1.16.0 • Published 12 months ago

@cloudgraph/policy-pack-azure-cis-1.3.1 v1.16.0

Weekly downloads
-
License
MPL-2.0
Repository
github
Last release
12 months ago

CIS Microsoft Azure Foundations Benchmark 1.3.1

Policy Pack based on the Azure Foundations 1.3.1 benchmark provided by the Center for Internet Security (CIS)

First Steps

  1. Install Cloud Graph CLI.
  2. Set up the Azure Provider for CG with the cg init azure command.
  3. Add Policy Pack for CIS Microsoft Azure Foundations benchmark using cg policy add azure-cis-1.3.1 command.
  4. Execute the ruleset using the scan command cg scan azure.
  5. Query the findings using the different options:

    5a. Querying findings by provider:

    query {
      queryazureFindings {
        CISFindings {
          id
          resourceId
          result
        }
      }
    }

    5b. Querying findings by specific benchmark:

    query {
      queryazureCISFindings {
        id
        resourceId
        result
      }
    }

    5c. Querying findings by resource:

    query {
      queryazureSecurityPricing {
        id
        CISFindings {
          id
          resourceId
          result
        }
      }
    }

Available Ruleset

RuleDescription
Azure CIS 1.1Ensure that multi-factor authentication is enabled for all privileged users (Manual)
Azure CIS 1.2Ensure that multi-factor authentication is enabled for all non-privileged users (Manual)
Azure CIS 1.3Ensure guest users are reviewed on a monthly basis
Azure CIS 1.4Ensure that 'Allow users to remember multi-factor authentication on devices they trust' is 'Disabled' (Manual)
Azure CIS 1.5Ensure that 'Number of methods required to reset' is set to '2' (Manual)
Azure CIS 1.6Ensure that 'Number of days before users are asked to re-confirm their authentication information' is not set to "0" (Manual)
Azure CIS 1.7Ensure that 'Notify users on password resets?' is set to 'Yes' (Manual)
Azure CIS 1.8Ensure that 'Notify all admins when other admins reset their password?' is set to 'Yes' (Manual)
Azure CIS 1.9Ensure that 'Users can consent to apps accessing company data on their behalf' is set to 'No' (Manual)
Azure CIS 1.10Ensure that 'Users can add gallery apps to their Access Panel' is set to 'No' (Manual)
Azure CIS 1.11Ensure that 'Users can register applications' is set to 'No' (Manual)
Azure CIS 1.12Ensure that 'Guest user permissions are limited' is set to 'Yes' (Manual)
Azure CIS 1.13Ensure that 'Members can invite' is set to 'No' (Manual)
Azure CIS 1.14Ensure that 'Guests can invite' is set to 'No' (Manual)
Azure CIS 1.15Ensure that 'Restrict access to Azure AD administration portal' is set to 'Yes' (Manual)
Azure CIS 1.16Ensure that 'Restrict user ability to access groups features in the Access Pane' is set to 'No' (Manual)
Azure CIS 1.17Ensure that 'Users can create security groups in Azure Portals' is set to 'No' (Manual)
Azure CIS 1.18Ensure that 'Owners can manage group membership requests in the Access Panel' is set to 'No' (Manual)
Azure CIS 1.19Ensure that 'Users can create Microsoft 365 groups in Azure Portals' is set to 'No' (Manual)
Azure CIS 1.20Ensure that 'Require Multi-Factor Auth to join devices' is set to 'Yes' (Manual)
Azure CIS 1.21Ensure that no custom subscription owner roles are created
Azure CIS 1.22Ensure Security Defaults is enabled on Azure Active Directory
Azure CIS 1.23Ensure Custom Role is assigned for Administering Resource Locks (Manual)
Azure CIS 2.1Ensure that Azure Defender is set to On for Servers
Azure CIS 2.2Ensure that Azure Defender is set to On for App Service
Azure CIS 2.3Ensure that Azure Defender is set to On for Azure SQL database servers
Azure CIS 2.4Ensure that Azure Defender is set to On for SQL servers on machines
Azure CIS 2.5Ensure that Azure Defender is set to On for Storage
