Skip to content

Commit fa7304e

Browse files
committed
Adjust formatting
1 parent 7c65141 commit fa7304e

File tree

1 file changed

+33
-25
lines changed

1 file changed

+33
-25
lines changed

articles/governance/blueprints/samples/cis-azure-1.1.0/control-mapping.md

Lines changed: 33 additions & 25 deletions
Original file line numberDiff line numberDiff line change
@@ -8,26 +8,27 @@ ms.topic: sample
88

99
The following article details how the Azure Blueprints CIS Microsoft Azure Foundations Benchmark
1010
blueprint sample maps to the CIS Microsoft Azure Foundations Benchmark recommendations. For more
11-
information about the recommendations, see [CIS Microsoft Azure Foundations Benchmark](https://www.cisecurity.org/benchmark/azure/).
11+
information about the recommendations, see
12+
[CIS Microsoft Azure Foundations Benchmark](https://www.cisecurity.org/benchmark/azure/).
1213

1314
The following mappings are to the **CIS Microsoft Azure Foundations Benchmark v1.1.0**
14-
recommendations. Use the navigation on the right to jump directly to a specific recommendation mapping.
15-
Many of the mapped recommendations are implemented with an [Azure Policy](../../../policy/overview.md)
16-
initiative. To review the complete initiative, open **Policy** in the Azure portal and select the
17-
**Definitions** page. Then, find and select the **\[Preview\] Audit CIS Microsoft Azure Foundations
18-
Benchmark v1.1.0 recommendations and deploy specific VM Extensions to support audit requirements**
19-
built-in policy initiative.
20-
21-
> [!IMPORTANT]
22-
> Each control below is associated with one or more [Azure Policy](../../../policy/overview.md)
23-
> definitions. These policies may help you [assess compliance](../../../policy/how-to/get-compliance-data.md)
24-
> with the control; however, there often is not a 1:1 or complete match between a control and one or
25-
> more policies. As such, **Compliant** in Azure Policy refers only to the policies themselves; this
26-
> doesn't ensure you're fully compliant with all requirements of a control. In addition, the
27-
> compliance standard includes controls that aren't addressed by any Azure Policy definitions at
28-
> this time. Therefore, compliance in Azure Policy is only a partial view of your overall compliance
29-
> status. The associations between controls and Azure Policy definitions for this compliance
30-
> blueprint sample may change over time. To view the change history, see the
15+
recommendations. Use the navigation on the right to jump directly to a specific recommendation
16+
mapping. Many of the mapped recommendations are implemented with an
17+
[Azure Policy](../../../policy/overview.md) initiative. To review the complete initiative, open
18+
**Policy** in the Azure portal and select the **Definitions** page. Then, find and select the
19+
**\[Preview\] Audit CIS Microsoft Azure Foundations Benchmark v1.1.0 recommendations and deploy
20+
specific VM Extensions to support audit requirements** built-in policy initiative.
21+
22+
> [!IMPORTANT] Each control below is associated with one or more
23+
> [Azure Policy](../../../policy/overview.md) definitions. These policies may help you
24+
> [assess compliance](../../../policy/how-to/get-compliance-data.md) with the control; however,
25+
> there often is not a 1:1 or complete match between a control and one or more policies. As such,
26+
> **Compliant** in Azure Policy refers only to the policies themselves; this doesn't ensure you're
27+
> fully compliant with all requirements of a control. In addition, the compliance standard includes
28+
> controls that aren't addressed by any Azure Policy definitions at this time. Therefore, compliance
29+
> in Azure Policy is only a partial view of your overall compliance status. The associations between
30+
> controls and Azure Policy definitions for this compliance blueprint sample may change over time.
31+
> To view the change history, see the
3132
> [GitHub Commit History](https://github.com/MicrosoftDocs/azure-docs/commits/master/articles/governance/blueprints/samples/cis-azure-1.1.0/control-mapping.md).
3233
3334
## 1.1 Ensure that multi-factor authentication is enabled for all privileged users
@@ -74,7 +75,8 @@ monitor networks and virtual machines where the Security Center standard tier is
7475
This blueprint assigns an [Azure Policy](../../../policy/overview.md) definition that helps you
7576
ensure automatic provisioning of the Log Analytics agent is enabled.
7677

77-
- Automatic provisioning of the Log Analytics monitoring agent should be enabled on your subscription
78+
- Automatic provisioning of the Log Analytics monitoring agent should be enabled on your
79+
subscription
7880

7981
## 2.3 Ensure ASC Default policy setting "Monitor System Updates" is not "Disabled"
8082

@@ -244,24 +246,30 @@ ensure advanced data security is enabled on SQL servers and SQL managed instance
244246
This blueprint assigns [Azure Policy](../../../policy/overview.md) definitions that help you ensure
245247
advanced threat protection is properly configured on SQL servers and SQL managed instances.
246248

247-
- Advanced Threat Protection types should be set to 'All' in SQL server Advanced Data Security settings
248-
- Advanced Threat Protection types should be set to 'All' in SQL managed instance Advanced Data Security settings
249+
- Advanced Threat Protection types should be set to 'All' in SQL server Advanced Data Security
250+
settings
251+
- Advanced Threat Protection types should be set to 'All' in SQL managed instance Advanced Data
252+
Security settings
249253

250254
## 4.6 Ensure that 'Send alerts to' is set
251255

252256
This blueprint assigns an [Azure Policy](../../../policy/overview.md) definition that helps you
253257
ensure advanced data security notifications are properly enabled.
254258

255-
- Advanced data security settings for SQL server should contain an email address to receive security alerts
256-
- Advanced data security settings for SQL managed instance should contain an email address to receive security alerts
259+
- Advanced data security settings for SQL server should contain an email address to receive security
260+
alerts
261+
- Advanced data security settings for SQL managed instance should contain an email address to
262+
receive security alerts
257263

258264
## 4.7 Ensure that 'Email service and co-administrators' is 'Enabled'
259265

260266
This blueprint assigns an [Azure Policy](../../../policy/overview.md) definition that helps you
261267
ensure advanced data security notifications are properly enabled.
262268

263-
- Email notifications to admins and subscription owners should be enabled in SQL server advanced data security settings
264-
- Email notifications to admins and subscription owners should be enabled in SQL managed instance advanced data security settings
269+
- Email notifications to admins and subscription owners should be enabled in SQL server advanced
270+
data security settings
271+
- Email notifications to admins and subscription owners should be enabled in SQL managed instance
272+
advanced data security settings
265273

266274
## 4.8 Ensure that Azure Active Directory Admin is configured
267275

0 commit comments

Comments
 (0)