Skip to content

Commit 405919c

Browse files
Merge pull request #106859 from Selcin/master
Updated DoD IL4 blueprint Doc
2 parents 1ac34c4 + b610d4e commit 405919c

File tree

3 files changed

+79
-8
lines changed

3 files changed

+79
-8
lines changed

articles/governance/blueprints/samples/dod-impact-level-4/control-mapping.md

Lines changed: 74 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: DoD Impact Level 4 blueprint sample controls
33
description: Control mapping of the DoD Impact Level 4 blueprint sample. Each control is mapped to one or more Azure Policies that assist with assessment.
4-
ms.date: 02/09/2020
4+
ms.date: 03/06/2020
55
ms.topic: sample
66
---
77
# Control mapping of the DoD Impact Level 4 blueprint sample
@@ -131,6 +131,22 @@ indicators can help you ensure remote access methods comply with your security p
131131
- Remote debugging should be turned off for Function App
132132
- Remote debugging should be turned off for Web Application
133133

134+
## AC-23 Data Mining
135+
136+
This blueprint provides policy definitions that help you ensure data security notifications are
137+
properly enabled. In addition, this blueprint ensures that auditing and advanced data security are
138+
configured on SQL Servers.
139+
140+
- Advanced data security should be enabled on your SQL servers
141+
- Advanced data security should be enabled on your SQL managed instances
142+
- Advanced Threat Protection types should be set to 'All' in SQL server Advanced Data Security settings
143+
- Advanced Threat Protection types should be set to 'All' in SQL managed instance Advanced Data Security settings
144+
- Auditing should be enabled on advanced data security settings on SQL Server
145+
- Email notifications to admins and subscription owners should be enabled in SQL server advanced data security settings
146+
- Email notifications to admins and subscription owners should be enabled in SQL managed instance advanced data security settings
147+
- Advanced data security settings for SQL server should contain an email address to receive security alerts
148+
- Advanced data security settings for SQL managed instance should contain an email address to receive security alerts
149+
134150
## AU-3 (2) Content of Audit Records | Centralized Management of Planned Audit Record Content
135151

136152
Log data collected by Azure Monitor is stored in a Log Analytics workspace enabling centralized
@@ -183,8 +199,6 @@ For detailed vulnerability scanning and monitoring, we recommend you leverage Az
183199
Azure Security Center as well.
184200

185201
- \[Preview\]: Vulnerability Assessment should be enabled on Virtual Machines
186-
- \[Preview\]: Enable Azure Monitor for VMs
187-
- \[Preview\]: Enable Azure Monitor for VM Scale Sets (VMSS)
188202
- Vulnerability assessment should be enabled on your SQL servers
189203
- Audit diagnostic setting
190204
- Vulnerability assessment should be enabled on your SQL managed instances
@@ -193,6 +207,8 @@ Azure Security Center as well.
193207
- Vulnerabilities on your SQL databases should be remediated
194208
- Vulnerabilities should be remediated by a Vulnerability Assessment solution
195209
- Vulnerabilities in security configuration on your virtual machine scale sets should be remediated
210+
- \[Preview\]: Audit Log Analytics Agent Deployment - VM Image (OS) unlisted
211+
- \[Preview\]: Audit Log Analytics Agent Deployment in VMSS - VM Image (OS) unlisted
196212

197213
## AU-12 Audit Generation
198214

@@ -340,6 +356,19 @@ with your organization's password policy.
340356
- \[Preview\]: Deploy requirements to audit Windows VMs that do not restrict the minimum password length to 14 characters
341357
- \[Preview\]: Deploy requirements to audit Windows VMs that do not store passwords using reversible encryption
342358

359+
## IR-6 (2) Incident Reporting | Vulnerabilities Related to Incidents
360+
361+
This blueprint provides policy definitions that audit records with analysis of vulnerability
362+
assessment on virtual machines, virtual machine scale sets, and SQL servers. These insights provide
363+
real-time information about the security state of your deployed resources and can help you prioritize
364+
remediation actions.
365+
366+
- Vulnerabilities in security configuration on your virtual machine scale sets should be remediated
367+
- Vulnerabilities should be remediated by a Vulnerability Assessment solution
368+
- Vulnerabilities in security configuration on your machines should be remediated
369+
- Vulnerabilities in container security configurations should be remediated
370+
- Vulnerabilities on your SQL databases should be remediated
371+
343372
## RA-5 Vulnerability Scanning
344373

345374
This blueprint helps you manage information system vulnerabilities by assigning [Azure Policy](../../../policy/overview.md)
@@ -458,6 +487,32 @@ of the operating system for virtual machine scale sets.
458487
- Vulnerabilities on your SQL databases should be remediated
459488
- Vulnerabilities should be remediated by a Vulnerability Assessment solution
460489

