You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: includes/asc-recs-compute.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,7 +2,7 @@
2
2
author: memildin
3
3
ms.service: security-center
4
4
ms.topic: include
5
-
ms.date: 03/14/2021
5
+
ms.date: 03/21/2021
6
6
ms.author: memildin
7
7
ms.custom: generated
8
8
---
@@ -54,7 +54,7 @@ There are **54** recommendations in this category.
54
54
|System updates should be installed on your machines |Install missing system security and critical updates to secure your Windows and Linux virtual machines and computers<br />(Related policy: [System updates should be installed on your machines](https://portal.azure.com/#blade/Microsoft_Azure_Policy/PolicyDetailBlade/definitionId/%2fproviders%2fmicrosoft.authorization%2fpolicyDefinitions%2f86b3d65f-7626-441e-b690-81a8b71cff60)) |High |
55
55
|System updates should be installed on your machines (powered by Update Center) |Your machines are missing system, security, and critical updates. Software updates often include critical patches to security holes. Such holes are frequently exploited in malware attacks so it's vital to keep your software updated. To install all outstanding patches and secure your machines, follow the remediation steps.<br />(No related policy) |High |
56
56
|Virtual machines should be attested for boot integrity health |Security Center cannot attest that your virtual machine is running signed and trusted code. This could indicate a compromise of the boot chain, which might be the result of a persistent bootkit or rootkit infection. To ensure your VM is running in a safe state, we recommend investigating the machine, or redeploying it from a trusted OS image.<br />(No related policy) |Medium |
57
-
|Virtual machines should be migrated to new Azure Resource Manager resources |Virtual Machines (classic) was deprecated and these VMs should be migrated to Azure Resource Manager.<br>Because Azure Resource Manager now has full IaaS capabilities and other advancements, we deprecated the management of IaaS virtual machines (VMs) through Azure Service Manager (ASM) on February 28, 2020. This functionality will be fully retired on March 1, 2023.<br><br>Available resources and information about this tool & migration:<br>1. <a href='https://docs.microsoft.com/azure/virtual-machines/classic-vm-deprecation?toc=/azure/virtual-machines/windows/toc.json&bc=/azure/virtual-machines/windows/breadcrumb/toc.json'>Overview of Virtual machines (classic) deprecation, step by step process for migration & available Microsoft resources.</a><br>2. <a href='https://docs.microsoft.com/azure/virtual-machines/migration-classic-resource-manager-deep-dive?toc=/azure/virtual-machines/windows/toc.json&bc=/azure/virtual-machines/windows/breadcrumb/toc.json'>Details about Migrate to ARM migration tool.</a><br>3. <a href='https://docs.microsoft.com/azure/virtual-machines/windows/migration-classic-resource-manager-ps'>Migrate to Azure Resource Manager migration tool using PowerShell.</a><br />(Related policy: [Virtual machines should be migrated to new Azure Resource Manager resources](https://portal.azure.com/#blade/Microsoft_Azure_Policy/PolicyDetailBlade/definitionId/%2fproviders%2fMicrosoft.Authorization%2fpolicyDefinitions%2f1d84d5fb-01f6-4d12-ba4f-4a26081d403d)) |High |
57
+
|Virtual machines should be migrated to new Azure Resource Manager resources |Virtual Machines (classic) was deprecated and these VMs should be migrated to Azure Resource Manager.<br>Because Azure Resource Manager now has full IaaS capabilities and other advancements, we deprecated the management of IaaS virtual machines (VMs) through Azure Service Manager (ASM) on February 28, 2020. This functionality will be fully retired on March 1, 2023.<br><br>Available resources and information about this tool & migration:<br><a href='https://docs.microsoft.com/azure/virtual-machines/classic-vm-deprecation?toc=/azure/virtual-machines/windows/toc.json&bc=/azure/virtual-machines/windows/breadcrumb/toc.json'>Overview of Virtual machines (classic) deprecation, step by step process for migration & available Microsoft resources.</a><br><a href='https://docs.microsoft.com/azure/virtual-machines/migration-classic-resource-manager-deep-dive?toc=/azure/virtual-machines/windows/toc.json&bc=/azure/virtual-machines/windows/breadcrumb/toc.json'>Details about Migrate to Azure Resource Manager migration tool.</a><br><a href='https://docs.microsoft.com/azure/virtual-machines/windows/migration-classic-resource-manager-ps'>Migrate to Azure Resource Manager migration tool using PowerShell.</a><br />(Related policy: [Virtual machines should be migrated to new Azure Resource Manager resources](https://portal.azure.com/#blade/Microsoft_Azure_Policy/PolicyDetailBlade/definitionId/%2fproviders%2fMicrosoft.Authorization%2fpolicyDefinitions%2f1d84d5fb-01f6-4d12-ba4f-4a26081d403d)) |High |
58
58
