Skip to content

Commit 7c65141

Browse files
committed
Update CIS control mapping
1 parent a59aebc commit 7c65141

File tree

1 file changed

+111
-32
lines changed

1 file changed

+111
-32
lines changed

articles/governance/blueprints/samples/cis-azure-1.1.0/control-mapping.md

Lines changed: 111 additions & 32 deletions
Original file line numberDiff line numberDiff line change
@@ -36,7 +36,7 @@ This blueprint assigns [Azure Policy](../../../policy/overview.md) definitions t
3636
when multi-factor authentication isn't enabled on privileged Azure Active Directory accounts.
3737

3838
- MFA should be enabled on accounts with owner permissions on your subscription
39-
- MFA should be enabled on accounts with write permissions on your subscription
39+
- MFA should be enabled accounts with write permissions on your subscription
4040

4141
## 1.2 Ensure that multi-factor authentication is enabled for all non-privileged users
4242

@@ -51,9 +51,9 @@ accounts.
5151
This blueprint assigns [Azure Policy](../../../policy/overview.md) definitions that help you monitor
5252
for guest accounts that may need removed.
5353

54-
- External accounts with owner permissions should be removed from your subscription
5554
- External accounts with read permissions should be removed from your subscription
5655
- External accounts with write permissions should be removed from your subscription
56+
- External accounts with owner permissions should be removed from your subscription
5757

5858
## 1.23 Ensure that no custom subscription owner roles are created
5959

@@ -67,7 +67,7 @@ for custom subscription owner roles that may need removed.
6767
This blueprint assigns an [Azure Policy](../../../policy/overview.md) definition that helps you
6868
monitor networks and virtual machines where the Security Center standard tier isn't enabled.
6969

70-
- Security Center standard pricing tier should be selected
70+
- Security Center standard pricing tier should be selected
7171

7272
## 2.2 Ensure that 'Automatic provisioning of monitoring agent' is set to 'On'
7373

@@ -109,14 +109,7 @@ ensure virtual machine disks are encrypted.
109109
This blueprint assigns an [Azure Policy](../../../policy/overview.md) definition that helps you
110110
protect Internet-facing virtual machines.
111111

112-
- Network Security Group Rules for Internet facing virtual machines should be hardened
113-
114-
## 2.8 Ensure ASC Default policy setting "Monitor Web Application Firewall" is not "Disabled"
115-
116-
This blueprint assigns an [Azure Policy](../../../policy/overview.md) definition that helps you
117-
protect virtual machines running web applications.
118-
119-
- The NSGs rules for web applications on IaaS should be hardened
112+
- Adaptive Network Hardening recommendations should be applied on internet facing virtual machines
120113

121114
## 2.9 Ensure ASC Default policy setting "Enable Next Generation Firewall(NGFW) Monitoring" is not "Disabled"
122115

@@ -126,7 +119,7 @@ referenced by this CIS Microsoft Azure Foundations Benchmark recommendation has
126119
new recommendations. The policies referenced below address the new recommendations.
127120

128121
- Subnets should be associated with a Network Security Group
129-
- Virtual machines should be associated with a Network Security Group
122+
- Internet-facing virtual machines should be protected with Network Security Groups
130123

131124
## 2.10 Ensure ASC Default policy setting "Monitor Vulnerability Assessment" is not "Disabled"
132125

@@ -159,7 +152,7 @@ ensure Adaptive Application Controls is enabled on virtual machines.
159152
This blueprint assigns an [Azure Policy](../../../policy/overview.md) definition that helps ensure
160153
SQL server auditing is enabled.
161154

162-
- Auditing should be enabled on advanced data security settings on SQL Server
155+
- Auditing on SQL server should be enabled
163156

164157
## 2.15 Ensure ASC Default policy setting "Monitor SQL Encryption" is not "Disabled"
165158

@@ -222,7 +215,7 @@ monitor storage accounts that don't allow access from trusted Microsoft services
222215
This blueprint assigns an [Azure Policy](../../../policy/overview.md) definition that helps ensure
223216
SQL server auditing is enabled.
224217

225-
- Auditing should be enabled on advanced data security settings on SQL Server
218+
- Auditing on SQL server should be enabled
226219

227220
## 4.2 Ensure that 'AuditActionGroups' in 'auditing' policy for a SQL server is set properly
228221

@@ -243,38 +236,32 @@ ensure SQL server logs are retained for at least 90 days.
243236
This blueprint assigns an [Azure Policy](../../../policy/overview.md) definition that helps you
244237
ensure advanced data security is enabled on SQL servers and SQL managed instances.
245238

246-
- Advanced data security should be enabled on your SQL managed instances
247239
- Advanced data security should be enabled on your SQL servers
240+
- Advanced data security should be enabled on your SQL managed instances
248241

