Turbot Guardrails Hub 
Hub
  • Mods
  • Policy Packs
  • Docs
  • Home
ModsPolicy PacksDocsHome
Mods
Azure
Loading policies...

Policy: Azure > CIS v2.0 > 09 - Application Services

Covers security recommendations for Azure AppService.

Targets

This policy targets the following resource types:

  • Azure > Active Directory > Directory
  • Azure > Subscription
  • Azure > Tenant

Primary Policy

This policy is used with the following primary policy:

  • Azure > CIS v2.0

Related Policies

  • 9.01 - Ensure App Service Authentication is set up for apps in Azure App Service
  • 9.02 - Ensure Web App Redirects All HTTP traffic to HTTPS in Azure App Service
  • 9.03 - Ensure Web App is using the latest version of TLS encryption
  • 9.04 - Ensure the web app has 'Client Certificates (Incoming client certificates)' set to 'On'
  • 9.05 - Ensure that Register with Azure Active Directory is enabled on App Service
  • 9.06 - Ensure That 'PHP version' is the Latest, If Used to Run the Web App
  • 9.07 - Ensure that 'Python version' is the Latest Stable Version, if Used to Run the Web App
  • 9.08 - Ensure that 'Java version' is the latest, if used to run the Web App
  • 9.09 - Ensure that 'HTTP Version' is the Latest, if Used to Run the Web App
  • 9.10 - Ensure FTP deployments are Disabled
  • 9.11 - Ensure Azure Key Vaults are Used to Store Secrets
  • Maximum Attestation Duration

Controls

Setting this policy configures these controls:

  • Azure > CIS v2.0 > 09 - Application Services > 9.01 - Ensure App Service Authentication is set up for apps in Azure App Service
  • Azure > CIS v2.0 > 09 - Application Services > 9.02 - Ensure Web App Redirects All HTTP traffic to HTTPS in Azure App Service
  • Azure > CIS v2.0 > 09 - Application Services > 9.03 - Ensure Web App is using the latest version of TLS encryption
  • Azure > CIS v2.0 > 09 - Application Services > 9.04 - Ensure the web app has 'Client Certificates (Incoming client certificates)' set to 'On'
  • Azure > CIS v2.0 > 09 - Application Services > 9.05 - Ensure that Register with Azure Active Directory is enabled on App Service
  • Azure > CIS v2.0 > 09 - Application Services > 9.06 - Ensure That 'PHP version' is the Latest, If Used to Run the Web App
  • Azure > CIS v2.0 > 09 - Application Services > 9.07 - Ensure that 'Python version' is the Latest Stable Version, if Used to Run the Web App
  • Azure > CIS v2.0 > 09 - Application Services > 9.08 - Ensure that 'Java version' is the latest, if used to run the Web App
  • Azure > CIS v2.0 > 09 - Application Services > 9.09 - Ensure that 'HTTP Version' is the Latest, if Used to Run the Web App
  • Azure > CIS v2.0 > 09 - Application Services > 9.10 - Ensure FTP deployments are Disabled
  • Azure > CIS v2.0 > 09 - Application Services > 9.11 - Ensure Azure Key Vaults are Used to Store Secrets

Policy Specification

Schema Type
string
Default
Per Azure > CIS v2.0
Valid Values [YAML]
  • Per Azure > CIS v2.0
    
  • Skip
    
  • Check: All CIS Benchmarks except attestations
    
  • Check: All CIS Benchmarks
    
Examples [YAML]
  • Skip
    

Category

  • CIS

In Your Workspace

  • Policy Settings by Type report

Developers

    Category URI
    • tmod:@turbot/cis#/control/categories/cis
  • Policy Type URI
    • tmod:@turbot/azure-cisv2-0#/policy/types/s09
  • GraphQL
    • query policyType(id: "tmod:@turbot/azure-cisv2-0#/policy/types/s09") { … }
    • query policySettings(filter: "policyTypeId:'tmod:@turbot/azure-cisv2-0#/policy/types/s09'") { … }
    • query policyValues(filter: "policyTypeId:'tmod:@turbot/azure-cisv2-0#/policy/types/s09'") { … }
  • CLI
    • Get Policy Type
    • turbot graphql policy-type --id "tmod:@turbot/azure-cisv2-0#/policy/types/s09"
    • Get Policy Settings
    • turbot graphql policy-settings --filter "policyTypeId:tmod:@turbot/azure-cisv2-0#/policy/types/s09"
Guardrails
Guardrails Hub
  • Hub
  • Docs
  • Blog
  • Changelog
Products
  • GuardrailsGuardrails
  • PipesPipes
  • SteampipeSteampipe
  • PowerpipePowerpipe
  • FlowpipeFlowpipe
  • TailpipeTailpipe
Turbot
  • Home
  • About us
  • We're hiring!
  • Contact us
Community

Our community of practitioners love to discuss cloud governance & security.

Slack logoJoin us on Slack →

System StatusLegalSecurity
Terms of UseSecurityPrivacy
50
Mods
205
Resource Types
3,574
Policies
1,936
Controls
103
Quick Actions
114
IAM