Skip to content

Commit d259c48

Browse files
committed
Addressed PR review feedback
1 parent 9530e2c commit d259c48

11 files changed

+16
-16
lines changed

articles/security/benchmarks/security-control-data-protection.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -125,6 +125,6 @@ Use Azure Monitor with the Azure Activity Log to create alerts for when changes
125125
- [How to create alerts for Azure Activity Log events](https://docs.microsoft.com/azure/azure-monitor/platform/alerts-activity-log)
126126

127127

128-
## Next Steps
128+
## Next steps
129129

130130
- See the next Security Control: [Vulnerability Management](security-control-vulnerability-management.md)

articles/security/benchmarks/security-control-data-recovery.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -65,6 +65,6 @@ Enable Soft-Delete and purge protection in Key Vault to protect keys against acc
6565
- [Soft delete for Azure Storage blobs](https://docs.microsoft.com/azure/storage/blobs/storage-blob-soft-delete?tabs=azure-portal)
6666

6767

68-
## Next Steps
68+
## Next steps
6969

7070
- See the next Security Control: [Incident Response](security-control-incident-response.md)

articles/security/benchmarks/security-control-identity-access-control.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -161,6 +161,6 @@ In support scenarios where Microsoft needs to access customer data, Customer Loc
161161
- [Understand Customer Lockbox](https://docs.microsoft.com/azure/security/fundamentals/customer-lockbox-overview)
162162

163163

164-
## Next Steps
164+
## Next steps
165165

166166
- See the next Security Control: [Data Protection](security-control-data-protection.md)

articles/security/benchmarks/security-control-incident-response.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -85,6 +85,6 @@ Use the Workflow Automation feature in Azure Security Center to automatically tr
8585
- [How to configure Workflow Automation and Logic Apps](https://docs.microsoft.com/azure/security-center/workflow-automation)
8686

8787

88-
## Next Steps
88+
## Next steps
8989

9090
- See the next Security Control: [Penetration Tests and Red Team Exercises](security-control-penetration-tests-red-team-exercises.md)

articles/security/benchmarks/security-control-inventory-asset-management.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -60,7 +60,7 @@ Use tagging, management groups, and separate subscriptions, where appropriate, t
6060
|--|--|--|
6161
| 6.4 | 2.1 | Customer |
6262

63-
Create an inventory of approved Azure resources and approved software for compute resources as pery our organizational needs.
63+
Create an inventory of approved Azure resources and approved software for compute resources as per our organizational needs.
6464

6565
## 6.5: Monitor for unapproved Azure resources
6666

@@ -82,7 +82,7 @@ Use Azure Resource Graph to query/discover resources within their subscription(s
8282
|--|--|--|
8383
| 6.6 | 2.3, 2.4 | Customer |
8484

85-
Use Azure virtual machine Inventory to automate the collection of information about all software on Virtual Machines. Software Name, Version, Publisher, and Refresh time are available from the Azure Portal. To get access to install date and other information, enable guest-level diagnostics and bring the Windows Event Logs into a Log Analytics Workspace.
85+
Use Azure virtual machine Inventory to automate the collection of information about all software on Virtual Machines. Software Name, Version, Publisher, and Refresh time are available from the Azure portal. To get access to install date and other information, enable guest-level diagnostics and bring the Windows Event Logs into a Log Analytics Workspace.
8686

8787
- [How to enable Azure virtual machine Inventory](https://docs.microsoft.com/azure/automation/automation-tutorial-installed-software)
8888

@@ -169,6 +169,6 @@ Software that is required for business operations, but may incur higher risk for
169169
- [How to create an NSG with a security config](https://docs.microsoft.com/azure/virtual-network/tutorial-filter-network-traffic)
170170

171171

172-
## Next Steps
172+
## Next steps
173173

174174
- See the next Security Control: [Secure Configuration](security-control-secure-configuration.md)

articles/security/benchmarks/security-control-logging-monitoring.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -149,6 +149,6 @@ Use Microsoft Monitoring Agent on all supported Azure Windows virtual machines t
149149
- [Syslog data sources in Azure Monitor](https://docs.microsoft.com/azure/azure-monitor/platform/data-sources-syslog)
150150