Azure CIS 2.6Ensure that Azure Defender is set to On for Kubernetes
Azure CIS 2.7Ensure that Azure Defender is set to On for Container Registries
Azure CIS 2.8Ensure that Azure Defender is set to On for Key Vault
Azure CIS 2.9Ensure that Windows Defender ATP (WDATP) integration with Security Center is selected
Azure CIS 2.10Ensure that Microsoft Cloud App Security (MCAS) integration with Security Center is selected
Azure CIS 2.11Ensure that 'Automatic provisioning of monitoring agent' is set to 'On'
Azure CIS 2.12Ensure any of the ASC Default policy setting is not set to "Disabled"
Azure CIS 2.13Ensure 'Additional email addresses' is configured with a security contact email
Azure CIS 2.14Ensure that 'Notify about alerts with the following severity' is set to 'High'
Azure CIS 3.1Ensure that 'Secure transfer required' is set to 'Enabled'
Azure CIS 3.2Ensure that storage account access keys are periodically regenerated (Manual)
Azure CIS 3.3Ensure Storage logging is enabled for Queue service for read, write, and delete requests (Manual)
Azure CIS 3.4Ensure sure that shared access signature tokens expire within an hour (Manual)
Azure CIS 3.5Ensure that 'Public access level' is set to Private for blob containers
Azure CIS 3.6Ensure default network access rule for Storage Accounts is set to deny
Azure CIS 3.7Ensure 'Trusted Microsoft Services' is enabled for Storage Account access (Manual)
Azure CIS 3.8Ensure soft delete is enabled for Azure Storage
Azure CIS 3.9Ensure storage for critical data are encrypted with Customer Managed Key
Azure CIS 3.10Ensure Storage logging is enabled for Blob service for read, write, and delete requests (Manual)
Azure CIS 3.11Ensure Storage logging is enabled for Table service for read, write, and delete requests (Manual)
Azure CIS 4.1.1Ensure that 'Auditing' is set to 'On'
Azure CIS 4.1.2Ensure that 'Data encryption' is set to 'On' on a SQL Database
Azure CIS 4.1.3Ensure that 'Auditing' Retention is 'greater than 90 days'
Azure CIS 4.2.1Ensure that Advanced Threat Protection (ATP) on a SQL server is set to 'Enabled'
Azure CIS 4.2.2Ensure that Vulnerability Assessment (VA) is enabled on a SQL server by setting a Storage Account
Azure CIS 4.2.3Ensure that VA setting Periodic Recurring Scans is enabled on a SQL server
Azure CIS 4.2.4Ensure that VA setting Send scan reports to is configured for a SQL server
Azure CIS 4.2.5Ensure that VA setting 'Also send email notifications to admins and subscription owners' is set for a SQL server
Azure CIS 4.3.1Ensure 'Enforce SSL connection' is set to 'ENABLED' for PostgreSQL Database Server
Azure CIS 4.3.2Ensure 'Enforce SSL connection' is set to 'ENABLED' for MySQL Database Server
Azure CIS 4.3.3Ensure server parameter 'log_checkpoints' is set to 'ON' for PostgreSQL Database Server
Azure CIS 4.3.4Ensure server parameter 'log_connections' is set to 'ON' for PostgreSQL Database Server
Azure CIS 4.3.5Ensure server parameter 'log_disconnections' is set to 'ON' for PostgreSQL Database Server
Azure CIS 4.3.6Ensure server parameter 'connection_throttling' is set to 'ON' for PostgreSQL Database Server
Azure CIS 4.3.7Ensure server parameter 'log_retention_days' is greater than 3 days for PostgreSQL Database Server
Azure CIS 4.3.8Ensure 'Allow access to Azure services' for PostgreSQL Database Server is disabled
Azure CIS 4.4Ensure that Azure Active Directory Admin is configured
Azure CIS 4.5Ensure SQL server's TDE protector is encrypted with Customer-managed key
Azure CIS 5.1.1Ensure that a 'Diagnostics Setting' exists (Manual)
Azure CIS 5.1.2Ensure Diagnostic Setting captures appropriate categories
Azure CIS 5.1.3Ensure the storage container storing the activity logs is not publicly accessible
Azure CIS 5.1.4Ensure the storage account containing the container with activity logs is encrypted with BYOK (Use Your Own Key)
