy/overview.md)
@@ -44,21 +40,13 @@ appropriate separation of duties.
can help you discover sensitive data stored in your databases and includes recommendations to
49
-
classify that data. This blueprint assigns an [Azure Policy](../../../policy/overview.md) definition
50
-
to audit that vulnerabilities identified during SQL Vulnerability Assessment scan are remediated.
43
+
Azure's [SQL Vulnerability Assessment service](../../../../defender-for-cloud/sql-azure-vulnerability-assessment-overview.md) can help you discover sensitive data stored in your databases and includes recommendations to classify that data. This blueprint assigns an [Azure Policy](../../../policy/overview.md) definition to audit that vulnerabilities identified during SQL Vulnerability Assessment scan are remediated.
51
44
52
45
- Vulnerabilities on your SQL databases should be remediated
53
46
54
47
## A.9.1.2 Access to networks and network services
55
48
56
-
Azure implements [Azure role-based access control (Azure RBAC)](../../../../role-based-access-control/overview.md)
57
-
to manage who has access to Azure resources. This blueprint helps you control access to Azure
58
-
resources by assigning seven [Azure Policy](../../../policy/overview.md) definitions. These policies
59
-
audit use of resource types and configurations that may allow more permissive access to resources.
60
-
Understanding resources that are in violation of these policies can help you take corrective actions
61
-
to ensure access Azure resources is restricted to authorized users.
49
+
Azure implements [Azure role-based access control (Azure RBAC)](../../../../role-based-access-control/overview.md) to manage who has access to Azure resources. This blueprint helps you control access to Azure resources by assigning seven [Azure Policy](../../../policy/overview.md) definitions. These policies audit use of resource types and configurations that may allow more permissive access to resources. Understanding resources that are in violation of these policies can help you take corrective actions to ensure access Azure resources is restricted to authorized users.
62
50
63
51
- Show audit results from Linux VMs that have accounts without passwords
64
52
- Show audit results from Linux VMs that allow remote connections from accounts without passwords
Azure implements [Azure role-based access control (Azure RBAC)](../../../../role-based-access-control/overview.md)
108
-
to help you manage who has access to resources in Azure. Using the Azure portal, you can
109
-
review who has access to Azure resources and their permissions. This blueprint assigns four [Azure
110
-
Policy](../../../policy/overview.md) definitions to audit accounts that should be prioritized for
111
-
review, including depreciated accounts and external accounts with elevated permissions.
95
+
Azure implements [Azure role-based access control (Azure RBAC)](../../../../role-based-access-control/overview.md) to help you manage who has access to resources in Azure. Using the Azure portal, you can review who has access to Azure resources and their permissions. This blueprint assigns four [Azure Policy](../../../policy/overview.md) definitions to audit accounts that should be prioritized for review, including depreciated accounts and external accounts with elevated permissions.
112
96
113
97
- Deprecated accounts should be removed from your subscription
114
98
- Deprecated accounts with owner permissions should be removed from your subscription
@@ -117,13 +101,7 @@ review, including depreciated accounts and external accounts with elevated permi
117
101
118
102
## A.9.2.6 Removal or adjustment of access rights
119
103
120
-
Azure implements [Azure role-based access control (Azure RBAC)](../../../../role-based-access-control/overview.md)
121
-
to help you manage who has access to resources in Azure. Using [Azure Active
122
-
Directory](../../../../active-directory/fundamentals/active-directory-whatis.md) and Azure RBAC, you can
123
-
update user roles to reflect organizational changes. When needed, accounts can be blocked from
124
-
signing in (or removed), which immediately removes access rights to Azure resources. This blueprint
125
-
assigns two [Azure Policy](../../../policy/overview.md) definitions to audit depreciated account
126
-
that should be considered for removal.
104
+
Azure implements [Azure role-based access control (Azure RBAC)](../../../../role-based-access-control/overview.md) to help you manage who has access to resources in Azure. Using [Azure Active Directory](../../../../active-directory/fundamentals/active-directory-whatis.md) and Azure RBAC, you can update user roles to reflect organizational changes. When needed, accounts can be blocked from signing in (or removed), which immediately removes access rights to Azure resources. This blueprint assigns two [Azure Policy](../../../policy/overview.md) definitions to audit depreciated account that should be considered for removal.
127
105
128
106
- Deprecated accounts should be removed from your subscription
129
107
- Deprecated accounts with owner permissions should be removed from your subscription
@@ -156,8 +134,7 @@ with policy.
