@@ -8,26 +8,27 @@ ms.topic: sample
8
8
9
9
The following article details how the Azure Blueprints CIS Microsoft Azure Foundations Benchmark
10
10
blueprint sample maps to the CIS Microsoft Azure Foundations Benchmark recommendations. For more
11
- information about the recommendations, see [ CIS Microsoft Azure Foundations Benchmark] ( https://www.cisecurity.org/benchmark/azure/ ) .
11
+ information about the recommendations, see
12
+ [ CIS Microsoft Azure Foundations Benchmark] ( https://www.cisecurity.org/benchmark/azure/ ) .
12
13
13
14
The following mappings are to the ** CIS Microsoft Azure Foundations Benchmark v1.1.0**
14
- recommendations. Use the navigation on the right to jump directly to a specific recommendation mapping.
15
- Many of the mapped recommendations are implemented with an [ Azure Policy ] ( ../../../policy/overview.md )
16
- initiative. To review the complete initiative, open ** Policy ** in the Azure portal and select the
17
- ** Definitions ** page. Then, find and select the ** \[ Preview \] Audit CIS Microsoft Azure Foundations
18
- Benchmark v1.1.0 recommendations and deploy specific VM Extensions to support audit requirements **
19
- built-in policy initiative.
20
-
21
- > [ !IMPORTANT]
22
- > Each control below is associated with one or more [ Azure Policy] ( ../../../policy/overview.md )
23
- > definitions. These policies may help you [ assess compliance] ( ../../../policy/how-to/get-compliance-data.md )
24
- > with the control; however, there often is not a 1:1 or complete match between a control and one or
25
- > more policies. As such, ** Compliant** in Azure Policy refers only to the policies themselves; this
26
- > doesn't ensure you're fully compliant with all requirements of a control. In addition, the
27
- > compliance standard includes controls that aren't addressed by any Azure Policy definitions at
28
- > this time. Therefore, compliance in Azure Policy is only a partial view of your overall compliance
29
- > status. The associations between controls and Azure Policy definitions for this compliance
30
- > blueprint sample may change over time. To view the change history, see the
15
+ recommendations. Use the navigation on the right to jump directly to a specific recommendation
16
+ mapping. Many of the mapped recommendations are implemented with an
17
+ [ Azure Policy ] ( ../../../policy/overview.md ) initiative. To review the complete initiative, open
18
+ ** Policy ** in the Azure portal and select the ** Definitions ** page. Then, find and select the
19
+ ** \[ Preview \] Audit CIS Microsoft Azure Foundations Benchmark v1.1.0 recommendations and deploy
20
+ specific VM Extensions to support audit requirements ** built-in policy initiative.
21
+
22
+ > [ !IMPORTANT] Each control below is associated with one or more
23
+ > [ Azure Policy] ( ../../../policy/overview.md ) definitions. These policies may help you
24
+ > [ assess compliance] ( ../../../policy/how-to/get-compliance-data.md ) with the control; however,
25
+ > there often is not a 1:1 or complete match between a control and one or more policies. As such,
26
+ > ** Compliant** in Azure Policy refers only to the policies themselves; this doesn't ensure you're
27
+ > fully compliant with all requirements of a control. In addition, the compliance standard includes
28
+ > controls that aren't addressed by any Azure Policy definitions at this time. Therefore, compliance
29
+ > in Azure Policy is only a partial view of your overall compliance status. The associations between
30
+ > controls and Azure Policy definitions for this compliance blueprint sample may change over time.
31
+ > To view the change history, see the
31
32
> [ GitHub Commit History] ( https://github.com/MicrosoftDocs/azure-docs/commits/master/articles/governance/blueprints/samples/cis-azure-1.1.0/control-mapping.md ) .
32
33
33
34
## 1.1 Ensure that multi-factor authentication is enabled for all privileged users
@@ -74,7 +75,8 @@ monitor networks and virtual machines where the Security Center standard tier is
74
75
This blueprint assigns an [ Azure Policy] ( ../../../policy/overview.md ) definition that helps you
75
76
ensure automatic provisioning of the Log Analytics agent is enabled.
76
77
77
- - Automatic provisioning of the Log Analytics monitoring agent should be enabled on your subscription
78
+ - Automatic provisioning of the Log Analytics monitoring agent should be enabled on your
79
+ subscription
78
80
79
81
## 2.3 Ensure ASC Default policy setting "Monitor System Updates" is not "Disabled"
80
82
@@ -244,24 +246,30 @@ ensure advanced data security is enabled on SQL servers and SQL managed instance
244
246
This blueprint assigns [ Azure Policy] ( ../../../policy/overview.md ) definitions that help you ensure
245
247
advanced threat protection is properly configured on SQL servers and SQL managed instances.
246
248
247
- - Advanced Threat Protection types should be set to 'All' in SQL server Advanced Data Security settings
248
- - Advanced Threat Protection types should be set to 'All' in SQL managed instance Advanced Data Security settings
249
+ - Advanced Threat Protection types should be set to 'All' in SQL server Advanced Data Security
250
+ settings
251
+ - Advanced Threat Protection types should be set to 'All' in SQL managed instance Advanced Data
252
+ Security settings
249
253
250
254
## 4.6 Ensure that 'Send alerts to' is set
251
255
252
256
This blueprint assigns an [ Azure Policy] ( ../../../policy/overview.md ) definition that helps you
253
257
ensure advanced data security notifications are properly enabled.
254
258
255
- - Advanced data security settings for SQL server should contain an email address to receive security alerts
256
- - Advanced data security settings for SQL managed instance should contain an email address to receive security alerts
259
+ - Advanced data security settings for SQL server should contain an email address to receive security
260
+ alerts
261
+ - Advanced data security settings for SQL managed instance should contain an email address to
262
+ receive security alerts
257
263
258
264
## 4.7 Ensure that 'Email service and co-administrators' is 'Enabled'
259
265
260
266
This blueprint assigns an [ Azure Policy] ( ../../../policy/overview.md ) definition that helps you
261
267
ensure advanced data security notifications are properly enabled.
262
268
263
- - Email notifications to admins and subscription owners should be enabled in SQL server advanced data security settings
264
- - Email notifications to admins and subscription owners should be enabled in SQL managed instance advanced data security settings
269
+ - Email notifications to admins and subscription owners should be enabled in SQL server advanced
270
+ data security settings
271
+ - Email notifications to admins and subscription owners should be enabled in SQL managed instance
272
+ advanced data security settings
265
273
266
274
## 4.8 Ensure that Azure Active Directory Admin is configured
267
275
0 commit comments