You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -141,7 +141,9 @@ Deploy the firewall solution of your choice at each of your organization's netwo
141
141
142
142
**Guidance**: Deploy Azure Application Gateway for web applications with HTTPS/SSL enabled for trusted certificates.
143
143
144
-
*[How to deploy Application Gateway](https://docs.microsoft.com/azure/application-gateway/quick-create-portal) * [How to configure Application Gateway to use HTTPS](https://docs.microsoft.com/azure/application-gateway/create-ssl-portal)
144
+
*[How to deploy Application Gateway](https://docs.microsoft.com/azure/application-gateway/quick-create-portal)
145
+
146
+
*[How to configure Application Gateway to use HTTPS](https://docs.microsoft.com/azure/application-gateway/create-ssl-portal)
145
147
146
148
*[Understand layer 7 load balancing with Azure web application gateways](https://docs.microsoft.com/azure/application-gateway/overview)
147
149
@@ -241,7 +243,7 @@ You may use Azure PowerShell or Azure CLI to look-up or perform actions on resou
241
243
>[!NOTE]
242
244
> To revise the text in this section, update the [underlying Work Item](https://dev.azure.com/AzureSecurityControlsBenchmark/AzureSecurityControlsBenchmarkContent/_queries/edit/21776).
243
245
244
-
**Guidance**: Microsoft maintains time sources for Azure resources, however, you have the option to manage the time synchronization settings for your compute resources. For example, run a time synchronization command in a running container instance.
246
+
**Guidance**: Microsoft maintains time sources for Azure resources, however, you have the option to manage the time synchronization settings for your compute resources. For example, run a time synchronization command in a running container.
245
247
246
248
*[How to configure time synchronization for Azure compute resources](https://docs.microsoft.com/azure/virtual-machines/windows/time-sync)
247
249
@@ -341,7 +343,7 @@ You may use Azure PowerShell or Azure CLI to look-up or perform actions on resou
341
343
>[!NOTE]
342
344
> To revise the text in this section, update the [underlying Work Item](https://dev.azure.com/AzureSecurityControlsBenchmark/AzureSecurityControlsBenchmarkContent/_queries/edit/21783).
343
345
344
-
**Guidance**: Provide your own anti-malware solution and event collection if needed to run in container instances.
346
+
**Guidance**: Provide your own anti-malware solution and event collection if needed to run in a container.
345
347
346
348
347
349
**Azure Security Center monitoring**: Not applicable
@@ -353,7 +355,7 @@ You may use Azure PowerShell or Azure CLI to look-up or perform actions on resou
353
355
>[!NOTE]
354
356
> To revise the text in this section, update the [underlying Work Item](https://dev.azure.com/AzureSecurityControlsBenchmark/AzureSecurityControlsBenchmarkContent/_queries/edit/21784).
355
357
356
-
**Guidance**: Provide your own solution if needed to query DNS logs in container instances.
358
+
**Guidance**: Provide your own solution if needed to query DNS logs in a container.
357
359
358
360
**Azure Security Center monitoring**: Not applicable
359
361
@@ -601,7 +603,7 @@ Tag and version container images, to assist in tracking images that store or pro
601
603
602
604
**Guidance**: Implement separate subscriptions, and/or management groups for development, test, and production. Resources should be separated by VNet/Subnet, tagged appropriately, and secured by an NSG or Azure Firewall. Resources storing or processing sensitive data should be sufficiently isolated.
603
605
604
-
Resources should be separated by virtual network or subnet, tagged appropriately, and secured by an network security group (NSG) or Azure Firewall.
606
+
*[Execute a command in a running Azure container instance](https://docs.microsoft.com/azure/container-instances/container-instances-exec)
605
607
606
608
*[How to create additional Azure subscriptions](https://docs.microsoft.com/azure/billing/billing-create-subscription)
607
609
@@ -742,7 +744,7 @@ For the underlying platform which is managed by Microsoft, Microsoft treats all
742
744
743
745
**Guidance**: Implement solutions to scan container images in a private registry and identify potential vulnerabilities. Follow recommendations from Azure Security Center on performing vulnerability assessments on container images stored in Azure Container Registry. Optionally deploy third-party solutions from Azure Marketplace to perform image vulnerability assessments.
