Skip to content

Commit d913897

Browse files
Merge pull request #113618 from jomolesk/cis-r4
Update CIS initiative control mapping
2 parents ee8f717 + cf25948 commit d913897

File tree

1 file changed

+112
-26
lines changed

1 file changed

+112
-26
lines changed

articles/governance/blueprints/samples/cis-azure-1.1.0/control-mapping.md

Lines changed: 112 additions & 26 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: CIS Microsoft Azure Foundations Benchmark blueprint sample controls
33
description: Recommendation mapping of the CIS Microsoft Azure Foundations Benchmark blueprint sample to Azure Policy.
4-
ms.date: 11/04/2019
4+
ms.date: 05/01/2020
55
ms.topic: sample
66
---
77
# Recommendation mapping of the CIS Microsoft Azure Foundations Benchmark blueprint sample
@@ -36,7 +36,7 @@ This blueprint assigns [Azure Policy](../../../policy/overview.md) definitions t
3636
when multi-factor authentication isn't enabled on privileged Azure Active Directory accounts.
3737

3838
- MFA should be enabled on accounts with owner permissions on your subscription
39-
- MFA should be enabled on accounts with write permissions on your subscription
39+
- MFA should be enabled accounts with write permissions on your subscription
4040

4141
## 1.2 Ensure that multi-factor authentication is enabled for all non-privileged users
4242

@@ -51,9 +51,9 @@ accounts.
5151
This blueprint assigns [Azure Policy](../../../policy/overview.md) definitions that help you monitor
5252
for guest accounts that may need removed.
5353

54-
- External accounts with owner permissions should be removed from your subscription
5554
- External accounts with read permissions should be removed from your subscription
5655
- External accounts with write permissions should be removed from your subscription
56+
- External accounts with owner permissions should be removed from your subscription
5757

5858
## 1.23 Ensure that no custom subscription owner roles are created
5959

@@ -67,14 +67,15 @@ for custom subscription owner roles that may need removed.
6767
This blueprint assigns an [Azure Policy](../../../policy/overview.md) definition that helps you
6868
monitor networks and virtual machines where the Security Center standard tier isn't enabled.
6969

70-
- Security Center standard pricing tier should be selected
70+
- Security Center standard pricing tier should be selected
7171

7272
## 2.2 Ensure that 'Automatic provisioning of monitoring agent' is set to 'On'
7373

7474
This blueprint assigns an [Azure Policy](../../../policy/overview.md) definition that helps you
7575
ensure automatic provisioning of the Log Analytics agent is enabled.
7676

77-
- Automatic provisioning of the Log Analytics monitoring agent should be enabled on your subscription
77+
- Automatic provisioning of the Log Analytics monitoring agent should be enabled on your
78+
subscription
7879

7980
## 2.3 Ensure ASC Default policy setting "Monitor System Updates" is not "Disabled"
8081

@@ -109,14 +110,7 @@ ensure virtual machine disks are encrypted.
109110
This blueprint assigns an [Azure Policy](../../../policy/overview.md) definition that helps you
110111
protect Internet-facing virtual machines.
111112

112-
- Network Security Group Rules for Internet facing virtual machines should be hardened
113-
114-
## 2.8 Ensure ASC Default policy setting "Monitor Web Application Firewall" is not "Disabled"
115-
116-
This blueprint assigns an [Azure Policy](../../../policy/overview.md) definition that helps you
117-
protect virtual machines running web applications.
118-
119-
- The NSGs rules for web applications on IaaS should be hardened
113+
- Adaptive Network Hardening recommendations should be applied on internet facing virtual machines
120114

121115
## 2.9 Ensure ASC Default policy setting "Enable Next Generation Firewall(NGFW) Monitoring" is not "Disabled"
122116

@@ -126,7 +120,7 @@ referenced by this CIS Microsoft Azure Foundations Benchmark recommendation has
126120
new recommendations. The policies referenced below address the new recommendations.
127121

128122
- Subnets should be associated with a Network Security Group
129-
- Virtual machines should be associated with a Network Security Group
123+
- Internet-facing virtual machines should be protected with Network Security Groups
130124

131125
## 2.10 Ensure ASC Default policy setting "Monitor Vulnerability Assessment" is not "Disabled"
132126

@@ -159,7 +153,7 @@ ensure Adaptive Application Controls is enabled on virtual machines.
159153
This blueprint assigns an [Azure Policy](../../../policy/overview.md) definition that helps ensure
160154
SQL server auditing is enabled.
161155

162-
- Auditing should be enabled on advanced data security settings on SQL Server
156+
- Auditing on SQL server should be enabled
163157

164158
## 2.15 Ensure ASC Default policy setting "Monitor SQL Encryption" is not "Disabled"
165159

