@@ -36,7 +36,7 @@ This blueprint assigns [Azure Policy](../../../policy/overview.md) definitions t
36
36
when multi-factor authentication isn't enabled on privileged Azure Active Directory accounts.
37
37
38
38
- MFA should be enabled on accounts with owner permissions on your subscription
39
- - MFA should be enabled on accounts with write permissions on your subscription
39
+ - MFA should be enabled accounts with write permissions on your subscription
40
40
41
41
## 1.2 Ensure that multi-factor authentication is enabled for all non-privileged users
42
42
@@ -51,9 +51,9 @@ accounts.
51
51
This blueprint assigns [ Azure Policy] ( ../../../policy/overview.md ) definitions that help you monitor
52
52
for guest accounts that may need removed.
53
53
54
- - External accounts with owner permissions should be removed from your subscription
55
54
- External accounts with read permissions should be removed from your subscription
56
55
- External accounts with write permissions should be removed from your subscription
56
+ - External accounts with owner permissions should be removed from your subscription
57
57
58
58
## 1.23 Ensure that no custom subscription owner roles are created
59
59
@@ -67,7 +67,7 @@ for custom subscription owner roles that may need removed.
67
67
This blueprint assigns an [ Azure Policy] ( ../../../policy/overview.md ) definition that helps you
68
68
monitor networks and virtual machines where the Security Center standard tier isn't enabled.
69
69
70
- - Security Center standard pricing tier should be selected
70
+ - Security Center standard pricing tier should be selected
71
71
72
72
## 2.2 Ensure that 'Automatic provisioning of monitoring agent' is set to 'On'
73
73
@@ -109,14 +109,7 @@ ensure virtual machine disks are encrypted.
109
109
This blueprint assigns an [ Azure Policy] ( ../../../policy/overview.md ) definition that helps you
110
110
protect Internet-facing virtual machines.
111
111
112
- - Network Security Group Rules for Internet facing virtual machines should be hardened
113
-
114
- ## 2.8 Ensure ASC Default policy setting "Monitor Web Application Firewall" is not "Disabled"
115
-
116
- This blueprint assigns an [ Azure Policy] ( ../../../policy/overview.md ) definition that helps you
117
- protect virtual machines running web applications.
118
-
119
- - The NSGs rules for web applications on IaaS should be hardened
112
+ - Adaptive Network Hardening recommendations should be applied on internet facing virtual machines
120
113
121
114
## 2.9 Ensure ASC Default policy setting "Enable Next Generation Firewall(NGFW) Monitoring" is not "Disabled"
122
115
@@ -126,7 +119,7 @@ referenced by this CIS Microsoft Azure Foundations Benchmark recommendation has
126
119
new recommendations. The policies referenced below address the new recommendations.
127
120
128
121
- Subnets should be associated with a Network Security Group
129
- - Virtual machines should be associated with a Network Security Group
122
+ - Internet-facing virtual machines should be protected with Network Security Groups
130
123
131
124
## 2.10 Ensure ASC Default policy setting "Monitor Vulnerability Assessment" is not "Disabled"
132
125
@@ -159,7 +152,7 @@ ensure Adaptive Application Controls is enabled on virtual machines.
159
152
This blueprint assigns an [ Azure Policy] ( ../../../policy/overview.md ) definition that helps ensure
160
153
SQL server auditing is enabled.
161
154
162
- - Auditing should be enabled on advanced data security settings on SQL Server
155
+ - Auditing on SQL server should be enabled
163
156
164
157
## 2.15 Ensure ASC Default policy setting "Monitor SQL Encryption" is not "Disabled"
165
158
@@ -222,7 +215,7 @@ monitor storage accounts that don't allow access from trusted Microsoft services
222
215
This blueprint assigns an [ Azure Policy] ( ../../../policy/overview.md ) definition that helps ensure
223
216
SQL server auditing is enabled.
224
217
225
- - Auditing should be enabled on advanced data security settings on SQL Server
218
+ - Auditing on SQL server should be enabled
226
219
227
220
## 4.2 Ensure that 'AuditActionGroups' in 'auditing' policy for a SQL server is set properly
228
221
@@ -243,38 +236,32 @@ ensure SQL server logs are retained for at least 90 days.
243
236
This blueprint assigns an [ Azure Policy] ( ../../../policy/overview.md ) definition that helps you
244
237
ensure advanced data security is enabled on SQL servers and SQL managed instances.
245
238
246
- - Advanced data security should be enabled on your SQL managed instances
247
239
- Advanced data security should be enabled on your SQL servers
240
+ - Advanced data security should be enabled on your SQL managed instances
248
241
249
242
## 4.5 Ensure that 'Threat Detection types' is set to 'All'
250
243
251
244
This blueprint assigns [ Azure Policy] ( ../../../policy/overview.md ) definitions that help you ensure
252
245
advanced threat protection is properly configured on SQL servers and SQL managed instances.