744
746
745
-
*[Container monitoring and scanning security recommendations for Azure Container Instances](https://docs.microsoft.com/azure/container-instances/container-instances-image-security)
747
+
*[Security considerations for Azure Container Instances](https://docs.microsoft.com/azure/container-instances/container-instances-image-security)
746
748
747
749
*[Azure Container Registry integration with Security Center](https://docs.microsoft.com/azure/security-center/azure-container-registry-integration)
748
750
@@ -759,8 +761,11 @@ For the underlying platform which is managed by Microsoft, Microsoft treats all
759
761
760
762
Use a custom or third party solution to patch container images. If you store container images in Azure Container Registry, run Azure Container Registry tasks to automate updates to application images in a container registry based on security patches or other updates in base OS images.
761
763
764
+
*[Security considerations for Azure Container Instances](https://docs.microsoft.com/azure/container-instances/container-instances-image-security)
765
+
762
766
*[About base image updates for Azure Container Registry tasks](https://docs.microsoft.com/azure/container-registry/container-registry-tasks-base-images)
763
767
768
+
764
769
**Azure Security Center monitoring**: Not applicable
765
770
766
771
**Responsibility**: Shared
@@ -772,6 +777,8 @@ Use a custom or third party solution to patch container images. If you store con
772
777
773
778
**Guidance**: Use a custom or third party solution to patch container images. If you store container images in Azure Container Registry, run Azure Container Registry tasks to automate updates to application images in a container registry based on security patches or other updates in base OS images.
774
779
780
+
*[Security considerations for Azure Container Instances](https://docs.microsoft.com/azure/container-instances/container-instances-image-security)
781
+
775
782
*[About base image updates for ACR Tasks](https://docs.microsoft.com/azure/container-registry/container-registry-tasks-base-images)
776
783
777
784
**Azure Security Center monitoring**: Not applicable
@@ -785,6 +792,8 @@ Use a custom or third party solution to patch container images. If you store con
785
792
786
793
**Guidance**: Export image scanning results at consistent intervals and compare the results to verify that vulnerabilities have been remediated. If you store container images in Azure Container Registry, integrate your registry with Azure Security Center to enable periodic scanning of container images for vulnerabilities. Optionally deploy third-party solutions from Azure Marketplace to perform periodic image vulnerability scans.
787
794
795
+
*[Security considerations for Azure Container Instances](https://docs.microsoft.com/azure/container-instances/container-instances-image-security)
796
+
788
797
*[Azure Container Registry integration with Security Center](https://docs.microsoft.com/azure/security-center/azure-container-registry-integration)
789
798
790
799
**Azure Security Center monitoring**: Yes
@@ -798,6 +807,8 @@ Use a custom or third party solution to patch container images. If you store con
798
807
799
808
**Guidance**: If you store container images in Azure Container Registry, integrate your registry with Azure Security Center to enable periodic scanning of container images for vulnerabilities and to classify risks. Optionally deploy third-party solutions from Azure Marketplace to perform periodic image vulnerability scans and risk classification.
800
809
810
+
*[Security considerations for Azure Container Instances](https://docs.microsoft.com/azure/container-instances/container-instances-image-security)
811
+
801
812
*[Azure Container Registry integration with Security Center](https://docs.microsoft.com/azure/security-center/azure-container-registry-integration)
802
813
803
814
**Azure Security Center monitoring**: Yes
@@ -895,6 +906,9 @@ Use Azure Resource Graph to query/discover resources within their subscription(s
895
906
> To revise the text in this section, update the [underlying Work Item](https://dev.azure.com/AzureSecurityControlsBenchmark/AzureSecurityControlsBenchmarkContent/_queries/edit/21818).
896
907
897
908
**Guidance**: Implement your own solution, or a third-party solution, to inventory software for approved containerized applications.
909
+
910
+
Implement solutions to scan container images in a private registry and identify potential vulnerabilities. Follow recommendations from Azure Security Center to perform vulnerability assessments on container images stored in Azure Container Registry. Optionally deploy third-party solutions from Azure Marketplace to perform image vulnerability assessments.
911
+
898
912
Monitor Azure Container Instances logs for anomalous behavior and regularly review results. Use Azure Monitor's Log Analytics Workspace to review logs and perform queries on log data.