@@ -222,7 +216,7 @@ monitor storage accounts that don't allow access from trusted Microsoft services
222216
This blueprint assigns an [Azure Policy](../../../policy/overview.md) definition that helps ensure
223217
SQL server auditing is enabled.
224218

225-
- Auditing should be enabled on advanced data security settings on SQL Server
219+
- Auditing on SQL server should be enabled
226220

227221
## 4.2 Ensure that 'AuditActionGroups' in 'auditing' policy for a SQL server is set properly
228222

@@ -243,8 +237,8 @@ ensure SQL server logs are retained for at least 90 days.
243237
This blueprint assigns an [Azure Policy](../../../policy/overview.md) definition that helps you
244238
ensure advanced data security is enabled on SQL servers and SQL managed instances.
245239

246-
- Advanced data security should be enabled on your SQL managed instances
247240
- Advanced data security should be enabled on your SQL servers
241+
- Advanced data security should be enabled on your SQL managed instances
248242

249243
## 4.5 Ensure that 'Threat Detection types' is set to 'All'
250244

@@ -261,20 +255,20 @@ advanced threat protection is properly configured on SQL servers and SQL managed
261255
This blueprint assigns an [Azure Policy](../../../policy/overview.md) definition that helps you
262256
ensure advanced data security notifications are properly enabled.
263257

264-
- Advanced data security settings for SQL managed instance should contain an email address to
265-
receive security alerts
266258
- Advanced data security settings for SQL server should contain an email address to receive security
267259
alerts
260+
- Advanced data security settings for SQL managed instance should contain an email address to
261+
receive security alerts
268262

269263
## 4.7 Ensure that 'Email service and co-administrators' is 'Enabled'
270264

271265
This blueprint assigns an [Azure Policy](../../../policy/overview.md) definition that helps you
272266
ensure advanced data security notifications are properly enabled.
273267

274-
- Email notifications to admins and subscription owners should be enabled in SQL managed instance
275-
advanced data security settings
276268
- Email notifications to admins and subscription owners should be enabled in SQL server advanced
277269
data security settings
270+
- Email notifications to admins and subscription owners should be enabled in SQL managed instance
271+
advanced data security settings
278272

279273
## 4.8 Ensure that Azure Active Directory Admin is configured
280274

@@ -296,8 +290,8 @@ This blueprint assigns [Azure Policy](../../../policy/overview.md) definitions t
296290
the transparent data encrypted protector for SQL servers and SQL managed instances is encrypted with
297291
your own key.
298292

299-
- SQL managed instance TDE protector should be encrypted with your own key
300293
- SQL server TDE protector should be encrypted with your own key
294+
- SQL managed instance TDE protector should be encrypted with your own key
301295

302296
## 4.11 Ensure 'Enforce SSL connection' is set to 'ENABLED' for MySQL Database Server
303297

@@ -385,13 +379,97 @@ ensure that the log profile is properly configured.
385379

386380
- Azure Monitor should collect activity logs from all regions
387381

382+
## 5.1.6 Ensure the storage account containing the container with activity logs is encrypted with BYOK (Use Your Own Key)
383+
384+
This blueprint assigns an [Azure Policy](../../../policy/overview.md) definition that helps you
385+
ensure that storage accounts containing activity logs are encrypted with BYOK.
386+
387+
- Storage account containing the container with activity logs must be encrypted with BYOK
388+
388389
## 5.1.7 Ensure that logging for Azure KeyVault is 'Enabled'
389390

390391
This blueprint assigns an [Azure Policy](../../../policy/overview.md) definition that helps you
391392
ensure diagnostic logs are enabled for key vaults.
392393