253
246
254
- - Advanced Threat Protection types should be set to 'All' in SQL server Advanced Data Security
255
- settings
256
- - Advanced Threat Protection types should be set to 'All' in SQL managed instance Advanced Data
257
- Security settings
247
+ - Advanced Threat Protection types should be set to 'All' in SQL server Advanced Data Security settings
248
+ - Advanced Threat Protection types should be set to 'All' in SQL managed instance Advanced Data Security settings
258
249
259
250
## 4.6 Ensure that 'Send alerts to' is set
260
251
261
252
This blueprint assigns an [ Azure Policy] ( ../../../policy/overview.md ) definition that helps you
262
253
ensure advanced data security notifications are properly enabled.
263
254
264
- - Advanced data security settings for SQL managed instance should contain an email address to
265
- receive security alerts
266
- - Advanced data security settings for SQL server should contain an email address to receive security
267
- alerts
255
+ - Advanced data security settings for SQL server should contain an email address to receive security alerts
256
+ - Advanced data security settings for SQL managed instance should contain an email address to receive security alerts
268
257
269
258
## 4.7 Ensure that 'Email service and co-administrators' is 'Enabled'
270
259
271
260
This blueprint assigns an [ Azure Policy] ( ../../../policy/overview.md ) definition that helps you
272
261
ensure advanced data security notifications are properly enabled.
273
262
274
- - Email notifications to admins and subscription owners should be enabled in SQL managed instance
275
- advanced data security settings
276
- - Email notifications to admins and subscription owners should be enabled in SQL server advanced
277
- data security settings
263
+ - Email notifications to admins and subscription owners should be enabled in SQL server advanced data security settings
264
+ - Email notifications to admins and subscription owners should be enabled in SQL managed instance advanced data security settings
278
265
279
266
## 4.8 Ensure that Azure Active Directory Admin is configured
280
267
@@ -296,8 +283,8 @@ This blueprint assigns [Azure Policy](../../../policy/overview.md) definitions t
296
283
the transparent data encrypted protector for SQL servers and SQL managed instances is encrypted with
297
284
your own key.
298
285
299
- - SQL managed instance TDE protector should be encrypted with your own key
300
286
- SQL server TDE protector should be encrypted with your own key
287
+ - SQL managed instance TDE protector should be encrypted with your own key
301
288
302
289
## 4.11 Ensure 'Enforce SSL connection' is set to 'ENABLED' for MySQL Database Server
303
290
@@ -385,13 +372,97 @@ ensure that the log profile is properly configured.
385
372
386
373
- Azure Monitor should collect activity logs from all regions
387
374
375
+ ## 5.1.6 Ensure the storage account containing the container with activity logs is encrypted with BYOK (Use Your Own Key)
376
+
377
+ This blueprint assigns an [ Azure Policy] ( ../../../policy/overview.md ) definition that helps you
378
+ ensure that storage accounts containing activity logs are encrypted with BYOK.
379
+
380
+ - Storage account containing the container with activity logs must be encrypted with BYOK
381
+
388
382
## 5.1.7 Ensure that logging for Azure KeyVault is 'Enabled'
389
383
390
384
This blueprint assigns an [ Azure Policy] ( ../../../policy/overview.md ) definition that helps you
391
385
ensure diagnostic logs are enabled for key vaults.
392
386
393
387
- Diagnostic logs in Key Vault should be enabled
394
388
389
+ ## 5.2.1 Ensure that Activity Log Alert exists for Create Policy Assignment
390
+
391
+ This blueprint assigns an [ Azure Policy] ( ../../../policy/overview.md ) definition that helps you
392
+ ensure that specific activity log alerts exists.
393
+
394
+ - An activity log alert should exist for specific Policy operations
395
+
396
+ ## 5.2.2 Ensure that Activity Log Alert exists for Create or Update Network Security Group
397
+
398
+ This blueprint assigns an [ Azure Policy] ( ../../../policy/overview.md ) definition that helps you
399
+ ensure that specific activity log alerts exists.
400
+
401
+ - An activity log alert should exist for specific Administrative operations
402
+
403
+ ## 5.2.3 Ensure that Activity Log Alert exists for Delete Network Security Group
404
+
405
+ This blueprint assigns an [ Azure Policy] ( ../../../policy/overview.md ) definition that helps you
406
+ ensure that specific activity log alerts exists.
407
+
408
+ - An activity log alert should exist for specific Administrative operations
409
+
410
+ ## 5.2.4 Ensure that Activity Log Alert exists for Create or Update Network Security Group Rule
411
+
412
+ This blueprint assigns an [ Azure Policy] ( ../../../policy/overview.md ) definition that helps you
413
+ ensure that specific activity log alerts exists.
414
+
415
+ - An activity log alert should exist for specific Administrative operations
416
+
417
+ ## 5.2.5 Ensure that activity log alert exists for the Delete Network Security Group Rule
418
+
419
+ This blueprint assigns an [ Azure Policy] ( ../../../policy/overview.md ) definition that helps you
420
+ ensure that specific activity log alerts exists.
