Control: Azure > CIS v1.2 > 1 - Identity and Access Management > 1.23 - Ensure Custom Role is assigned for Administering Resource Locks (Not Scored)
Configures auditing against a CIS Benchmark item.
Level: 2 (Not Scored)
Resource locking is a powerful protection mechanism that can prevent inadvertent modification/deletion of resources within Azure subscriptions/Resource Groups and is a recommended NIST configuration.
Resource Types
This control targets the following resource types:
Primary Policies
The following policies can be used to configure this control:
- 1.23 - Ensure Custom Role is assigned for Administering Resource Locks (Not Scored)
- 1.23 - Ensure Custom Role is assigned for Administering Resource Locks (Not Scored) > Attestation
Category
In Your Workspace
Developers
- tmod:@turbot/azure-cisv1-2#/control/types/r0123
- tmod:@turbot/cis#/control/categories/v071406
- turbot graphql controls --filter "controlTypeId:tmod:@turbot/azure-cisv1-2#/control/types/r0123"
Get Controls
Control Type URI
Category URI
GraphQL
CLI