899
913
900
914
*[Container group and instance logging with Azure Monitor logs](https://docs.microsoft.com/azure/container-instances/container-instances-log-analytics)
@@ -903,6 +917,11 @@ Monitor Azure Container Instances logs for anomalous behavior and regularly revi
903
917
904
918
*[How to perform custom queries in Azure Monitor](https://docs.microsoft.com/azure/azure-monitor/log-query/get-started-queries)
905
919
920
+
*[Security considerations for Azure Container Instances](https://docs.microsoft.com/azure/container-instances/container-instances-image-security)
921
+
*[Azure Container Registry integration with Security Center](https://docs.microsoft.com/azure/security-center/azure-container-registry-integration)
922
+
923
+
924
+
906
925
**Azure Security Center monitoring**: Not applicable
907
926
908
927
**Responsibility**: Customer
@@ -925,7 +944,8 @@ Monitor Azure Container Instances logs for anomalous behavior and regularly revi
925
944
>[!NOTE]
926
945
> To revise the text in this section, update the [underlying Work Item](https://dev.azure.com/AzureSecurityControlsBenchmark/AzureSecurityControlsBenchmarkContent/_queries/edit/21820).
927
946
928
-
**Guidance**: Not applicable; this recommendation is designed for IaaS compute resources.
947
+
**Guidance**: Tag and version container images, to assist in tracking images that run approved applications.
948
+
*[Recommendations for tagging and versioning container images](https://docs.microsoft.com/azure/container-registry/container-registry-image-tag-version)
929
949
930
950
931
951
**Azure Security Center monitoring**: Not applicable
@@ -952,7 +972,8 @@ Monitor Azure Container Instances logs for anomalous behavior and regularly revi
952
972
>[!NOTE]
953
973
> To revise the text in this section, update the [underlying Work Item](https://dev.azure.com/AzureSecurityControlsBenchmark/AzureSecurityControlsBenchmarkContent/_queries/edit/21822).
954
974
955
-
**Guidance**: Not applicable; this recommendation is intended for IaaS compute resources.
975
+
**Guidance**: Tag and version container images, to assist in tracking images that run approved applications.
976
+
*[Recommendations for tagging and versioning container images](https://docs.microsoft.com/azure/container-registry/container-registry-image-tag-version)
956
977
957
978
958
979
**Azure Security Center monitoring**: Not applicable
@@ -977,11 +998,19 @@ Monitor Azure Container Instances logs for anomalous behavior and regularly revi
977
998
>[!NOTE]
978
999
> To revise the text in this section, update the [underlying Work Item](https://dev.azure.com/AzureSecurityControlsBenchmark/AzureSecurityControlsBenchmarkContent/_queries/edit/21824).
979
1000
980
-
**Guidance**: Not applicable; this recommendation is intended for IaaS compute resources.
1001
+
**Guidance**: All users with access to Azure Container Instances can execute scripts within containers.
1002
+
1003
+
Manage and review access to Azure Container Instances resources by using different Azure subscriptions or management groups, or isolate resources using virtual networks and NSGs or Azure Firewall.
1004
+
1005
+
*[Execute a command in a running Azure container instance](https://docs.microsoft.com/azure/container-instances/container-instances-exec)
1006
+
1007
+
*[How to create additional Azure subscriptions](https://docs.microsoft.com/azure/billing/billing-create-subscription)*[How to create management groups](https://docs.microsoft.com/azure/governance/management-groups/create)*[Deploy in a virtual network - Azure Container Instances](https://docs.microsoft.com/azure/container-instances/container-instances-vnet) * [How to create an NSG with a security config](https://docs.microsoft.com/azure/virtual-network/tutorial-filter-network-traffic)*[How to deploy Azure Firewall](https://docs.microsoft.com/azure/firewall/tutorial-firewall-deploy-portal)
1008
+
1009
+
981
1010
982
1011
**Azure Security Center monitoring**: Not applicable
983
1012
984
-
**Responsibility**: Not applicable
1013
+
**Responsibility**: Customer
985
1014
986
1015
### 6.13: Physically or logically segregate high risk applications
987
1016
@@ -1053,11 +1082,13 @@ Monitor Azure Container Instances logs for anomalous behavior and regularly revi
1053
1082
>[!NOTE]
1054
1083
> To revise the text in this section, update the [underlying Work Item](https://dev.azure.com/AzureSecurityControlsBenchmark/AzureSecurityControlsBenchmarkContent/_queries/edit/21829).
