1
1
---
2
2
title : CIS Microsoft Azure Foundations Benchmark blueprint sample controls
3
3
description : Recommendation mapping of the CIS Microsoft Azure Foundations Benchmark blueprint sample to Azure Policy.
4
- ms.date : 11/04/2019
4
+ ms.date : 05/01/2020
5
5
ms.topic : sample
6
6
---
7
7
# Recommendation mapping of the CIS Microsoft Azure Foundations Benchmark blueprint sample
@@ -36,7 +36,7 @@ This blueprint assigns [Azure Policy](../../../policy/overview.md) definitions t
36
36
when multi-factor authentication isn't enabled on privileged Azure Active Directory accounts.
37
37
38
38
- MFA should be enabled on accounts with owner permissions on your subscription
39
- - MFA should be enabled on accounts with write permissions on your subscription
39
+ - MFA should be enabled accounts with write permissions on your subscription
40
40
41
41
## 1.2 Ensure that multi-factor authentication is enabled for all non-privileged users
42
42
@@ -51,9 +51,9 @@ accounts.
51
51
This blueprint assigns [ Azure Policy] ( ../../../policy/overview.md ) definitions that help you monitor
52
52
for guest accounts that may need removed.
53
53
54
- - External accounts with owner permissions should be removed from your subscription
55
54
- External accounts with read permissions should be removed from your subscription
56
55
- External accounts with write permissions should be removed from your subscription
56
+ - External accounts with owner permissions should be removed from your subscription
57
57
58
58
## 1.23 Ensure that no custom subscription owner roles are created
59
59
@@ -67,14 +67,15 @@ for custom subscription owner roles that may need removed.
67
67
This blueprint assigns an [ Azure Policy] ( ../../../policy/overview.md ) definition that helps you
68
68
monitor networks and virtual machines where the Security Center standard tier isn't enabled.
69
69
70
- - Security Center standard pricing tier should be selected
70
+ - Security Center standard pricing tier should be selected
71
71
72
72
## 2.2 Ensure that 'Automatic provisioning of monitoring agent' is set to 'On'
73
73
74
74
This blueprint assigns an [ Azure Policy] ( ../../../policy/overview.md ) definition that helps you
75
75
ensure automatic provisioning of the Log Analytics agent is enabled.
76
76
77
- - Automatic provisioning of the Log Analytics monitoring agent should be enabled on your subscription
77
+ - Automatic provisioning of the Log Analytics monitoring agent should be enabled on your
78
+ subscription
78
79
79
80
## 2.3 Ensure ASC Default policy setting "Monitor System Updates" is not "Disabled"
80
81
@@ -109,14 +110,7 @@ ensure virtual machine disks are encrypted.
109
110
This blueprint assigns an [ Azure Policy] ( ../../../policy/overview.md ) definition that helps you
110
111
protect Internet-facing virtual machines.
111
112
112
- - Network Security Group Rules for Internet facing virtual machines should be hardened
113
-
114
- ## 2.8 Ensure ASC Default policy setting "Monitor Web Application Firewall" is not "Disabled"
115
-
116
- This blueprint assigns an [ Azure Policy] ( ../../../policy/overview.md ) definition that helps you
117
- protect virtual machines running web applications.
118
-
119
- - The NSGs rules for web applications on IaaS should be hardened
113
+ - Adaptive Network Hardening recommendations should be applied on internet facing virtual machines
120
114
121
115
## 2.9 Ensure ASC Default policy setting "Enable Next Generation Firewall(NGFW) Monitoring" is not "Disabled"
122
116
@@ -126,7 +120,7 @@ referenced by this CIS Microsoft Azure Foundations Benchmark recommendation has
126
120
new recommendations. The policies referenced below address the new recommendations.
127
121
128
122
- Subnets should be associated with a Network Security Group
129
- - Virtual machines should be associated with a Network Security Group
123
+ - Internet-facing virtual machines should be protected with Network Security Groups
130
124
131
125
## 2.10 Ensure ASC Default policy setting "Monitor Vulnerability Assessment" is not "Disabled"
132
126
@@ -159,7 +153,7 @@ ensure Adaptive Application Controls is enabled on virtual machines.
159
153
This blueprint assigns an [ Azure Policy] ( ../../../policy/overview.md ) definition that helps ensure
160
154
SQL server auditing is enabled.
161
155
162
- - Auditing should be enabled on advanced data security settings on SQL Server
156
+ - Auditing on SQL server should be enabled
163
157
164
158
## 2.15 Ensure ASC Default policy setting "Monitor SQL Encryption" is not "Disabled"
165
159
@@ -222,7 +216,7 @@ monitor storage accounts that don't allow access from trusted Microsoft services
222
216
This blueprint assigns an [ Azure Policy] ( ../../../policy/overview.md ) definition that helps ensure
223
217
SQL server auditing is enabled.
