Policy: Azure > CIS v4.0 > 10 - Storage Services
Covers security recommendations to follow to set storage account policies on an Azure Subscription. An Azure storage account provides a unique namespace to store and access Azure Storage data objects.
Targets
This policy targets the following resource types:
Primary Policy
This policy is used with the following primary policy:
Related Policies
Controls
Setting this policy configures these controls:
- Azure > CIS v4.0 > 10 - Storage Services > 10.01 - Azure Files > 10.01.01 - Ensure soft delete for Azure File Shares is Enabled
- Azure > CIS v4.0 > 10 - Storage Services > 10.01 - Azure Files > 10.01.02 - Ensure 'SMB protocol version' is set to 'SMB 3.1.1' or higher for SMB file shares
- Azure > CIS v4.0 > 10 - Storage Services > 10.01 - Azure Files > 10.01.03 - Ensure 'SMB channel encryption' is set to 'AES-256-GCM' or higher for SMB file shares
- Azure > CIS v4.0 > 10 - Storage Services > 10.02 - Azure Blob Storage > 10.02.01 - Ensure that soft delete for blobs on Azure Blob Storage storage accounts is Enabled
- Azure > CIS v4.0 > 10 - Storage Services > 10.02 - Azure Blob Storage > 10.02.02 - Ensure 'Versioning' is set to 'Enabled' on Azure Blob Storage storage accounts
- Azure > CIS v4.0 > 10 - Storage Services > 10.03 - Storage Accounts > 10.03.01 - Secrets and Keys > 10.03.01.01 - Ensure that 'Enable key rotation reminders' is enabled for each Storage Account
- Azure > CIS v4.0 > 10 - Storage Services > 10.03 - Storage Accounts > 10.03.01 - Secrets and Keys > 10.03.01.02 - Ensure that Storage Account access keys are periodically regenerated
- Azure > CIS v4.0 > 10 - Storage Services > 10.03 - Storage Accounts > 10.03.01 - Secrets and Keys > 10.03.01.03 - Ensure 'Allow storage account key access' for Azure Storage Accounts is 'Disabled'
- Azure > CIS v4.0 > 10 - Storage Services > 10.03 - Storage Accounts > 10.03.02 - Networking > 10.03.02.01 - Ensure Private Endpoints are used to access Storage Accounts
- Azure > CIS v4.0 > 10 - Storage Services > 10.03 - Storage Accounts > 10.03.02 - Networking > 10.03.02.02 - Ensure that 'Public Network Access' is 'Disabled' for storage accounts
- Azure > CIS v4.0 > 10 - Storage Services > 10.03 - Storage Accounts > 10.03.02 - Networking > 10.03.02.03 - Ensure default network access rule for storage accounts is set to deny
- Azure > CIS v4.0 > 10 - Storage Services > 10.03 - Storage Accounts > 10.03.03 - Identity and Access Management > 10.03.03.01 - Ensure that 'Default to Microsoft Entra authorization in the Azure portal' is set to 'Enabled'
- Azure > CIS v4.0 > 10 - Storage Services > 10.03 - Storage Accounts > 10.03.04 - Ensure that 'Secure transfer required' is set to 'Enabled'
- Azure > CIS v4.0 > 10 - Storage Services > 10.03 - Storage Accounts > 10.03.05 - Ensure 'Allow Azure services on the trusted services list to access this storage account' is Enabled for Storage Account Access
- Azure > CIS v4.0 > 10 - Storage Services > 10.03 - Storage Accounts > 10.03.06 - Ensure Soft Delete is Enabled for Azure Containers and Blob Storage
- Azure > CIS v4.0 > 10 - Storage Services > 10.03 - Storage Accounts > 10.03.07 - Ensure the 'Minimum TLS version' for storage accounts is set to 'Version 1.2'
- Azure > CIS v4.0 > 10 - Storage Services > 10.03 - Storage Accounts > 10.03.08 - Ensure 'Cross Tenant Replication' is not enabled
- Azure > CIS v4.0 > 10 - Storage Services > 10.03 - Storage Accounts > 10.03.09 - Ensure that 'Allow Blob Anonymous Access' is set to 'Disabled'
- Azure > CIS v4.0 > 10 - Storage Services > 10.03 - Storage Accounts > 10.03.10 - Ensure Azure Resource Manager Delete locks are applied to Azure Storage Accounts
- Azure > CIS v4.0 > 10 - Storage Services > 10.03 - Storage Accounts > 10.03.11 - Ensure Azure Resource Manager ReadOnly locks are considered for Azure Storage Accounts
- Azure > CIS v4.0 > 10 - Storage Services > 10.03 - Storage Accounts > 10.03.12 - Ensure Redundancy is set to 'geo-redundant storage (GRS)' on critical Azure Storage Accounts
Policy Specification
Schema Type | |
|---|---|
Default | |
Valid Values [YAML] |
|
Examples [YAML] |
|
Category
In Your Workspace
Developers
- tmod:@turbot/cis#/control/categories/cis
- tmod:@turbot/azure-cisv4-0#/policy/types/s10
- turbot graphql policy-type --id "tmod:@turbot/azure-cisv4-0#/policy/types/s10"
- turbot graphql policy-settings --filter "policyTypeId:tmod:@turbot/azure-cisv4-0#/policy/types/s10"
Get Policy TypeGet Policy Settings
Category URI
Policy Type URI
GraphQL
CLI