151151

152-
## Next Steps
152+
## Next steps
153153

154154
- See the next Security Control: [Identity and Access Control](security-control-identity-access-control.md)

articles/security/benchmarks/security-control-malware-defense.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -53,6 +53,6 @@ Microsoft Antimalware will automatically install the latest signatures and engin
5353
- [How to deploy Microsoft Antimalware for Azure Cloud Services and Virtual Machines](https://docs.microsoft.com/azure/security/fundamentals/antimalware)
5454

5555

56-
## Next Steps
56+
## Next steps
5757

5858
- See the next Security Control: [Data Recovery](security-control-data-recovery.md)

articles/security/benchmarks/security-control-network-security.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -182,6 +182,6 @@ Use Azure Activity Log to monitor resource configurations and detect changes to
182182

183183
- [How to create alerts in Azure Monitor](https://docs.microsoft.com/azure/azure-monitor/platform/alerts-activity-log)
184184

185-
## Next Steps
185+
## Next steps
186186

187187
- See the next Security Control: [Logging and Monitoring](security-control-logging-monitoring.md)

articles/security/benchmarks/security-control-penetration-tests-red-team-exercises.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -14,19 +14,19 @@ ms.custom: security-benchmark
1414

1515
Test the overall strength of an organization's defense (the technology, the processes, and the people) by simulating the objectives and actions of an attacker.
1616

17-
## 11.1: Conduct regular penetration testing of your Azure resources and ensure remediation of allcritical security findings
17+
## 11.1: Conduct regular penetration testing of your Azure resources and ensure remediation of all critical security findings
1818

1919
| Azure ID | CIS IDs | Responsibility |
2020
|--|--|--|
2121
| 11.1 | 20.1, 20.2, 20.3, 20.4, 20.5, 20.6, 20.7, 20.8 | Shared |
2222

23-
Follow the Microsoft Rules of Engagement to ensure your Penetration Tests are not in violation of Microsoft policies. Use Microsofts strategy and execution of Red Teaming and live site penetration testing against Microsoft-managed cloud infrastructure, services, and applications.
23+
Follow the Microsoft Rules of Engagement to ensure your Penetration Tests are not in violation of Microsoft policies. Use Microsoft's strategy and execution of Red Teaming and live site penetration testing against Microsoft-managed cloud infrastructure, services, and applications.
2424

2525
- [Penetration Testing Rules of Engagement](https://www.microsoft.com/msrc/pentest-rules-of-engagement?rtc=1)
2626

2727
- [Microsoft Cloud Red Teaming](https://gallery.technet.microsoft.com/Cloud-Red-Teaming-b837392e)
2828

2929

30-
## Next Steps
30+
## Next steps
3131

3232
- Return to the [Azure Security Benchmark overview](overview.md)

articles/security/benchmarks/security-control-secure-configuration.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ Establish, implement, and actively manage (track, report on, correct) the securi
2222

2323
Use Azure Policy aliases to create custom policies to audit or enforce the configuration of your Azure resources. You may also use built-in Azure Policy definitions.
2424

25-
Also, Azure Resource Manager has the ability to export the template in Java Script Object Notation (JSON), which should be reviewed to ensure that the configurations meet / exceed the security requirements for your organization.
25+
Also, Azure Resource Manager has the ability to export the template in JavaScript Object Notation (JSON), which should be reviewed to ensure that the configurations meet / exceed the security requirements for your organization.
2626

2727
You may also use recommendations from Azure Security Center as a secure configuration baseline for your Azure resources.
2828

@@ -193,6 +193,6 @@ Implement Credential Scanner to identify credentials within code. Credential Sca
193193
- [How to setup Credential Scanner](https://secdevtools.azurewebsites.net/helpcredscan.html)
194194

195195

196-
## Next Steps
196+
## Next steps
197197

198198
- See the next Security Control: [Malware Defense](security-control-malware-defense.md)

0 commit comments

Comments
 (0)