224
218
225
- - Auditing should be enabled on advanced data security settings on SQL Server
219
+ - Auditing on SQL server should be enabled
226
220
227
221
## 4.2 Ensure that 'AuditActionGroups' in 'auditing' policy for a SQL server is set properly
228
222
@@ -243,8 +237,8 @@ ensure SQL server logs are retained for at least 90 days.
243
237
This blueprint assigns an [ Azure Policy] ( ../../../policy/overview.md ) definition that helps you
244
238
ensure advanced data security is enabled on SQL servers and SQL managed instances.
245
239
246
- - Advanced data security should be enabled on your SQL managed instances
247
240
- Advanced data security should be enabled on your SQL servers
241
+ - Advanced data security should be enabled on your SQL managed instances
248
242
249
243
## 4.5 Ensure that 'Threat Detection types' is set to 'All'
250
244
@@ -261,20 +255,20 @@ advanced threat protection is properly configured on SQL servers and SQL managed
261
255
This blueprint assigns an [ Azure Policy] ( ../../../policy/overview.md ) definition that helps you
262
256
ensure advanced data security notifications are properly enabled.
263
257
264
- - Advanced data security settings for SQL managed instance should contain an email address to
265
- receive security alerts
266
258
- Advanced data security settings for SQL server should contain an email address to receive security
267
259
alerts
260
+ - Advanced data security settings for SQL managed instance should contain an email address to
261
+ receive security alerts
268
262
269
263
## 4.7 Ensure that 'Email service and co-administrators' is 'Enabled'
270
264
271
265
This blueprint assigns an [ Azure Policy] ( ../../../policy/overview.md ) definition that helps you
272
266
ensure advanced data security notifications are properly enabled.
273
267
274
- - Email notifications to admins and subscription owners should be enabled in SQL managed instance
275
- advanced data security settings
276
268
- Email notifications to admins and subscription owners should be enabled in SQL server advanced
277
269
data security settings
270
+ - Email notifications to admins and subscription owners should be enabled in SQL managed instance
271
+ advanced data security settings
278
272
279
273
## 4.8 Ensure that Azure Active Directory Admin is configured
280
274
@@ -296,8 +290,8 @@ This blueprint assigns [Azure Policy](../../../policy/overview.md) definitions t
296
290
the transparent data encrypted protector for SQL servers and SQL managed instances is encrypted with
297
291
your own key.
298
292
299
- - SQL managed instance TDE protector should be encrypted with your own key
300
293
- SQL server TDE protector should be encrypted with your own key
294
+ - SQL managed instance TDE protector should be encrypted with your own key
301
295
302
296
## 4.11 Ensure 'Enforce SSL connection' is set to 'ENABLED' for MySQL Database Server
303
297
@@ -385,13 +379,97 @@ ensure that the log profile is properly configured.
385
379
386
380
- Azure Monitor should collect activity logs from all regions
387
381
382
+ ## 5.1.6 Ensure the storage account containing the container with activity logs is encrypted with BYOK (Use Your Own Key)
383
+
384
+ This blueprint assigns an [ Azure Policy] ( ../../../policy/overview.md ) definition that helps you
385
+ ensure that storage accounts containing activity logs are encrypted with BYOK.
386
+
387
+ - Storage account containing the container with activity logs must be encrypted with BYOK
388
+
388
389
## 5.1.7 Ensure that logging for Azure KeyVault is 'Enabled'
389
390
390
391
This blueprint assigns an [ Azure Policy] ( ../../../policy/overview.md ) definition that helps you
391
392
ensure diagnostic logs are enabled for key vaults.
392
393
393
394
- Diagnostic logs in Key Vault should be enabled
394
395
396
+ ## 5.2.1 Ensure that Activity Log Alert exists for Create Policy Assignment
397
+
398
+ This blueprint assigns an [ Azure Policy] ( ../../../policy/overview.md ) definition that helps you
399
+ ensure that specific activity log alerts exists.
400
+
401
+ - An activity log alert should exist for specific Policy operations
402
+
403
+ ## 5.2.2 Ensure that Activity Log Alert exists for Create or Update Network Security Group
404
+
405
+ This blueprint assigns an [ Azure Policy] ( ../../../policy/overview.md ) definition that helps you
406
+ ensure that specific activity log alerts exists.
407
+
408
+ - An activity log alert should exist for specific Administrative operations
409
+
410
+ ## 5.2.3 Ensure that Activity Log Alert exists for Delete Network Security Group
411
+
412
+ This blueprint assigns an [ Azure Policy] ( ../../../policy/overview.md ) definition that helps you
413
+ ensure that specific activity log alerts exists.
414
+
415
+ - An activity log alert should exist for specific Administrative operations
416
+
417
+ ## 5.2.4 Ensure that Activity Log Alert exists for Create or Update Network Security Group Rule
418
+
419
+ This blueprint assigns an [ Azure Policy] ( ../../../policy/overview.md ) definition that helps you
420
+ ensure that specific activity log alerts exists.