|Virtual machines' Guest Configuration extension should be deployed with system-assigned managed identity |The Guest Configuration extension requires a system assigned managed identity. Azure virtual machines in the scope of this policy will be non-compliant when they have the Guest Configuration extension installed but do not have a system assigned managed identity. <ahref='https://aka.ms/gcpol'>Learn more</a><br />(Related policy: [Guest Configuration extension should be deployed to Azure virtual machines with system assigned managed identity](https://portal.azure.com/#blade/Microsoft_Azure_Policy/PolicyDetailBlade/definitionId/%2fproviders%2fMicrosoft.Authorization%2fpolicyDefinitions%2fd26f7642-7545-4e18-9b75-8c9bbdee3a9a)) |Medium |
59
59
|Vulnerabilities in container security configurations should be remediated |Remediate vulnerabilities in security configuration on machines with Docker installed to protect them from attacks.<br />(Related policy: [Vulnerabilities in container security configurations should be remediated](https://portal.azure.com/#blade/Microsoft_Azure_Policy/PolicyDetailBlade/definitionId/%2fproviders%2fMicrosoft.Authorization%2fpolicyDefinitions%2fe8cbc669-f12d-49eb-93e7-9273119e9933)) |High |
60
60
|Vulnerabilities in security configuration on your machines should be remediated |Remediate vulnerabilities in security configuration on your machines to protect them from attacks.<br />(Related policy: [Vulnerabilities in security configuration on your machines should be remediated](https://portal.azure.com/#blade/Microsoft_Azure_Policy/PolicyDetailBlade/definitionId/%2fproviders%2fMicrosoft.Authorization%2fpolicyDefinitions%2fe1e5fd5d-3e4c-4ce1-8661-7d1873ae6b15)) |Low |
Copy file name to clipboardExpand all lines: includes/asc/recommendations-with-deny.md
+9-9Lines changed: 9 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,13 +2,13 @@
2
2
author: memildin
3
3
ms.service: security-center
4
4
ms.topic: include
5
-
ms.date: 03/14/2021
5
+
ms.date: 03/21/2021
6
6
ms.author: memildin
7
7
ms.custom: generated
8
8
---
9
9
10
-
- Access to storage accounts with firewall and virtual network configurations should be restricted Storage accounts should restrict network access
11
-
- Automation account variables should be encrypted Automation account variables should be encrypted
10
+
- Access to storage accounts with firewall and virtual network configurations should be restricted
11
+
- Automation account variables should be encrypted
12
12
- Azure Cache for Redis should reside within a virtual network
13
13
- Azure Cosmos DB accounts should use customer-managed keys to encrypt data at rest
14
14
- Azure Machine Learning workspaces should be encrypted with a customer-managed key (CMK)
@@ -26,21 +26,21 @@ ms.custom: generated
26
26
- Key vaults should have purge protection enabled
27
27
- Key vaults should have soft delete enabled
28
28
- Least privileged Linux capabilities should be enforced for containers
29
-
- Only secure connections to your Redis Cache should be enabled Only secure connections to your Azure Cache for Redis should be enabled
29
+
- Only secure connections to your Redis Cache should be enabled
30
30
- Overriding or disabling of containers AppArmor profile should be restricted
31
31
- Privileged containers should be avoided
32
32
- Running containers as root user should be avoided
33
-
- Secure transfer to storage accounts should be enabled Secure transfer to storage accounts should be enabled
34
-
- Service Fabric clusters should have the ClusterProtectionLevel property set to EncryptAndSign Service Fabric clusters should have the ClusterProtectionLevel property set to EncryptAndSign
35
-
- Service Fabric clusters should only use Azure Active Directory for client authentication Service Fabric clusters should only use Azure Active Directory for client authentication
33
+
- Secure transfer to storage accounts should be enabled
34
+
- Service Fabric clusters should have the ClusterProtectionLevel property set to EncryptAndSign
35
+
- Service Fabric clusters should only use Azure Active Directory for client authentication
36
36
- Services should listen on allowed ports only
37
37
- Storage account public access should be disallowed
38
-
- Storage accounts should be migrated to new Azure Resource Manager resources Storage accounts should be migrated to new Azure Resource Manager resources
38
+
- Storage accounts should be migrated to new Azure Resource Manager resources
39
39
- Storage accounts should restrict network access using virtual network rules
40
40
- Usage of host networking and ports should be restricted
41
41
- Usage of pod HostPath volume mounts should be restricted to a known list to restrict node access from compromised containers
42
42
- Validity period of certificates stored in Azure Key Vault should not exceed 12 months
43
-
- Virtual machines should be migrated to new Azure Resource Manager resources Virtual machines should be migrated to new Azure Resource Manager resources
43
+
- Virtual machines should be migrated to new Azure Resource Manager resources
44
44
- Web Application Firewall (WAF) should be enabled for Application Gateway
45
45
- Web Application Firewall (WAF) should be enabled for Azure Front Door Service service
0 commit comments