249242
## 4.5 Ensure that 'Threat Detection types' is set to 'All'
250243

251244
This blueprint assigns [Azure Policy](../../../policy/overview.md) definitions that help you ensure
252245
advanced threat protection is properly configured on SQL servers and SQL managed instances.
253246

254-
- Advanced Threat Protection types should be set to 'All' in SQL server Advanced Data Security
255-
settings
256-
- Advanced Threat Protection types should be set to 'All' in SQL managed instance Advanced Data
257-
Security settings
247+
- Advanced Threat Protection types should be set to 'All' in SQL server Advanced Data Security settings
248+
- Advanced Threat Protection types should be set to 'All' in SQL managed instance Advanced Data Security settings
258249

259250
## 4.6 Ensure that 'Send alerts to' is set
260251

261252
This blueprint assigns an [Azure Policy](../../../policy/overview.md) definition that helps you
262253
ensure advanced data security notifications are properly enabled.
263254

264-
- Advanced data security settings for SQL managed instance should contain an email address to
265-
receive security alerts
266-
- Advanced data security settings for SQL server should contain an email address to receive security
267-
alerts
255+
- Advanced data security settings for SQL server should contain an email address to receive security alerts
256+
- Advanced data security settings for SQL managed instance should contain an email address to receive security alerts
268257

269258
## 4.7 Ensure that 'Email service and co-administrators' is 'Enabled'
270259

271260
This blueprint assigns an [Azure Policy](../../../policy/overview.md) definition that helps you
272261
ensure advanced data security notifications are properly enabled.
273262

274-
- Email notifications to admins and subscription owners should be enabled in SQL managed instance
275-
advanced data security settings
276-
- Email notifications to admins and subscription owners should be enabled in SQL server advanced
277-
data security settings
263+
- Email notifications to admins and subscription owners should be enabled in SQL server advanced data security settings
264+
- Email notifications to admins and subscription owners should be enabled in SQL managed instance advanced data security settings
278265

279266
## 4.8 Ensure that Azure Active Directory Admin is configured
280267

@@ -296,8 +283,8 @@ This blueprint assigns [Azure Policy](../../../policy/overview.md) definitions t
296283
the transparent data encrypted protector for SQL servers and SQL managed instances is encrypted with
297284
your own key.
298285

299-
- SQL managed instance TDE protector should be encrypted with your own key
300286
- SQL server TDE protector should be encrypted with your own key
287+
- SQL managed instance TDE protector should be encrypted with your own key
301288

302289
## 4.11 Ensure 'Enforce SSL connection' is set to 'ENABLED' for MySQL Database Server
303290

@@ -385,13 +372,97 @@ ensure that the log profile is properly configured.
385372

386373
- Azure Monitor should collect activity logs from all regions
387374

375+
## 5.1.6 Ensure the storage account containing the container with activity logs is encrypted with BYOK (Use Your Own Key)
376+
377+
This blueprint assigns an [Azure Policy](../../../policy/overview.md) definition that helps you
378+
ensure that storage accounts containing activity logs are encrypted with BYOK.
379+
380+
- Storage account containing the container with activity logs must be encrypted with BYOK
381+
388382
## 5.1.7 Ensure that logging for Azure KeyVault is 'Enabled'
389383

390384
This blueprint assigns an [Azure Policy](../../../policy/overview.md) definition that helps you
391385
ensure diagnostic logs are enabled for key vaults.
392386