421
+
422
+ - An activity log alert should exist for specific Administrative operations
423
+
424
+ ## 5.2.5 Ensure that activity log alert exists for the Delete Network Security Group Rule
425
+
426
+ This blueprint assigns an [ Azure Policy] ( ../../../policy/overview.md ) definition that helps you
427
+ ensure that specific activity log alerts exists.
428
+
429
+ - An activity log alert should exist for specific Administrative operations
430
+
431
+ ## 5.2.6 Ensure that Activity Log Alert exists for Create or Update Security Solution
432
+
433
+ This blueprint assigns an [ Azure Policy] ( ../../../policy/overview.md ) definition that helps you
434
+ ensure that specific activity log alerts exists.
435
+
436
+ - An activity log alert should exist for specific Security operations
437
+
438
+ ## 5.2.7 Ensure that Activity Log Alert exists for Delete Security Solution
439
+
440
+ This blueprint assigns an [ Azure Policy] ( ../../../policy/overview.md ) definition that helps you
441
+ ensure that specific activity log alerts exists.
442
+
443
+ - An activity log alert should exist for specific Security operations
444
+
445
+ ## 5.2.8 Ensure that Activity Log Alert exists for Create or Update or Delete SQL Server Firewall Rule
446
+
447
+ This blueprint assigns an [ Azure Policy] ( ../../../policy/overview.md ) definition that helps you
448
+ ensure that specific activity log alerts exists.
449
+
450
+ - An activity log alert should exist for specific Administrative operations
451
+
452
+ ## 5.2.9 Ensure that Activity Log Alert exists for Update Security Policy
453
+
454
+ This blueprint assigns an [ Azure Policy] ( ../../../policy/overview.md ) definition that helps you
455
+ ensure that specific activity log alerts exists.
456
+
457
+ - An activity log alert should exist for specific Security operations
458
+
459
+ ## 6.1 Ensure that RDP access is restricted from the internet
460
+
461
+ This blueprint assigns an [ Azure Policy] ( ../../../policy/overview.md ) definition that helps you
462
+ ensure that RDP access is restricted.
463
+
464
+ - RDP access from the Internet should be blocked
465
+
466
+ ## 6.2 Ensure that SSH access is restricted from the internet
467
+
468
+ This blueprint assigns an [ Azure Policy] ( ../../../policy/overview.md ) definition that helps you
469
+ ensure that SSH access is restricted.
470
+
471
+ - SSH access from the Internet should be blocked
472
+
395
473
## 6.5 Ensure that Network Watcher is 'Enabled'
396
474
397
475
This blueprint assigns an [ Azure Policy] ( ../../../policy/overview.md ) definition that helps you
@@ -429,7 +507,7 @@ ensure that only approved virtual machine extensions are installed. This policy
429
507
a parameter array that specifies all approved virtual machine extensions. This policy initiative
430
508
definition contains suggested defaults that customers should validate.
431
509
432
- - Only approved VM extensions should be installed
510
+ - Only approved VM extensions should be installed
433
511
434
512
## 7.5 Ensure that the latest OS Patches for all Virtual Machines are applied
435
513
@@ -457,7 +535,16 @@ ensure that key vault objects are recoverable in the case of accidental deletion
457
535
This blueprint assigns an [ Azure Policy] ( ../../../policy/overview.md ) definition that helps you
458
536
ensure role-based access control is used to managed permissions in Kubernetes service clusters
459
537
460
- - \[ Preview\] : Role-Based Access Control (RBAC) should be used on Kubernetes Services
538
+ - Role-Based Access Control (RBAC) should be used on Kubernetes Services
539
+
540
+ ## 9.1 Ensure App Service Authentication is set on Azure App Service
541
+
542
+ This blueprint assigns an [ Azure Policy] ( ../../../policy/overview.md ) definition that helps you
543
+ ensure requests to App Service apps are authenticated.
544
+
545
+ - Authentication should be enabled on your API app
546
+ - Authentication should be enabled on your Function app
547
+ - Authentication should be enabled on your web app
461
548
462
549
## 9.2 Ensure web app redirects all HTTP traffic to HTTPS in Azure App Service
463
550
@@ -526,7 +613,7 @@ This blueprint assigns [Azure Policy](../../../policy/overview.md) definitions t
526
613
that web apps are using the latest version of Java.
527
614
528
615
- Ensure that 'Java version' is the latest, if used as a part of the Api app
529
- - Ensure that 'Java version' is the latest, if used as a part of the Funtion app
616
+ - Ensure that 'Java version' is the latest, if used as a part of the Function app
530
617
- Ensure that 'Java version' is the latest, if used as a part of the Web app
531
618
532
619
## 9.10 Ensure that 'HTTP Version' is the latest, if used to run the web app
@@ -538,7 +625,6 @@ that web apps are using the latest version of HTTP.
538
625
- Ensure that 'HTTP Version' is the latest, if used to run the Function app
539
626
- Ensure that 'HTTP Version' is the latest, if used to run the Web app
540
627
541
-
542
628
## Next steps
543
629
544
630
Now that you've reviewed the control mapping of the CIS Microsoft Azure Foundations Benchmark
0 commit comments