You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/governance/blueprints/samples/dod-impact-level-4/control-mapping.md
+74-3Lines changed: 74 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,7 +1,7 @@
1
1
---
2
2
title: DoD Impact Level 4 blueprint sample controls
3
3
description: Control mapping of the DoD Impact Level 4 blueprint sample. Each control is mapped to one or more Azure Policies that assist with assessment.
4
-
ms.date: 02/09/2020
4
+
ms.date: 03/06/2020
5
5
ms.topic: sample
6
6
---
7
7
# Control mapping of the DoD Impact Level 4 blueprint sample
@@ -131,6 +131,22 @@ indicators can help you ensure remote access methods comply with your security p
131
131
- Remote debugging should be turned off for Function App
132
132
- Remote debugging should be turned off for Web Application
133
133
134
+
## AC-23 Data Mining
135
+
136
+
This blueprint provides policy definitions that help you ensure data security notifications are
137
+
properly enabled. In addition, this blueprint ensures that auditing and advanced data security are
138
+
configured on SQL Servers.
139
+
140
+
- Advanced data security should be enabled on your SQL servers
141
+
- Advanced data security should be enabled on your SQL managed instances
142
+
- Advanced Threat Protection types should be set to 'All' in SQL server Advanced Data Security settings
143
+
- Advanced Threat Protection types should be set to 'All' in SQL managed instance Advanced Data Security settings
144
+
- Auditing should be enabled on advanced data security settings on SQL Server
145
+
- Email notifications to admins and subscription owners should be enabled in SQL server advanced data security settings
146
+
- Email notifications to admins and subscription owners should be enabled in SQL managed instance advanced data security settings
147
+
- Advanced data security settings for SQL server should contain an email address to receive security alerts
148
+
- Advanced data security settings for SQL managed instance should contain an email address to receive security alerts
149
+
134
150
## AU-3 (2) Content of Audit Records | Centralized Management of Planned Audit Record Content
135
151
136
152
Log data collected by Azure Monitor is stored in a Log Analytics workspace enabling centralized
@@ -183,8 +199,6 @@ For detailed vulnerability scanning and monitoring, we recommend you leverage Az
183
199
Azure Security Center as well.
184
200
185
201
-\[Preview\]: Vulnerability Assessment should be enabled on Virtual Machines
186
-
-\[Preview\]: Enable Azure Monitor for VMs
187
-
-\[Preview\]: Enable Azure Monitor for VM Scale Sets (VMSS)
188
202
- Vulnerability assessment should be enabled on your SQL servers
189
203
- Audit diagnostic setting
190
204
- Vulnerability assessment should be enabled on your SQL managed instances
@@ -193,6 +207,8 @@ Azure Security Center as well.
193
207
- Vulnerabilities on your SQL databases should be remediated
194
208
- Vulnerabilities should be remediated by a Vulnerability Assessment solution
195
209
- Vulnerabilities in security configuration on your virtual machine scale sets should be remediated
0 commit comments