You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -21,9 +21,9 @@ For more information, see the [Azure security baselines overview](https://docs.m
21
21
>[!WARNING]
22
22
>This preview version of the article is for review only. **DO NOT MERGE INTO MASTER!**
23
23
24
-
## Network Security
24
+
## Network security
25
25
26
-
*For more information, see [Security control: Network Security](https://docs.microsoft.com/azure/security/benchmarks/security-control-network-security).*
26
+
*For more information, see [Security control: Network security](https://docs.microsoft.com/azure/security/benchmarks/security-control-network-security).*
27
27
28
28
### 1.1: Protect resources using Network Security Groups or Azure Firewall on your Virtual Network
29
29
@@ -192,9 +192,9 @@ How to create alerts in Azure Monitor: https://docs.microsoft.com/azure/azure-mo
192
192
193
193
**Responsibility**: Customer
194
194
195
-
## Logging and Monitoring
195
+
## Logging and monitoring
196
196
197
-
*For more information, see [Security control: Logging and Monitoring](https://docs.microsoft.com/azure/security/benchmarks/security-control-logging-monitoring).*
197
+
*For more information, see [Security control: Logging and monitoring](https://docs.microsoft.com/azure/security/benchmarks/security-control-logging-monitoring).*
198
198
199
199
### 2.1: Use approved time synchronization sources
200
200
@@ -324,9 +324,9 @@ How to alert on log analytics log data: https://docs.microsoft.com/azure/azure-m
324
324
325
325
**Responsibility**: Customer
326
326
327
-
## Identity and Access Control
327
+
## Identity and access control
328
328
329
-
*For more information, see [Security control: Identity and Access Control](https://docs.microsoft.com/azure/security/benchmarks/security-control-identity-access-control).*
329
+
*For more information, see [Security control: Identity and access control](https://docs.microsoft.com/azure/security/benchmarks/security-control-identity-access-control).*
330
330
331
331
### 3.1: Maintain an inventory of administrative accounts
332
332
@@ -524,9 +524,9 @@ List of Customer Lockbox supported services: https://docs.microsoft.com/azure/se
524
524
525
525
**Responsibility**: Customer
526
526
527
-
## Data Protection
527
+
## Data protection
528
528
529
-
*For more information, see [Security control: Data Protection](https://docs.microsoft.com/azure/security/benchmarks/security-control-data-protection).*
529
+
*For more information, see [Security control: Data protection](https://docs.microsoft.com/azure/security/benchmarks/security-control-data-protection).*
530
530
531
531
### 4.1: Maintain an inventory of sensitive Information
532
532
@@ -677,9 +677,9 @@ Azure Container Registry logs for diagnostic evaluation and auditing: https://do
677
677
678
678
**Responsibility**: Customer
679
679
680
-
## Vulnerability Management
680
+
## Vulnerability management
681
681
682
-
*For more information, see [Security control: Vulnerability Management](https://docs.microsoft.com/azure/security/benchmarks/security-control-vulnerability-management).*
682
+
*For more information, see [Security control: Vulnerability management](https://docs.microsoft.com/azure/security/benchmarks/security-control-vulnerability-management).*
683
683
684
684
### 5.1: Run automated vulnerability scanning tools
685
685
@@ -750,9 +750,9 @@ Azure Container Registry integration with Security Center (Preview): https://doc
750
750
751
751
**Responsibility**: Customer
752
752
753
-
## Inventory and Asset Management
753
+
## Inventory and asset management
754
754
755
-
*For more information, see [Security control: Inventory and Asset Management](https://docs.microsoft.com/azure/security/benchmarks/security-control-inventory-asset-management).*
755
+
*For more information, see [Security control: Inventory and asset management](https://docs.microsoft.com/azure/security/benchmarks/security-control-inventory-asset-management).*
756
756
757
757
### 6.1: Use Azure Asset Discovery
758
758
@@ -943,9 +943,9 @@ How to create an NSG with a security config: https://docs.microsoft.com/azure/vi
943
943
944
944
**Responsibility**: Customer
945
945
946
-
## Secure Configuration
946
+
## Secure configuration
947
947
948
-
*For more information, see [Security control: Secure Configuration](https://docs.microsoft.com/azure/security/benchmarks/security-control-secure-configuration).*
948
+
*For more information, see [Security control: Secure configuration](https://docs.microsoft.com/azure/security/benchmarks/security-control-secure-configuration).*
949
949
950
950
### 7.1: Establish secure configurations for all Azure resources
951
951
@@ -1132,9 +1132,9 @@ How to setup Credential Scanner: https://secdevtools.azurewebsites.net/helpcreds
1132
1132
1133
1133
**Responsibility**: Customer
1134
1134
1135
-
## Malware Defense
1135
+
## Malware defense
1136
1136
1137
-
*For more information, see [Security control: Malware Defense](https://docs.microsoft.com/azure/security/benchmarks/security-control-malware-defense).*
1137
+
*For more information, see [Security control: Malware defense](https://docs.microsoft.com/azure/security/benchmarks/security-control-malware-defense).*
1138
1138
1139
1139
### 8.1: Use centrally managed anti-malware software
1140
1140
@@ -1173,9 +1173,9 @@ Pre-scan any files being uploaded to non-compute Azure resources, such as App Se
1173
1173
1174
1174
**Responsibility**: Customer
1175
1175
1176
-
## Data Recovery
1176
+
## Data recovery
1177
1177
1178
-
*For more information, see [Security control: Data Recovery](https://docs.microsoft.com/azure/security/benchmarks/security-control-data-recovery).*
1178
+
*For more information, see [Security control: Data recovery](https://docs.microsoft.com/azure/security/benchmarks/security-control-data-recovery).*
1179
1179
1180
1180
### 9.1: Ensure regular automated back ups
1181
1181
@@ -1235,9 +1235,9 @@ How to enable Soft-Delete in Key Vault: https://docs.microsoft.com/azure/storage
1235
1235
1236
1236
**Responsibility**: Customer
1237
1237
1238
-
## Incident Response
1238
+
## Incident response
1239
1239
1240
-
*For more information, see [Security control: Incident Response](https://docs.microsoft.com/azure/security/benchmarks/security-control-incident-response).*
1240
+
*For more information, see [Security control: Incident response](https://docs.microsoft.com/azure/security/benchmarks/security-control-incident-response).*
1241
1241
1242
1242
### 10.1: Create an incident response guide
1243
1243
@@ -1325,9 +1325,9 @@ How to configure Workflow Automation and Logic Apps: https://docs.microsoft.com/
1325
1325
1326
1326
**Responsibility**: Customer
1327
1327
1328
-
## Penetration Tests and Red Team Exercises
1328
+
## Penetration tests and red team exercises
1329
1329
1330
-
*For more information, see [Security control: Penetration Tests and Red Team Exercises](https://docs.microsoft.com/azure/security/benchmarks/security-control-penetration-tests-red-team-exercises).*
1330
+
*For more information, see [Security control: Penetration tests and red team exercises](https://docs.microsoft.com/azure/security/benchmarks/security-control-penetration-tests-red-team-exercises).*
1331
1331
1332
1332
### 11.1: Conduct regular penetration testing of your Azure resources and ensure remediation of all critical security findings within 60 days
0 commit comments