Azure CIS 5.1.5Ensure that logging for Azure KeyVault is 'Enabled' (Manual)
Azure CIS 5.2.1Ensure that Activity Log Alert exists for Create Policy Assignment
Azure CIS 5.2.2Ensure that Activity Log Alert exists for Delete Policy Assignment
Azure CIS 5.2.3Ensure that Activity Log Alert exists for Create or Update Network Security Group
Azure CIS 5.2.4Ensure that Activity Log Alert exists for Delete Network Security Group
Azure CIS 5.2.5Ensure that Activity Log Alert exists for Create or Update Network Security Group Rule
Azure CIS 5.2.6Ensure that Activity Log Alert exists for the Delete Network Security Group Rule
Azure CIS 5.2.7Ensure that Activity Log Alert exists for Create or Update Security Solution
Azure CIS 5.2.8Ensure that Activity Log Alert exists for Delete Security Solution
Azure CIS 5.2.9Ensure that Activity Log Alert exists for Create or Update or Delete SQL Server Firewall Rule
Azure CIS 5.3Ensure that Diagnostic Logs are enabled for all services which support it (Manual)
Azure CIS 6.1Ensure that RDP access is restricted from the internet
Azure CIS 6.2Ensure that SSH access is restricted from the internet
Azure CIS 6.3Ensure no SQL Databases allow ingress 0.0.0.0/0 (ANY IP)
Azure CIS 6.4Ensure that Network Security Group Flow Log retention period is 'greater than 90 days'
Azure CIS 6.5Ensure that Network Watcher is 'Enabled' (Manual)
Azure CIS 6.6Ensure that UDP Services are restricted from the Internet
Azure CIS 7.1Ensure Virtual Machines are utilizing Managed Disks (Manual)
Azure CIS 7.2Ensure that 'OS and Data' disks are encrypted with CMK
Azure CIS 7.3Ensure that 'Unattached disks' are encrypted with CMK
Azure CIS 7.4Ensure that only approved extensions are installed (Manual)
Azure CIS 7.5Ensure that the latest OS Patches for all Virtual Machines are applied (Manual)
Azure CIS 7.6Ensure that the endpoint protection for all Virtual Machines is installed (Manual)
Azure CIS 7.7Ensure that VHD's are encrypted (Manual)
Azure CIS 8.1Ensure that the expiration date is set on all keys
Azure CIS 8.2Ensure that the expiration date is set on all Secrets
Azure CIS 8.3Ensure that Resource Locks are set for mission critical Azure resources (Manual)
Azure CIS 8.4Ensure the key vault is recoverable
Azure CIS 8.5Enable role-based access control (RBAC) within Azure Kubernetes Services
Azure CIS 9.1Ensure App Service Authentication is set on Azure App Service
Azure CIS 9.2Ensure web app redirects all HTTP traffic to HTTPS in Azure App Service
Azure CIS 9.3Ensure web app is using the latest version of TLS encryption
Azure CIS 9.4Ensure the web app has 'Client Certificates (Incoming client certificates)' set to 'On'
Azure CIS 9.5Ensure that Register with Azure Active Directory is enabled on App Service
Azure CIS 9.6Ensure that 'PHP version' is the latest, if used to run the web app (Manual)
Azure CIS 9.7Ensure that 'Python version' is the latest, if used to run the web app (Manual)
Azure CIS 9.8Ensure that 'Java version' is the latest, if used to run the web app (Manual)
Azure CIS 9.9Ensure that 'HTTP Version' is the latest, if used to run the web app
Azure CIS 9.11Ensure Azure Keyvaults are used to store secrets (Manual)
1.15.1-alpha.1

12 months ago

1.15.1-alpha.2

12 months ago

1.15.0-alpha.1

1 year ago

1.15.0

2 years ago

1.14.1

2 years ago

1.13.2

2 years ago

1.14.0

2 years ago

1.16.0

2 years ago

1.15.1

2 years ago

1.13.1

2 years ago

1.13.1-beta.1

2 years ago

1.13.0

2 years ago

1.12.0

2 years ago

1.9.0

2 years ago

1.8.0

2 years ago

1.7.0

2 years ago

1.6.0

2 years ago

1.5.0

2 years ago

1.4.0

2 years ago

1.11.0

2 years ago

1.10.0

2 years ago

1.2.0

2 years ago

1.3.2

2 years ago

1.3.1

2 years ago

1.3.0

2 years ago

1.2.1

2 years ago

1.1.0

2 years ago

1.0.0

2 years ago