Policy: Azure > CIS v2.0 > 05 - Logging and Monitoring > 5.01 - Configuring Diagnostic Settings
The Azure Diagnostic Settings capture control/management activities performed on a subscription or Azure AD Tenant. By default, the Azure Portal retains activity logs only for 90 days. The Diagnostic Settings define the type of events that are stored or streamed and the outputs—storage account, log analytics workspace, event hub, and others. The Diagnostic Settings, if configured properly, can ensure that all logs are retained for longer duration. This section has recommendations for correctly configuring the Diagnostic Settings so that all logs captured are retained for longer periods.
Resource Types
This policy targets the following resource types:
Primary Policy
This policy is used with the following primary policy:
Related Policies
- 5.01.03 - Ensure the Storage Container Storing the Activity Logs is not Publicly Accessible
- 5.01.04 - Ensure the storage account containing the container with activity logs is encrypted with Customer Managed Key
- 5.01.05 - Ensure that logging for Azure Key Vault is 'Enabled'
- 5.01.06 - Ensure that Network Security Group flow logs are captured and sent to Log Analytics
- 5.01.07 - Ensure that logging for Azure AppService 'HTTP logs' is enabled
Controls
- Azure > CIS v2.0
- Azure > CIS v2.0 > 05 - Logging and Monitoring
- Azure > CIS v2.0 > 05 - Logging and Monitoring > 5.01 - Configuring Diagnostic Settings
Policy Specification
Schema Type |
|
---|---|
Default |
|
Valid Values [YAML] |
|
Examples [YAML] |
|
Category
In Your Workspace
Developers
- tmod:@turbot/cis#/control/categories/cis
- tmod:@turbot/azure-cisv2-0#/policy/types/s0501
- turbot graphql policy-type --id "tmod:@turbot/azure-cisv2-0#/policy/types/s0501"
- turbot graphql policy-settings --filter "policyTypeId:tmod:@turbot/azure-cisv2-0#/policy/types/s0501"
Get Policy TypeGet Policy Settings
Category URI
Policy Type URI
GraphQL
CLI