Skip to content

Commit 8cd6d31

Browse files
committed
Daily restage
1 parent cc3c112 commit 8cd6d31

File tree

1 file changed

+52
-15
lines changed

1 file changed

+52
-15
lines changed

articles/container-instances/security-baseline.md

Lines changed: 52 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Azure security baseline for Container Instances
44
author: msmbaldwin
55
ms.service: security
66
ms.topic: conceptual
7-
ms.date: 05/20/2020
7+
ms.date: 05/22/2020
88
ms.author: mbaldwin
99
ms.custom: security-benchmark
1010

@@ -141,7 +141,9 @@ Deploy the firewall solution of your choice at each of your organization's netwo
141141
142142
**Guidance**: Deploy Azure Application Gateway for web applications with HTTPS/SSL enabled for trusted certificates.
143143

144-
* [How to deploy Application Gateway](https://docs.microsoft.com/azure/application-gateway/quick-create-portal) * [How to configure Application Gateway to use HTTPS](https://docs.microsoft.com/azure/application-gateway/create-ssl-portal)
144+
* [How to deploy Application Gateway](https://docs.microsoft.com/azure/application-gateway/quick-create-portal)
145+
146+
* [How to configure Application Gateway to use HTTPS](https://docs.microsoft.com/azure/application-gateway/create-ssl-portal)
145147

146148
* [Understand layer 7 load balancing with Azure web application gateways](https://docs.microsoft.com/azure/application-gateway/overview)
147149

@@ -241,7 +243,7 @@ You may use Azure PowerShell or Azure CLI to look-up or perform actions on resou
241243
>[!NOTE]
242244
> To revise the text in this section, update the [underlying Work Item](https://dev.azure.com/AzureSecurityControlsBenchmark/AzureSecurityControlsBenchmarkContent/_queries/edit/21776).
243245
244-
**Guidance**: Microsoft maintains time sources for Azure resources, however, you have the option to manage the time synchronization settings for your compute resources. For example, run a time synchronization command in a running container instance.
246+
**Guidance**: Microsoft maintains time sources for Azure resources, however, you have the option to manage the time synchronization settings for your compute resources. For example, run a time synchronization command in a running container.
245247

246248
* [How to configure time synchronization for Azure compute resources](https://docs.microsoft.com/azure/virtual-machines/windows/time-sync)
247249

@@ -341,7 +343,7 @@ You may use Azure PowerShell or Azure CLI to look-up or perform actions on resou
341343
>[!NOTE]
342344
> To revise the text in this section, update the [underlying Work Item](https://dev.azure.com/AzureSecurityControlsBenchmark/AzureSecurityControlsBenchmarkContent/_queries/edit/21783).
343345
344-
**Guidance**: Provide your own anti-malware solution and event collection if needed to run in container instances.
346+
**Guidance**: Provide your own anti-malware solution and event collection if needed to run in a container.
345347

346348

347349
**Azure Security Center monitoring**: Not applicable
@@ -353,7 +355,7 @@ You may use Azure PowerShell or Azure CLI to look-up or perform actions on resou
353355
>[!NOTE]
354356
> To revise the text in this section, update the [underlying Work Item](https://dev.azure.com/AzureSecurityControlsBenchmark/AzureSecurityControlsBenchmarkContent/_queries/edit/21784).
355357
356-
**Guidance**: Provide your own solution if needed to query DNS logs in container instances.
358+
**Guidance**: Provide your own solution if needed to query DNS logs in a container.
357359

358360
**Azure Security Center monitoring**: Not applicable
359361

@@ -601,7 +603,7 @@ Tag and version container images, to assist in tracking images that store or pro
601603
602604
**Guidance**: Implement separate subscriptions, and/or management groups for development, test, and production. Resources should be separated by VNet/Subnet, tagged appropriately, and secured by an NSG or Azure Firewall. Resources storing or processing sensitive data should be sufficiently isolated.
603605

604-
Resources should be separated by virtual network or subnet, tagged appropriately, and secured by an network security group (NSG) or Azure Firewall.
606+
* [Execute a command in a running Azure container instance](https://docs.microsoft.com/azure/container-instances/container-instances-exec)
605607

606608
* [How to create additional Azure subscriptions](https://docs.microsoft.com/azure/billing/billing-create-subscription)
607609