156
134
157
135
## A.10.1.1 Policy on the use of cryptographic controls
158
136
159
-
This blueprint helps you enforce your policy on the use of cryptograph controls by assigning 13 [Azure Policy](../../../policy/overview.md)
160
-
definitions that enforce specific cryptograph controls and audit use of weak cryptographic settings.
137
+
This blueprint helps you enforce your policy on the use of cryptograph controls by assigning 13 [Azure Policy](../../../policy/overview.md) definitions that enforce specific cryptograph controls and audit use of weak cryptographic settings.
161
138
Understanding where your Azure resources may have non-optimal cryptographic configurations can help
162
139
you take corrective actions to ensure resources are configured in accordance with your information
163
140
security policy. Specifically, the policies assigned by this blueprint require encryption for blob
can help you discover sensitive data stored in your databases and includes recommendations to
51
-
classify that data. This blueprint assigns an [Azure Policy](../../../policy/overview.md) definition
52
-
to audit that vulnerabilities identified during SQL Vulnerability Assessment scan are remediated.
49
+
[SQL Vulnerability Assessment service](../../../../defender-for-cloud/sql-azure-vulnerability-assessment-overview.md) can help you discover sensitive data stored in your databases and includes recommendations to classify that data. This blueprint assigns an [Azure Policy](../../../policy/overview.md) definition to audit that vulnerabilities identified during SQL Vulnerability Assessment scan are remediated.
53
50
54
51
- Vulnerabilities on your SQL databases should be remediated
55
52
56
53
## A.9.1.2 Access to networks and network services
57
54
58
-
[Azure role-based access control (Azure RBAC)](../../../../role-based-access-control/overview.md)
59
-
helps to manage who has access to Azure resources. This blueprint helps you control access to Azure
60
-
resources by assigning seven [Azure Policy](../../../policy/overview.md) definitions. These policies
61
-
audit use of resource types and configurations that may allow more permissive access to resources.
62
-
Understanding resources that are in violation of these policies can help you take corrective actions
63
-
to ensure access Azure resources is restricted to authorized users.
55
+
[Azure role-based access control (Azure RBAC)](../../../../role-based-access-control/overview.md) helps to manage who has access to Azure resources. This blueprint helps you control access to Azure resources by assigning seven [Azure Policy](../../../policy/overview.md) definitions. These policies audit use of resource types and configurations that may allow more permissive access to resources. Understanding resources that are in violation of these policies can help you take corrective actions to ensure access Azure resources is restricted to authorized users.
64
56
65
57
- Show audit results from Linux VMs that have accounts without passwords
66
58
- Show audit results from Linux VMs that allow remote connections from accounts without passwords
[Azure role-based access control (Azure RBAC)](../../../../role-based-access-control/overview.md)
111
-
helps you manage who has access to resources in Azure. Using the Azure portal, you can review who
112
-
has access to Azure resources and their permissions. This blueprint assigns four [Azure
113
-
Policy](../../../policy/overview.md) definitions to audit accounts that should be prioritized for
114
-
review, including depreciated accounts and external accounts with elevated permissions.
102
+
[Azure role-based access control (Azure RBAC)](../../../../role-based-access-control/overview.md) helps you manage who has access to resources in Azure. Using the Azure portal, you can review who has access to Azure resources and their permissions. This blueprint assigns four [Azure Policy](../../../policy/overview.md) definitions to audit accounts that should be prioritized for review, including depreciated accounts and external accounts with elevated permissions.
115
103
116
104
- Deprecated accounts should be removed from your subscription
117
105
- Deprecated accounts with owner permissions should be removed from your subscription
@@ -120,13 +108,8 @@ review, including depreciated accounts and external accounts with elevated permi
120
108
121
109
## A.9.2.6 Removal or adjustment of access rights
122
110
123
-
[Azure role-based access control (Azure RBAC)](../../../../role-based-access-control/overview.md)
124
-
helps you manage who has access to resources in Azure. Using [Azure Active
125
-
Directory](../../../../active-directory/fundamentals/active-directory-whatis.md) and Azure RBAC, you
126
-
can update user roles to reflect organizational changes. When needed, accounts can be blocked from
127
-
signing in (or removed), which immediately removes access rights to Azure resources. This blueprint
128
-
assigns two [Azure Policy](../../../policy/overview.md) definitions to audit depreciated account
129
-
that should be considered for removal.