393387
- Diagnostic logs in Key Vault should be enabled
394388

389+
## 5.2.1 Ensure that Activity Log Alert exists for Create Policy Assignment
390+
391+
This blueprint assigns an [Azure Policy](../../../policy/overview.md) definition that helps you
392+
ensure that specific activity log alerts exists.
393+
394+
- An activity log alert should exist for specific Policy operations
395+
396+
## 5.2.2 Ensure that Activity Log Alert exists for Create or Update Network Security Group
397+
398+
This blueprint assigns an [Azure Policy](../../../policy/overview.md) definition that helps you
399+
ensure that specific activity log alerts exists.
400+
401+
- An activity log alert should exist for specific Administrative operations
402+
403+
## 5.2.3 Ensure that Activity Log Alert exists for Delete Network Security Group
404+
405+
This blueprint assigns an [Azure Policy](../../../policy/overview.md) definition that helps you
406+
ensure that specific activity log alerts exists.
407+
408+
- An activity log alert should exist for specific Administrative operations
409+
410+
## 5.2.4 Ensure that Activity Log Alert exists for Create or Update Network Security Group Rule
411+
412+
This blueprint assigns an [Azure Policy](../../../policy/overview.md) definition that helps you
413+
ensure that specific activity log alerts exists.
414+
415+
- An activity log alert should exist for specific Administrative operations
416+
417+
## 5.2.5 Ensure that activity log alert exists for the Delete Network Security Group Rule
418+
419+
This blueprint assigns an [Azure Policy](../../../policy/overview.md) definition that helps you
420+
ensure that specific activity log alerts exists.
421+
422+
- An activity log alert should exist for specific Administrative operations
423+
424+
## 5.2.6 Ensure that Activity Log Alert exists for Create or Update Security Solution
425+
426+
This blueprint assigns an [Azure Policy](../../../policy/overview.md) definition that helps you
427+
ensure that specific activity log alerts exists.
428+
429+
- An activity log alert should exist for specific Security operations
430+
431+
## 5.2.7 Ensure that Activity Log Alert exists for Delete Security Solution
432+
433+
This blueprint assigns an [Azure Policy](../../../policy/overview.md) definition that helps you
434+
ensure that specific activity log alerts exists.
435+
436+
- An activity log alert should exist for specific Security operations
437+
438+
## 5.2.8 Ensure that Activity Log Alert exists for Create or Update or Delete SQL Server Firewall Rule
439+
440+
This blueprint assigns an [Azure Policy](../../../policy/overview.md) definition that helps you
441+
ensure that specific activity log alerts exists.
442+
443+
- An activity log alert should exist for specific Administrative operations
444+
445+
## 5.2.9 Ensure that Activity Log Alert exists for Update Security Policy
446+
447+
This blueprint assigns an [Azure Policy](../../../policy/overview.md) definition that helps you
448+
ensure that specific activity log alerts exists.
449+
450+
- An activity log alert should exist for specific Security operations
451+
452+
## 6.1 Ensure that RDP access is restricted from the internet
453+
454+
This blueprint assigns an [Azure Policy](../../../policy/overview.md) definition that helps you
455+
ensure that RDP access is restricted.
456+
457+
- RDP access from the Internet should be blocked
458+
459+
## 6.2 Ensure that SSH access is restricted from the internet
460+
461+
This blueprint assigns an [Azure Policy](../../../policy/overview.md) definition that helps you
462+
ensure that SSH access is restricted.
463+
464+
- SSH access from the Internet should be blocked
465+
395466
## 6.5 Ensure that Network Watcher is 'Enabled'
396467

397468
This blueprint assigns an [Azure Policy](../../../policy/overview.md) definition that helps you
@@ -429,7 +500,7 @@ ensure that only approved virtual machine extensions are installed. This policy
429500
a parameter array that specifies all approved virtual machine extensions. This policy initiative
430501
definition contains suggested defaults that customers should validate.
431502

432-
- Only approved VM extensions should be installed
503+
- Only approved VM extensions should be installed
433504

434505
## 7.5 Ensure that the latest OS Patches for all Virtual Machines are applied
435506

@@ -457,7 +528,16 @@ ensure that key vault objects are recoverable in the case of accidental deletion
457528
This blueprint assigns an [Azure Policy](../../../policy/overview.md) definition that helps you
458529
ensure role-based access control is used to managed permissions in Kubernetes service clusters
459530

460-
- \[Preview\]: Role-Based Access Control (RBAC) should be used on Kubernetes Services
531+
- Role-Based Access Control (RBAC) should be used on Kubernetes Services
532+
533+
## 9.1 Ensure App Service Authentication is set on Azure App Service
534+
535+
This blueprint assigns an [Azure Policy](../../../policy/overview.md) definition that helps you
536+
ensure requests to App Service apps are authenticated.
537+
538+
- Authentication should be enabled on your API app
539+
- Authentication should be enabled on your Function app
540+
- Authentication should be enabled on your web app
461541

462542
## 9.2 Ensure web app redirects all HTTP traffic to HTTPS in Azure App Service
463543

@@ -526,7 +606,7 @@ This blueprint assigns [Azure Policy](../../../policy/overview.md) definitions t
526606
that web apps are using the latest version of Java.
527607

528608
- Ensure that 'Java version' is the latest, if used as a part of the Api app
529-
- Ensure that 'Java version' is the latest, if used as a part of the Funtion app
609+
- Ensure that 'Java version' is the latest, if used as a part of the Function app
530610
- Ensure that 'Java version' is the latest, if used as a part of the Web app
531611

532612
## 9.10 Ensure that 'HTTP Version' is the latest, if used to run the web app
@@ -538,7 +618,6 @@ that web apps are using the latest version of HTTP.
538618
- Ensure that 'HTTP Version' is the latest, if used to run the Function app
539619
- Ensure that 'HTTP Version' is the latest, if used to run the Web app
540620

541-
542621
## Next steps
543622

544623
Now that you've reviewed the control mapping of the CIS Microsoft Azure Foundations Benchmark

0 commit comments

Comments
 (0)