@@ -742,7 +744,7 @@ For the underlying platform which is managed by Microsoft, Microsoft treats all
742744
743745
**Guidance**: Implement solutions to scan container images in a private registry and identify potential vulnerabilities. Follow recommendations from Azure Security Center on performing vulnerability assessments on container images stored in Azure Container Registry. Optionally deploy third-party solutions from Azure Marketplace to perform image vulnerability assessments.
744746

745-
* [Container monitoring and scanning security recommendations for Azure Container Instances](https://docs.microsoft.com/azure/container-instances/container-instances-image-security)
747+
* [Security considerations for Azure Container Instances](https://docs.microsoft.com/azure/container-instances/container-instances-image-security)
746748

747749
* [Azure Container Registry integration with Security Center](https://docs.microsoft.com/azure/security-center/azure-container-registry-integration)
748750

@@ -759,8 +761,11 @@ For the underlying platform which is managed by Microsoft, Microsoft treats all
759761

760762
Use a custom or third party solution to patch container images. If you store container images in Azure Container Registry, run Azure Container Registry tasks to automate updates to application images in a container registry based on security patches or other updates in base OS images.
761763

764+
* [Security considerations for Azure Container Instances](https://docs.microsoft.com/azure/container-instances/container-instances-image-security)
765+
762766
* [About base image updates for Azure Container Registry tasks](https://docs.microsoft.com/azure/container-registry/container-registry-tasks-base-images)
763767

768+
764769
**Azure Security Center monitoring**: Not applicable
765770

766771
**Responsibility**: Shared
@@ -772,6 +777,8 @@ Use a custom or third party solution to patch container images. If you store con
772777
773778
**Guidance**: Use a custom or third party solution to patch container images. If you store container images in Azure Container Registry, run Azure Container Registry tasks to automate updates to application images in a container registry based on security patches or other updates in base OS images.
774779

780+
* [Security considerations for Azure Container Instances](https://docs.microsoft.com/azure/container-instances/container-instances-image-security)
781+
775782
* [About base image updates for ACR Tasks](https://docs.microsoft.com/azure/container-registry/container-registry-tasks-base-images)
776783

777784
**Azure Security Center monitoring**: Not applicable
@@ -785,6 +792,8 @@ Use a custom or third party solution to patch container images. If you store con
785792
786793
**Guidance**: Export image scanning results at consistent intervals and compare the results to verify that vulnerabilities have been remediated. If you store container images in Azure Container Registry, integrate your registry with Azure Security Center to enable periodic scanning of container images for vulnerabilities. Optionally deploy third-party solutions from Azure Marketplace to perform periodic image vulnerability scans.
787794

795+
* [Security considerations for Azure Container Instances](https://docs.microsoft.com/azure/container-instances/container-instances-image-security)
796+
788797
* [Azure Container Registry integration with Security Center](https://docs.microsoft.com/azure/security-center/azure-container-registry-integration)
789798

790799
**Azure Security Center monitoring**: Yes
@@ -798,6 +807,8 @@ Use a custom or third party solution to patch container images. If you store con
798807
799808
**Guidance**: If you store container images in Azure Container Registry, integrate your registry with Azure Security Center to enable periodic scanning of container images for vulnerabilities and to classify risks. Optionally deploy third-party solutions from Azure Marketplace to perform periodic image vulnerability scans and risk classification.
800809

810+
* [Security considerations for Azure Container Instances](https://docs.microsoft.com/azure/container-instances/container-instances-image-security)
811+
801812
* [Azure Container Registry integration with Security Center](https://docs.microsoft.com/azure/security-center/azure-container-registry-integration)
802813

803814
**Azure Security Center monitoring**: Yes
@@ -895,6 +906,9 @@ Use Azure Resource Graph to query/discover resources within their subscription(s
895906
> To revise the text in this section, update the [underlying Work Item](https://dev.azure.com/AzureSecurityControlsBenchmark/AzureSecurityControlsBenchmarkContent/_queries/edit/21818).
896907
897908
**Guidance**: Implement your own solution, or a third-party solution, to inventory software for approved containerized applications.
909+
910+
Implement solutions to scan container images in a private registry and identify potential vulnerabilities. Follow recommendations from Azure Security Center to perform vulnerability assessments on container images stored in Azure Container Registry. Optionally deploy third-party solutions from Azure Marketplace to perform image vulnerability assessments.
911+
898912
Monitor Azure Container Instances logs for anomalous behavior and regularly review results. Use Azure Monitor's Log Analytics Workspace to review logs and perform queries on log data.
899913

