Control: Azure > CIS v3.0 > 06 - Logging & Monitoring > 06.02 - Monitoring using Activity Log Alerts > 06.02.02 - Ensure that Activity Log Alert exists for Delete Policy Assignment
Configures auditing against a CIS Benchmark item.
Level: 1
Create an activity log alert for the Delete Policy Assignment event.
Monitoring for delete policy assignment events gives insight into changes done in "azure policy - assignments" and can reduce the time it takes to detect unsolicited changes.
Resource Types
This control targets the following resource types:
Policies
This control type relies on these other policies when running actions:
- Azure > CIS v3.0
- Azure > CIS v3.0 > 06 - Logging & Monitoring > 06.02 - Monitoring using Activity Log Alerts > 06.02.02 - Ensure that Activity Log Alert exists for Delete Policy Assignment
- Azure > CIS v3.0 > 06 - Logging & Monitoring
Category
In Your Workspace
Developers
- tmod:@turbot/azure-cisv3-0#/control/types/r060202
- tmod:@turbot/cis#/control/categories/v070603
- turbot graphql controls --filter "controlTypeId:tmod:@turbot/azure-cisv3-0#/control/types/r060202"
Get Controls
Control Type URI
Category URI
GraphQL
CLI