393394
- Diagnostic logs in Key Vault should be enabled
394395

396+
## 5.2.1 Ensure that Activity Log Alert exists for Create Policy Assignment
397+
398+
This blueprint assigns an [Azure Policy](../../../policy/overview.md) definition that helps you
399+
ensure that specific activity log alerts exists.
400+
401+
- An activity log alert should exist for specific Policy operations
402+
403+
## 5.2.2 Ensure that Activity Log Alert exists for Create or Update Network Security Group
404+
405+
This blueprint assigns an [Azure Policy](../../../policy/overview.md) definition that helps you
406+
ensure that specific activity log alerts exists.
407+
408+
- An activity log alert should exist for specific Administrative operations
409+
410+
## 5.2.3 Ensure that Activity Log Alert exists for Delete Network Security Group
411+
412+
This blueprint assigns an [Azure Policy](../../../policy/overview.md) definition that helps you
413+
ensure that specific activity log alerts exists.
414+
415+
- An activity log alert should exist for specific Administrative operations
416+
417+
## 5.2.4 Ensure that Activity Log Alert exists for Create or Update Network Security Group Rule
418+
419+
This blueprint assigns an [Azure Policy](../../../policy/overview.md) definition that helps you
420+
ensure that specific activity log alerts exists.
421+
422+
- An activity log alert should exist for specific Administrative operations
423+
424+
## 5.2.5 Ensure that activity log alert exists for the Delete Network Security Group Rule
425+
426+
This blueprint assigns an [Azure Policy](../../../policy/overview.md) definition that helps you
427+
ensure that specific activity log alerts exists.
428+
429+
- An activity log alert should exist for specific Administrative operations
430+
431+
## 5.2.6 Ensure that Activity Log Alert exists for Create or Update Security Solution
432+
433+
This blueprint assigns an [Azure Policy](../../../policy/overview.md) definition that helps you
434+
ensure that specific activity log alerts exists.
435+
436+
- An activity log alert should exist for specific Security operations
437+
438+
## 5.2.7 Ensure that Activity Log Alert exists for Delete Security Solution
439+
440+
This blueprint assigns an [Azure Policy](../../../policy/overview.md) definition that helps you
441+
ensure that specific activity log alerts exists.
442+
443+
- An activity log alert should exist for specific Security operations
444+
445+
## 5.2.8 Ensure that Activity Log Alert exists for Create or Update or Delete SQL Server Firewall Rule
446+
447+
This blueprint assigns an [Azure Policy](../../../policy/overview.md) definition that helps you
448+
ensure that specific activity log alerts exists.
449+
450+
- An activity log alert should exist for specific Administrative operations
451+
452+
## 5.2.9 Ensure that Activity Log Alert exists for Update Security Policy
453+
454+
This blueprint assigns an [Azure Policy](../../../policy/overview.md) definition that helps you
455+
ensure that specific activity log alerts exists.
456+
457+
- An activity log alert should exist for specific Security operations
458+
459+
## 6.1 Ensure that RDP access is restricted from the internet
460+
461+
This blueprint assigns an [Azure Policy](../../../policy/overview.md) definition that helps you
462+
ensure that RDP access is restricted.
463+
464+
- RDP access from the Internet should be blocked
465+
466+
## 6.2 Ensure that SSH access is restricted from the internet
467+
468+
This blueprint assigns an [Azure Policy](../../../policy/overview.md) definition that helps you
469+
ensure that SSH access is restricted.
470+
471+
- SSH access from the Internet should be blocked
472+
395473
## 6.5 Ensure that Network Watcher is 'Enabled'
396474

397475
This blueprint assigns an [Azure Policy](../../../policy/overview.md) definition that helps you
@@ -429,7 +507,7 @@ ensure that only approved virtual machine extensions are installed. This policy
429507
a parameter array that specifies all approved virtual machine extensions. This policy initiative
430508
definition contains suggested defaults that customers should validate.
431509

432-
- Only approved VM extensions should be installed
510+
- Only approved VM extensions should be installed
433511

434512
## 7.5 Ensure that the latest OS Patches for all Virtual Machines are applied
435513

@@ -457,7 +535,16 @@ ensure that key vault objects are recoverable in the case of accidental deletion
457535
This blueprint assigns an [Azure Policy](../../../policy/overview.md) definition that helps you
458536
ensure role-based access control is used to managed permissions in Kubernetes service clusters
459537

460-
- \[Preview\]: Role-Based Access Control (RBAC) should be used on Kubernetes Services
538+
- Role-Based Access Control (RBAC) should be used on Kubernetes Services
539+
540+
## 9.1 Ensure App Service Authentication is set on Azure App Service
541+
542+
This blueprint assigns an [Azure Policy](../../../policy/overview.md) definition that helps you
543+
ensure requests to App Service apps are authenticated.
544+
545+
- Authentication should be enabled on your API app
546+
- Authentication should be enabled on your Function app
547+
- Authentication should be enabled on your web app
461548

462549
## 9.2 Ensure web app redirects all HTTP traffic to HTTPS in Azure App Service
463550

@@ -526,7 +613,7 @@ This blueprint assigns [Azure Policy](../../../policy/overview.md) definitions t
526613
that web apps are using the latest version of Java.
527614

528615
- Ensure that 'Java version' is the latest, if used as a part of the Api app
529-
- Ensure that 'Java version' is the latest, if used as a part of the Funtion app
616+
- Ensure that 'Java version' is the latest, if used as a part of the Function app
530617
- Ensure that 'Java version' is the latest, if used as a part of the Web app
531618

532619
## 9.10 Ensure that 'HTTP Version' is the latest, if used to run the web app
@@ -538,7 +625,6 @@ that web apps are using the latest version of HTTP.
538625
- Ensure that 'HTTP Version' is the latest, if used to run the Function app
539626
- Ensure that 'HTTP Version' is the latest, if used to run the Web app
540627

541-
542628
## Next steps
543629

544630
Now that you've reviewed the control mapping of the CIS Microsoft Azure Foundations Benchmark

0 commit comments

Comments
 (0)