900914
* [Container group and instance logging with Azure Monitor logs](https://docs.microsoft.com/azure/container-instances/container-instances-log-analytics)
@@ -903,6 +917,11 @@ Monitor Azure Container Instances logs for anomalous behavior and regularly revi
903917

904918
* [How to perform custom queries in Azure Monitor](https://docs.microsoft.com/azure/azure-monitor/log-query/get-started-queries)
905919

920+
* [Security considerations for Azure Container Instances](https://docs.microsoft.com/azure/container-instances/container-instances-image-security)
921+
* [Azure Container Registry integration with Security Center](https://docs.microsoft.com/azure/security-center/azure-container-registry-integration)
922+
923+
924+
906925
**Azure Security Center monitoring**: Not applicable
907926

908927
**Responsibility**: Customer
@@ -925,7 +944,8 @@ Monitor Azure Container Instances logs for anomalous behavior and regularly revi
925944
>[!NOTE]
926945
> To revise the text in this section, update the [underlying Work Item](https://dev.azure.com/AzureSecurityControlsBenchmark/AzureSecurityControlsBenchmarkContent/_queries/edit/21820).
927946
928-
**Guidance**: Not applicable; this recommendation is designed for IaaS compute resources.
947+
**Guidance**: Tag and version container images, to assist in tracking images that run approved applications.
948+
* [Recommendations for tagging and versioning container images](https://docs.microsoft.com/azure/container-registry/container-registry-image-tag-version)
929949

930950

931951
**Azure Security Center monitoring**: Not applicable
@@ -952,7 +972,8 @@ Monitor Azure Container Instances logs for anomalous behavior and regularly revi
952972
>[!NOTE]
953973
> To revise the text in this section, update the [underlying Work Item](https://dev.azure.com/AzureSecurityControlsBenchmark/AzureSecurityControlsBenchmarkContent/_queries/edit/21822).
954974
955-
**Guidance**: Not applicable; this recommendation is intended for IaaS compute resources.
975+
**Guidance**: Tag and version container images, to assist in tracking images that run approved applications.
976+
* [Recommendations for tagging and versioning container images](https://docs.microsoft.com/azure/container-registry/container-registry-image-tag-version)
956977

957978

958979
**Azure Security Center monitoring**: Not applicable
@@ -977,11 +998,19 @@ Monitor Azure Container Instances logs for anomalous behavior and regularly revi
977998
>[!NOTE]
978999
> To revise the text in this section, update the [underlying Work Item](https://dev.azure.com/AzureSecurityControlsBenchmark/AzureSecurityControlsBenchmarkContent/_queries/edit/21824).
9791000
980-
**Guidance**: Not applicable; this recommendation is intended for IaaS compute resources.
1001+
**Guidance**: All users with access to Azure Container Instances can execute scripts within containers.
1002+
1003+
Manage and review access to Azure Container Instances resources by using different Azure subscriptions or management groups, or isolate resources using virtual networks and NSGs or Azure Firewall.
1004+
1005+
* [Execute a command in a running Azure container instance](https://docs.microsoft.com/azure/container-instances/container-instances-exec)
1006+
1007+
* [How to create additional Azure subscriptions](https://docs.microsoft.com/azure/billing/billing-create-subscription)* [How to create management groups](https://docs.microsoft.com/azure/governance/management-groups/create)* [Deploy in a virtual network - Azure Container Instances](https://docs.microsoft.com/azure/container-instances/container-instances-vnet) * [How to create an NSG with a security config](https://docs.microsoft.com/azure/virtual-network/tutorial-filter-network-traffic)* [How to deploy Azure Firewall](https://docs.microsoft.com/azure/firewall/tutorial-firewall-deploy-portal)
1008+
1009+
9811010

9821011
**Azure Security Center monitoring**: Not applicable
9831012

984-
**Responsibility**: Not applicable
1013+
**Responsibility**: Customer
9851014

9861015
### 6.13: Physically or logically segregate high risk applications
9871016