1055
1084
1056
-
**Guidance**: Implement solutions to scan container images in a private registry and identify potential vulnerabilities in OS configurations. Follow recommendations from Azure Security Center on performing vulnerability assessments on container images stored in Azure Container Registry. Optionally deploy third-party solutions from Azure Marketplace to perform image vulnerability assessments.
1085
+
**Guidance**: Implement solutions to scan container images in a private registry and identify potential vulnerabilities in OS configurations. Follow recommendations from Azure Security Center to perform vulnerability assessments on container images stored in Azure Container Registry. Optionally deploy third-party solutions from Azure Marketplace to perform image vulnerability assessments.
1057
1086
1058
1087
Use a custom or third party solution to patch container images. If you store container images in Azure Container Registry, run Azure Container Registry tasks to automate updates to application images in a container registry based on security patches or other updates in base OS images.
1059
1088
1060
-
*[Container monitoring and scanning security recommendations for Azure Container Instances](https://docs.microsoft.com/azure/container-instances/container-instances-image-security)*[Azure Container Registry integration with Security Center](https://docs.microsoft.com/azure/security-center/azure-container-registry-integration)
1089
+
*[Container monitoring and scanning security recommendations for Azure Container Instances](https://docs.microsoft.com/azure/container-instances/container-instances-image-security)
1090
+
1091
+
*[Azure Container Registry integration with Security Center](https://docs.microsoft.com/azure/security-center/azure-container-registry-integration)
1061
1092
*[About base image updates for Azure Container Registry tasks](https://docs.microsoft.com/azure/container-registry/container-registry-tasks-base-images)
1062
1093
1063
1094
@@ -1086,7 +1117,11 @@ Use a custom or third party solution to patch container images. If you store con
1086
1117
>[!NOTE]
1087
1118
> To revise the text in this section, update the [underlying Work Item](https://dev.azure.com/AzureSecurityControlsBenchmark/AzureSecurityControlsBenchmarkContent/_queries/edit/21831).
1088
1119
1089
-
**Guidance**: Store container images in Azure Container Registry and leverage RBAC to ensure only authorized users may access the images. * [Understand RBAC in Azure](https://docs.microsoft.com/azure/role-based-access-control/rbac-and-directory-admin-roles)*[Understand RBAC for Container Registry](https://docs.microsoft.com/azure/container-registry/container-registry-roles)
1120
+
**Guidance**: Store container images in Azure Container Registry and leverage RBAC to ensure only authorized users may access the images.
1121
+
1122
+
*[Understand RBAC in Azure](https://docs.microsoft.com/azure/role-based-access-control/rbac-and-directory-admin-roles)
1123
+
1124
+
*[Understand RBAC for Container Registry](https://docs.microsoft.com/azure/container-registry/container-registry-roles)
1090
1125
1091
1126
*[How to configure RBAC in Azure](https://docs.microsoft.com/azure/role-based-access-control/quickstart-assign-role-user-portal)
1092
1127
@@ -1142,7 +1177,9 @@ Use Azure Policy to put restrictions on the type of resources that can be create
1142
1177
>[!NOTE]
1143
1178
> To revise the text in this section, update the [underlying Work Item](https://dev.azure.com/AzureSecurityControlsBenchmark/AzureSecurityControlsBenchmarkContent/_queries/edit/21835).
1144
1179
1145
-
**Guidance**: If you use Azure Container Registry to store container images, use Azure Security Center to perform baseline scans for OS and Docker settings for containers. * [Understand Azure Security Center container recommendations](https://docs.microsoft.com/azure/security-center/security-center-container-recommendations)
1180
+
**Guidance**: If you use Azure Container Registry to store container images, use Azure Security Center to perform baseline scans for OS and Docker settings for containers.
1181
+
1182
+
*[Understand Azure Security Center container recommendations](https://docs.microsoft.com/azure/security-center/security-center-container-recommendations)
0 commit comments