421
+
422
+ - An activity log alert should exist for specific Administrative operations
423
+
424
+ ## 5.2.6 Ensure that Activity Log Alert exists for Create or Update Security Solution
425
+
426
+ This blueprint assigns an [ Azure Policy] ( ../../../policy/overview.md ) definition that helps you
427
+ ensure that specific activity log alerts exists.
428
+
429
+ - An activity log alert should exist for specific Security operations
430
+
431
+ ## 5.2.7 Ensure that Activity Log Alert exists for Delete Security Solution
432
+
433
+ This blueprint assigns an [ Azure Policy] ( ../../../policy/overview.md ) definition that helps you
434
+ ensure that specific activity log alerts exists.
435
+
436
+ - An activity log alert should exist for specific Security operations
437
+
438
+ ## 5.2.8 Ensure that Activity Log Alert exists for Create or Update or Delete SQL Server Firewall Rule
439
+
440
+ This blueprint assigns an [ Azure Policy] ( ../../../policy/overview.md ) definition that helps you
441
+ ensure that specific activity log alerts exists.
442
+
443
+ - An activity log alert should exist for specific Administrative operations
444
+
445
+ ## 5.2.9 Ensure that Activity Log Alert exists for Update Security Policy
446
+
447
+ This blueprint assigns an [ Azure Policy] ( ../../../policy/overview.md ) definition that helps you
448
+ ensure that specific activity log alerts exists.
449
+
450
+ - An activity log alert should exist for specific Security operations
451
+
452
+ ## 6.1 Ensure that RDP access is restricted from the internet
453
+
454
+ This blueprint assigns an [ Azure Policy] ( ../../../policy/overview.md ) definition that helps you
455
+ ensure that RDP access is restricted.
456
+
457
+ - RDP access from the Internet should be blocked
458
+
459
+ ## 6.2 Ensure that SSH access is restricted from the internet
460
+
461
+ This blueprint assigns an [ Azure Policy] ( ../../../policy/overview.md ) definition that helps you
462
+ ensure that SSH access is restricted.
463
+
464
+ - SSH access from the Internet should be blocked
465
+
395
466
## 6.5 Ensure that Network Watcher is 'Enabled'
396
467
397
468
This blueprint assigns an [ Azure Policy] ( ../../../policy/overview.md ) definition that helps you
@@ -429,7 +500,7 @@ ensure that only approved virtual machine extensions are installed. This policy
429
500
a parameter array that specifies all approved virtual machine extensions. This policy initiative
430
501
definition contains suggested defaults that customers should validate.
431
502
432
- - Only approved VM extensions should be installed
503
+ - Only approved VM extensions should be installed
433
504
434
505
## 7.5 Ensure that the latest OS Patches for all Virtual Machines are applied
435
506
@@ -457,7 +528,16 @@ ensure that key vault objects are recoverable in the case of accidental deletion
457
528
This blueprint assigns an [ Azure Policy] ( ../../../policy/overview.md ) definition that helps you
458
529
ensure role-based access control is used to managed permissions in Kubernetes service clusters
459
530
460
- - \[ Preview\] : Role-Based Access Control (RBAC) should be used on Kubernetes Services
531
+ - Role-Based Access Control (RBAC) should be used on Kubernetes Services
532
+
533
+ ## 9.1 Ensure App Service Authentication is set on Azure App Service
534
+
535
+ This blueprint assigns an [ Azure Policy] ( ../../../policy/overview.md ) definition that helps you
536
+ ensure requests to App Service apps are authenticated.
537
+
538
+ - Authentication should be enabled on your API app
539
+ - Authentication should be enabled on your Function app
540
+ - Authentication should be enabled on your web app
461
541
462
542
## 9.2 Ensure web app redirects all HTTP traffic to HTTPS in Azure App Service
463
543
@@ -526,7 +606,7 @@ This blueprint assigns [Azure Policy](../../../policy/overview.md) definitions t
526
606
that web apps are using the latest version of Java.
527
607
528
608
- Ensure that 'Java version' is the latest, if used as a part of the Api app
529
- - Ensure that 'Java version' is the latest, if used as a part of the Funtion app
609
+ - Ensure that 'Java version' is the latest, if used as a part of the Function app
530
610
- Ensure that 'Java version' is the latest, if used as a part of the Web app
531
611
532
612
## 9.10 Ensure that 'HTTP Version' is the latest, if used to run the web app
@@ -538,7 +618,6 @@ that web apps are using the latest version of HTTP.
538
618
- Ensure that 'HTTP Version' is the latest, if used to run the Function app
539
619
- Ensure that 'HTTP Version' is the latest, if used to run the Web app
540
620
541
-
542
621
## Next steps
543
622
544
623
Now that you've reviewed the control mapping of the CIS Microsoft Azure Foundations Benchmark
0 commit comments