@@ -1053,11 +1082,13 @@ Monitor Azure Container Instances logs for anomalous behavior and regularly revi
10531082
>[!NOTE]
10541083
> To revise the text in this section, update the [underlying Work Item](https://dev.azure.com/AzureSecurityControlsBenchmark/AzureSecurityControlsBenchmarkContent/_queries/edit/21829).
10551084
1056-
**Guidance**: Implement solutions to scan container images in a private registry and identify potential vulnerabilities in OS configurations. Follow recommendations from Azure Security Center on performing vulnerability assessments on container images stored in Azure Container Registry. Optionally deploy third-party solutions from Azure Marketplace to perform image vulnerability assessments.
1085+
**Guidance**: Implement solutions to scan container images in a private registry and identify potential vulnerabilities in OS configurations. Follow recommendations from Azure Security Center to perform vulnerability assessments on container images stored in Azure Container Registry. Optionally deploy third-party solutions from Azure Marketplace to perform image vulnerability assessments.
10571086

10581087
Use a custom or third party solution to patch container images. If you store container images in Azure Container Registry, run Azure Container Registry tasks to automate updates to application images in a container registry based on security patches or other updates in base OS images.
10591088

1060-
* [Container monitoring and scanning security recommendations for Azure Container Instances](https://docs.microsoft.com/azure/container-instances/container-instances-image-security)* [Azure Container Registry integration with Security Center](https://docs.microsoft.com/azure/security-center/azure-container-registry-integration)
1089+
* [Container monitoring and scanning security recommendations for Azure Container Instances](https://docs.microsoft.com/azure/container-instances/container-instances-image-security)
1090+
1091+
* [Azure Container Registry integration with Security Center](https://docs.microsoft.com/azure/security-center/azure-container-registry-integration)
10611092
* [About base image updates for Azure Container Registry tasks](https://docs.microsoft.com/azure/container-registry/container-registry-tasks-base-images)
10621093

10631094

@@ -1086,7 +1117,11 @@ Use a custom or third party solution to patch container images. If you store con
10861117
>[!NOTE]
10871118
> To revise the text in this section, update the [underlying Work Item](https://dev.azure.com/AzureSecurityControlsBenchmark/AzureSecurityControlsBenchmarkContent/_queries/edit/21831).
10881119
1089-
**Guidance**: Store container images in Azure Container Registry and leverage RBAC to ensure only authorized users may access the images. * [Understand RBAC in Azure](https://docs.microsoft.com/azure/role-based-access-control/rbac-and-directory-admin-roles)* [Understand RBAC for Container Registry](https://docs.microsoft.com/azure/container-registry/container-registry-roles)
1120+
**Guidance**: Store container images in Azure Container Registry and leverage RBAC to ensure only authorized users may access the images.
1121+
1122+
* [Understand RBAC in Azure](https://docs.microsoft.com/azure/role-based-access-control/rbac-and-directory-admin-roles)
1123+
1124+
* [Understand RBAC for Container Registry](https://docs.microsoft.com/azure/container-registry/container-registry-roles)
10901125

10911126
* [How to configure RBAC in Azure](https://docs.microsoft.com/azure/role-based-access-control/quickstart-assign-role-user-portal)
10921127

@@ -1142,7 +1177,9 @@ Use Azure Policy to put restrictions on the type of resources that can be create
11421177
>[!NOTE]
11431178
> To revise the text in this section, update the [underlying Work Item](https://dev.azure.com/AzureSecurityControlsBenchmark/AzureSecurityControlsBenchmarkContent/_queries/edit/21835).
11441179
1145-
**Guidance**: If you use Azure Container Registry to store container images, use Azure Security Center to perform baseline scans for OS and Docker settings for containers. * [Understand Azure Security Center container recommendations](https://docs.microsoft.com/azure/security-center/security-center-container-recommendations)
1180+
**Guidance**: If you use Azure Container Registry to store container images, use Azure Security Center to perform baseline scans for OS and Docker settings for containers.
1181+
1182+
* [Understand Azure Security Center container recommendations](https://docs.microsoft.com/azure/security-center/security-center-container-recommendations)
11461183

11471184

11481185
**Azure Security Center monitoring**: Yes

0 commit comments

Comments
 (0)