Policy: Azure > CIS v1 > 5 Logging and Monitoring > 5.2 Monitoring using Activity Log alerts
section covers security recommendations to follow in order to set alerting and monitoring for critical activities on an Azure subscription.
Resource Types
This policy targets the following resource types:
Primary Policy
This policy is used with the following primary policy:
Related Policies
- 5.2.1 Ensure that Activity Log Alert exists for Create Policy Assignment (Scored)
- 5.2.2 Ensure that Activity Log Alert exists for Create or Update Network Security Group (Scored)
- 5.2.3 Ensure that Activity Log Alert exists for Delete Network Security Group (Scored)
- 5.2.4 Ensure that Activity Log Alert exists for Create or Update Network Security Group Rule (Scored)
- 5.2.5 Ensure that activity log alert exists for the Delete Network Security Group Rule (Scored)
- 5.2.6 Ensure that Activity Log Alert exists for Create or Update Security Solution (Scored)
- 5.2.7 Ensure that Activity Log Alert exists for Delete Security Solution (Scored)
- 5.2.8 Ensure that Activity Log Alert exists for Create or Update or Delete SQL Server Firewall Rule (Scored)
- 5.2.9 Ensure that Activity Log Alert exists for Update Security Policy (Scored)
Controls
- Azure > CIS v1
- Azure > CIS v1 > 5 Logging and Monitoring
- Azure > CIS v1 > 5 Logging and Monitoring > 5.2 Monitoring using Activity Log alerts
Policy Specification
Schema Type |
|
---|---|
Default |
|
Valid Values [YAML] |
|
Examples [YAML] |
|
Category
In Your Workspace
Developers
- tmod:@turbot/cis#/control/categories/cis
- tmod:@turbot/azure-cisv1#/policy/types/s0502
- turbot graphql policy-type --id "tmod:@turbot/azure-cisv1#/policy/types/s0502"
- turbot graphql policy-settings --filter "policyTypeId:tmod:@turbot/azure-cisv1#/policy/types/s0502"
Get Policy TypeGet Policy Settings
Category URI
Policy Type URI
GraphQL
CLI