Control: Azure > CIS v4.0 > 07 - Management and Governance > 07.01 - Logging and Monitoring > 07.01.02 - Monitoring using Activity Log Alerts > 07.01.02.02 - Ensure that Activity Log Alert exists for Delete Policy Assignment
Configures auditing against a CIS Benchmark item.
Level: 1
Create an activity log alert for the Delete Policy Assignment event.
Monitoring for delete policy assignment events gives insight into changes done in "azure policy - assignments" and can reduce the time it takes to detect unsolicited changes.
Resource Types
This control targets the following resource types:
Policies
This control type relies on these other policies when running actions:
- Azure > CIS v4.0 > 07 - Management and Governance > 07.01 - Logging and Monitoring > 07.01.02 - Monitoring using Activity Log Alerts > 07.01.02.02 - Ensure that Activity Log Alert exists for Delete Policy Assignment
- Azure > CIS v4.0
- Azure > CIS v4.0 > 07 - Management and Governance
Category
In Your Workspace
Developers
- tmod:@turbot/azure-cisv4-0#/control/types/r07010202
- tmod:@turbot/cis#/control/categories/v070603
- turbot graphql controls --filter "controlTypeId:tmod:@turbot/azure-cisv4-0#/control/types/r07010202"
Get Controls
Control Type URI
Category URI
GraphQL
CLI