@@ -91,8 +91,8 @@ separation of duties.
91
91
92
92
- A maximum of 3 owners should be designated for your subscription
93
93
- There should be more than one owner assigned to your subscription
94
- - Audit Windows VMs in which the Administrators group contains any of the specified members
95
- - Audit Windows VMs in which the Administrators group does not contain all of the specified members
94
+ - Show audit results from Windows VMs in which the Administrators group contains any of the specified members
95
+ - Show audit results from Windows VMs in which the Administrators group does not contain all of the specified members
96
96
- Deploy requirements to audit Windows VMs in which the Administrators group contains any of the specified members
97
97
- Deploy requirements to audit Windows VMs in which the Administrators group does not contain all of the specified members
98
98
@@ -106,8 +106,8 @@ indicators can help you ensure least privilege controls are implemented.
106
106
107
107
- A maximum of 3 owners should be designated for your subscription
108
108
- There should be more than one owner assigned to your subscription
109
- - Audit Windows VMs in which the Administrators group contains any of the specified members
110
- - Audit Windows VMs in which the Administrators group does not contain all of the specified members
109
+ - Show audit results from Windows VMs in which the Administrators group contains any of the specified members
110
+ - Show audit results from Windows VMs in which the Administrators group does not contain all of the specified members
111
111
- Deploy requirements to audit Windows VMs in which the Administrators group contains any of the specified members
112
112
- Deploy requirements to audit Windows VMs in which the Administrators group does not contain all of the specified members
113
113
@@ -134,7 +134,7 @@ connections from accounts without passwords. Additionally, the blueprint assigns
134
134
definition that helps you monitor unrestricted access to storage accounts. Monitoring these
135
135
indicators can help you ensure remote access methods comply with your security policy.
136
136
137
- - \[ Preview\] : Audit Linux VMs that allow remote connections from accounts without passwords
137
+ - \[ Preview\] : Show audit results from Linux VMs that allow remote connections from accounts without passwords
138
138
- \[ Preview\] : Deploy requirements to audit Linux VMs that allow remote connections from accounts without passwords
139
139
- Audit unrestricted network access to storage accounts
140
140
- Remote debugging should be turned off for API App
@@ -160,7 +160,7 @@ audit and event logging configurations. Monitoring these configurations can prov
160
160
an audit system failure or misconfiguration and help you take corrective action.
161
161
162
162
- Audit diagnostic setting
163
- - Audit SQL server level Auditing settings
163
+ - Auditing on SQL server should be enabled
164
164
- Advanced data security should be enabled on your managed instances
165
165
- Advanced data security should be enabled on your SQL servers
166
166
@@ -191,7 +191,7 @@ and Advanced Data Security are configured on SQL servers.
191
191
- \[ Preview\] : Deploy Log Analytics Agent for Linux VMs
192
192
- \[ Preview\] : Deploy Log Analytics Agent for Windows VMs
193
193
- Audit diagnostic setting
194
- - Audit SQL server level Auditing settings
194
+ - Auditing on SQL server should be enabled
195
195
- Advanced data security should be enabled on your managed instances
196
196
- Advanced data security should be enabled on your SQL servers
197
197
- Deploy Advanced Data Security on SQL servers
@@ -250,8 +250,8 @@ configuration of the password encryption type for Windows virtual machines. Moni
250
250
indicators helps you ensure that system authenticators comply with your organization's
251
251
identification and authentication policy.
252
252
253
- - \[ Preview\] : Audit Linux VMs that do not have the passwd file permissions set to 0644
254
- - \[ Preview\] : Audit Linux VMs that have accounts without passwords
253
+ - \[ Preview\] : Show audit results from Linux VMs that do not have the passwd file permissions set to 0644
254
+ - \[ Preview\] : Show audit results from Linux VMs that have accounts without passwords
255
255
- \[ Preview\] : Deploy requirements to audit Linux VMs that do not have the passwd file permissions set to 0644
256
256
- \[ Preview\] : Deploy requirements to audit Linux VMs that have accounts without passwords
257
257
@@ -263,11 +263,11 @@ password requirements. Awareness of virtual machines in violation of the passwor
263
263
helps you take corrective actions to ensure passwords for all virtual machine user accounts comply
264
264
with your organization's password policy.
265
265
266
- - \[ Preview\] : Audit Windows VMs that allow re-use of the previous 24 passwords
267
- - \[ Preview\] : Audit Windows VMs that do not have a maximum password age of 70 days
268
- - \[ Preview\] : Audit Windows VMs that do not have a minimum password age of 1 day
269
- - \[ Preview\] : Audit Windows VMs that do not have the password complexity setting enabled
270
- - \[ Preview\] : Audit Windows VMs that do not restrict the minimum password length to 14 characters
266
+ - \[ Preview\] : Show audit results from Windows VMs that allow re-use of the previous 24 passwords
267
+ - \[ Preview\] : Show audit results from Windows VMs that do not have a maximum password age of 70 days
268
+ - \[ Preview\] : Show audit results from Windows VMs that do not have a minimum password age of 1 day
269
+ - \[ Preview\] : Show audit results from Windows VMs that do not have the password complexity setting enabled
270
+ - \[ Preview\] : Show audit results from Windows VMs that do not restrict the minimum password length to 14 characters
271
271
- \[ Preview\] : Deploy requirements to audit Windows VMs that allow re-use of the previous 24 passwords
272
272
- \[ Preview\] : Deploy requirements to audit Windows VMs that do not have a maximum password age of 70 days
273
273
- \[ Preview\] : Deploy requirements to audit Windows VMs that do not have a minimum password age of 1 day
@@ -325,10 +325,9 @@ endpoints, applications, and storage accounts. Endpoints and applications that a
325
325
firewall, and storage accounts with unrestricted access can allow unintended access to information
326
326
contained within the information system.
327
327
328
- - Network Security Group Rules for Internet facing virtual machines should be hardened
328
+ - Adaptive Network Hardening recommendations should be applied on internet facing virtual machines
329
329
- Access through Internet facing endpoint should be restricted
330
330
- Audit unrestricted network access to storage accounts
331
- - The NSGs rules for web applications on IaaS should be hardened
332
331
333
332
## SC-7 (3) Boundary Protection | Access Points
334
333
@@ -360,7 +359,7 @@ properly encrypted can help you meet your organization's requirements or protect
360
359
from unauthorized disclosure and modification.
361
360
362
361
- API App should only be accessible over HTTPS
363
- - Audit Windows web servers that are not using secure communication protocols
362
+ - Show audit results from Windows web servers that are not using secure communication protocols
364
363
- Deploy requirements to audit Windows web servers that are not using secure communication protocols
365
364
- Function App should only be accessible over HTTPS
366
365
- Only secure connections to your Redis Cache should be enabled
@@ -465,4 +464,4 @@ Additional articles about blueprints and how to use them:
465
464
- Understand how to use [ static and dynamic parameters] ( ../../concepts/parameters.md ) .
466
465
- Learn to customize the [ blueprint sequencing order] ( ../../concepts/sequencing-order.md ) .
467
466
- Find out how to make use of [ blueprint resource locking] ( ../../concepts/resource-locking.md ) .
468
- - Learn how to [ update existing assignments] ( ../../how-to/update-existing-assignments.md ) .
467
+ - Learn how to [ update existing assignments] ( ../../how-to/update-existing-assignments.md ) .
0 commit comments