490+
## SI-02 (06) Flaw Remediation | Removal of Previous Versions of Software / Firmware
491+
492+
This blueprint assigns policy definitions that help you ensure applications are using the latest
493+
version of the .NET Framework, HTTP, Java, PHP, Python, and TLS. This blueprint also assigns
494+
a policy definition that ensures that Kubernetes Services is upgraded to its non-vulnerable version.
495+
496+
- Ensure that '.Net Framework' version is the latest, if used as a part of the API app
497+
- Ensure that '.Net Framework' version is the latest, if used as a part of the Function App
498+
- Ensure that '.Net Framework' version is the latest, if used as a part of the Web app
499+
- Ensure that 'HTTP Version' is the latest, if used to run the Api app
500+
- Ensure that 'HTTP Version' is the latest, if used to run the Function app
501+
- Ensure that 'HTTP Version' is the latest, if used to run the Web app
502+
- Ensure that 'Java version' is the latest, if used as a part of the Api app
503+
- Ensure that 'Java version' is the latest, if used as a part of the Function app
504+
- Ensure that 'Java version' is the latest, if used as a part of the Web app
505+
- Ensure that 'PHP version' is the latest, if used as a part of the Api app
506+
- Ensure that 'PHP version' is the latest, if used as a part of the Function app
507+
- Ensure that 'PHP version' is the latest, if used as a part of the WEB app
508+
- Ensure that 'Python version' is the latest, if used as a part of the Api app
509+
- Ensure that 'Python version' is the latest, if used as a part of the Function app
510+
- Ensure that 'Python version' is the latest, if used as a part of the Web app
511+
- Latest TLS version should be used in your API App
512+
- Latest TLS version should be used in your Function App
513+
- Latest TLS version should be used in your Web App
514+
- \[Preview\]: Kubernetes Services should be upgraded to a non-vulnerable Kubernetes version
515+
461516
## SI-3 Malicious Code Protection
462517

463518
This blueprint helps you manage endpoint protection, including malicious code protection, by
@@ -505,6 +560,22 @@ you can take appropriate action.
505560
- Allowed locations
506561
- Allowed locations for resource groups
507562

563+
## SI-4 (12) Information System Monitoring | Automated Alerts
564+
565+
This blueprint provides policy definitions that help you ensure data security notifications are
566+
properly enabled. In addition, this blueprint ensures that the standard pricing tier is enabled
567+
for Azure Security Center. Note that the standard pricing tier enables threat detection for networks
568+
and virtual machines, providing threat intelligence, anomaly detection, and behavior analytics in
569+
Azure Security Center.
570+
571+
- Email notification to subscription owner for high severity alerts should be enabled
572+
- A security contact email address should be provided for your subscription
573+
- Email notifications to admins and subscription owners should be enabled in SQL managed instance advanced data security settings
574+
- Email notifications to admins and subscription owners should be enabled in SQL server advanced data security settings
575+
- A security contact phone number should be provided for your subscription
576+
- Advanced data security settings for SQL server should contain an email address to receive security alerts
577+
- Security Center standard pricing tier should be selected
578+
508579
## SI-4 (18) Information System Monitoring | Analyze Traffic / Covert Exfiltration
509580

510581
Advanced Threat Protection for Azure Storage detects unusual and potentially harmful attempts to

articles/governance/blueprints/samples/dod-impact-level-4/deploy.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: DoD Impact Level 4 blueprint sample
33
description: Deploy steps for the DoD Impact Level 4 blueprint sample including blueprint artifact parameter details.
4-
ms.date: 02/09/2020
4+
ms.date: 03/06/2020
55
ms.topic: sample
66
---
77
# Deploy the DoD Impact Level 4 blueprint sample
@@ -157,7 +157,8 @@ The following table provides a list of the blueprint artifact parameters:
157157
|\[Preview\]: DoD Impact Level 4|Policy assignment|MFA should be enabled on accounts with owner permissions on your subscription|Information about policy effects can be found at [Understand Azure Policy Effects](../../../policy/concepts/effects.md).|
158158
|\[Preview\]: DoD Impact Level 4|Policy assignment|MFA should be enabled on accounts with write permissions on your subscription|Information about policy effects can be found at [Understand Azure Policy Effects](../../../policy/concepts/effects.md).|
159159
|\[Preview\]: DoD Impact Level 4|Policy assignment|Long-term geo-redundant backup should be enabled for Azure SQL Databases|Information about policy effects can be found at [Understand Azure Policy Effects](../../../policy/concepts/effects.md).|
160-
160+
|Allowed locations|Policy Assignment|Allowed Locations|This policy enables you to restrict the locations your organization can specify when deploying resources. Use to enforce your geo-compliance requirements.|
161+
|Allowed Locations for resource groups|Policy Assignment |Allowed Locations|This policy enables you to restrict the locations your organization can create resource groups in. Use to enforce your geo-compliance requirements.|
161162

162163
## Next steps
163164

articles/governance/blueprints/samples/dod-impact-level-4/index.md

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,12 @@
11
---
22
title: DoD Impact Level 4 blueprint sample overview
33
description: Overview of the DoD Impact Level 4 sample. This blueprint sample helps customers assess specific DoD Impact Level 4 controls.
4-
ms.date: 02/09/2020
4+
ms.date: 03/12/2020
55
ms.topic: sample
66
---
77
# Overview of the DoD Impact Level 4 blueprint sample
88

9-
The Department of Defense Impact Level 4 (DoD IL4) blueprint sample provides governance guard-rails using [Azure Policy](../../../policy/overview.md) that help you assess specific DoD Impact Level 4 controls. This blueprint helps customers deploy a core
10-
set of policies for any Azure-deployed architecture that must implement DoD Impact Level 4 controls.
9+
The Department of Defense Impact Level 4 (DoD IL4) blueprint sample provides governance guard-rails using [Azure Policy](../../../policy/overview.md) that help you assess specific DoD Impact Level 4 controls. This blueprint helps customers deploy a core set of policies for any Azure-deployed architecture that must implement DoD Impact Level 4 controls. For latest information on which Azure Clouds and Services meet DoD Impact Level 4 authorization, see [Azure services by FedRAMP and DoD CC SRG audit scope](../../../../azure-government/compliance/azure-services-in-fedramp-auditscope.md).
1110

1211
## Control mapping
1312

0 commit comments

Comments
 (0)