Policy: Azure > CIS v3.0 > 04 - Storage Accounts
Covers security recommendations to follow to set storage account policies on an Azure Subscription. An Azure storage account provides a unique namespace to store and access Azure Storage data objects.
Targets
This policy targets the following resource types:
Primary Policy
This policy is used with the following primary policy:
Related Policies
- 04.01 - Ensure that 'Secure transfer required' is set to 'Enabled'
- 04.02 - Ensure that `Enable Infrastructure Encryption` for Each Storage Account in Azure Storage is Set to `enabled`
- 04.03 - Ensure that 'Enable key rotation reminders' is enabled for each Storage Account
- 04.04 - Ensure that Storage Account Access Keys are Periodically Regenerated
- 04.05 - Ensure that Shared Access Signature Tokens Expire Within an Hour
- 04.06 - Ensure that 'Public Network Access' is 'Disabled' for storage accounts
- 04.07 - Ensure Default Network Access Rule for Storage Accounts is Set to Deny
- 04.08 - Ensure 'Allow Azure services on the trusted services list to access this storage account' is Enabled for Storage Account Access
- 04.09 - Ensure Private Endpoints are used to access Storage Accounts
- 04.10 - Ensure Soft Delete is Enabled for Azure Containers and Blob Storage
- 04.11 - Ensure Storage for Critical Data are Encrypted with Customer Managed Keys (CMK)
- 04.12 - Ensure Storage Logging is Enabled for Queue Service for 'Read', 'Write', and 'Delete' requests
- 04.13 - Ensure Storage logging is Enabled for Blob Service for 'Read', 'Write', and 'Delete' requests
- 04.14 - Ensure Storage Logging is Enabled for Table Service for 'Read', 'Write', and 'Delete' Requests
- 04.15 - Ensure the 'Minimum TLS version' for storage accounts is set to 'Version 1.2'
- 04.16 - Ensure 'Cross Tenant Replication' is not enabled
- 04.17 - Ensure that 'Allow Blob Anonymous Access' is set to 'Disabled'
- Maximum Attestation Duration
Policy Specification
Schema Type |
|
---|---|
Default |
|
Valid Values [YAML] |
|
Examples [YAML] |
|
Category
In Your Workspace
Developers
- tmod:@turbot/cis#/control/categories/cis
- tmod:@turbot/azure-cisv3-0#/policy/types/s04
- turbot graphql policy-type --id "tmod:@turbot/azure-cisv3-0#/policy/types/s04"
- turbot graphql policy-settings --filter "policyTypeId:tmod:@turbot/azure-cisv3-0#/policy/types/s04"
Get Policy TypeGet Policy Settings
Category URI
Policy Type URI
GraphQL
CLI