111
+
[Azure role-based access control (Azure RBAC)](../../../../role-based-access-control/overview.md) helps you manage who has access to resources in Azure. Using [Azure Active
112
+
Directory](../../../../active-directory/fundamentals/active-directory-whatis.md) and Azure RBAC, you can update user roles to reflect organizational changes. When needed, accounts can be blocked from signing in (or removed), which immediately removes access rights to Azure resources. This blueprint assigns two [Azure Policy](../../../policy/overview.md) definitions to audit depreciated account that should be considered for removal.
130
113
131
114
- Deprecated accounts should be removed from your subscription
132
115
- Deprecated accounts with owner permissions should be removed from your subscription
This blueprint helps you review accounts that may not comply with your organization's account
36
-
management requirements. This blueprint assigns [Azure Policy](../../../policy/overview.md)
37
-
definitions that audit external accounts with read, write and owner permissions on a subscription
38
-
and deprecated accounts. By reviewing the accounts audited by these policies, you can take
39
-
appropriate action to ensure account management requirements are met.
35
+
This blueprint helps you review accounts that may not comply with your organization's account management requirements. This blueprint assigns [Azure Policy](../../../policy/overview.md) definitions that audit external accounts with read, write and owner permissions on a subscription and deprecated accounts. By reviewing the accounts audited by these policies, you can take appropriate action to ensure account management requirements are met.
40
36
41
37
- Deprecated accounts should be removed from your subscription
42
38
- Deprecated accounts with owner permissions should be removed from your subscription
@@ -91,12 +87,7 @@ separation of duties.
91
87
92
88
## 1.3, 5.1, and 6.4 Least Privilege | Review of User Privileges
93
89
94
-
[Azure role-based access control (Azure RBAC)](../../../../role-based-access-control/overview.md)
95
-
helps you manage who has access to resources in Azure. Using the Azure portal, you can review who
96
-
has access to Azure resources and their permissions. This blueprint assigns
97
-
[Azure Policy](../../../policy/overview.md) definitions to audit accounts that should be prioritized
98
-
for review. Reviewing these account indicators can help you ensure least privilege controls are
99
-
implemented.
90
+
[Azure role-based access control (Azure RBAC)](../../../../role-based-access-control/overview.md) helps you manage who has access to resources in Azure. Using the Azure portal, you can review who has access to Azure resources and their permissions. This blueprint assigns [Azure Policy](../../../policy/overview.md) definitions to audit accounts that should be prioritized for review. Reviewing these account indicators can help you ensure least privilege controls are implemented.
100
91
101
92
- A maximum of 3 owners should be designated for your subscription
102
93
- Show audit results from Windows VMs that are not joined to the specified domain
@@ -210,12 +201,7 @@ been configured.
210
201
211
202
## 1.1 User-Installed Software
212
203
213
-
Adaptive application control in Azure Security Center is an intelligent, automated end-to-end
214
-
application filtering solution that can block or prevent specific software from running on your
215
-
virtual machines. Application control can help you enforce and monitor compliance with software
216
-
restriction policies. This blueprint assigns an [Azure Policy](../../../policy/overview.md)
217
-
definition that helps you monitor virtual machines where an application allowlist is recommended
218
-
but has not yet been configured.
204
+
Adaptive application control in Azure Security Center is an intelligent, automated end-to-end application filtering solution that can block or prevent specific software from running on your virtual machines. Application control can help you enforce and monitor compliance with software restriction policies. This blueprint assigns an [Azure Policy](../../../policy/overview.md) definition that helps you monitor virtual machines where an application allowlist is recommended but has not yet been configured.
219
205
220
206
- Adaptive application controls for defining safe applications should be enabled on your machines
221
207
- Virtual machines should be migrated to new Azure Resource Manager resources
Copy file name to clipboardExpand all lines: articles/governance/management-groups/azure-management.md
+1-5Lines changed: 1 addition & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -43,11 +43,7 @@ covers the different services used at [Monitoring Azure applications and resourc
43
43
44
44
## Configure
45
45
46
-
Configure refers to the initial deployment and configuration of resources and ongoing maintenance.
47
-
Automation of these tasks allows you to eliminate redundancy, minimizing your time and effort and
48
-
increasing your accuracy and efficiency. [Azure Automation](../../automation/overview.md)
49
-
provides the bulk of services for automating configuration tasks. While runbooks handle process
50
-
automation, configuration and update management help manage configuration.
46
+
Configure refers to the initial deployment and configuration of resources and ongoing maintenance. Automation of these tasks allows you to eliminate redundancy, minimizing your time and effort and increasing your accuracy and efficiency. [Azure Automation](../../automation/overview.md) provides the bulk of services for automating configuration tasks. While runbooks handle process automation, configuration and update management help manage configuration.
0 commit comments