Policy: Azure > CIS v5.0 > 6 - Management and Governance Services
This section covers security best practice recommendations for products in the Azure Management and Governance services category.
This includes Azure Monitor, Azure Policy, and resource governance recommendations.
Primary Policy
This policy is used with the following primary policy:
Related Policies
- 6.02 - Ensure that Resource Locks are set for Mission-Critical Azure Resources
- 6.01 - Logging and Monitoring
- Maximum Attestation Duration
Controls
Setting this policy configures these controls:
- Azure > CIS v5.0 > 6 - Management and Governance Services > 6.01 - Logging and Monitoring > 6.01.01 - Configuring Diagnostic Settings > 6.01.01.01 - Ensure that a 'Diagnostic Setting' exists for Subscription Activity Logs
- Azure > CIS v5.0 > 6 - Management and Governance Services > 6.01 - Logging and Monitoring > 6.01.01 - Configuring Diagnostic Settings > 6.01.01.02 - Ensure Diagnostic Setting captures appropriate categories
- Azure > CIS v5.0 > 6 - Management and Governance Services > 6.01 - Logging and Monitoring > 6.01.01 - Configuring Diagnostic Settings > 6.01.01.03 - Ensure the storage account containing the container with activity logs is encrypted with customer-managed key (CMK)
- Azure > CIS v5.0 > 6 - Management and Governance Services > 6.01 - Logging and Monitoring > 6.01.01 - Configuring Diagnostic Settings > 6.01.01.04 - Ensure that logging for Azure Key Vault is 'Enabled'
- Azure > CIS v5.0 > 6 - Management and Governance Services > 6.01 - Logging and Monitoring > 6.01.01 - Configuring Diagnostic Settings > 6.01.01.05 - Ensure that Network Security Group Flow logs are captured and sent to Log Analytics
- Azure > CIS v5.0 > 6 - Management and Governance Services > 6.01 - Logging and Monitoring > 6.01.01 - Configuring Diagnostic Settings > 6.01.01.06 - Ensure that logging for Azure AppService 'HTTP logs' is enabled
- Azure > CIS v5.0 > 6 - Management and Governance Services > 6.01 - Logging and Monitoring > 6.01.01 - Configuring Diagnostic Settings > 6.01.01.07 - Ensure that virtual network flow logs are captured and sent to Log Analytics
- Azure > CIS v5.0 > 6 - Management and Governance Services > 6.01 - Logging and Monitoring > 6.01.01 - Configuring Diagnostic Settings > 6.01.01.08 - Ensure that a Microsoft Entra diagnostic setting exists to send Microsoft Graph activity logs to an appropriate destination
- Azure > CIS v5.0 > 6 - Management and Governance Services > 6.01 - Logging and Monitoring > 6.01.01 - Configuring Diagnostic Settings > 6.01.01.09 - Ensure that a Microsoft Entra diagnostic setting exists to send Microsoft Entra activity logs to an appropriate destination
- Azure > CIS v5.0 > 6 - Management and Governance Services > 6.01 - Logging and Monitoring > 6.01.01 - Configuring Diagnostic Settings > 6.01.01.10 - Ensure that Intune logs are captured and sent to Log Analytics
- Azure > CIS v5.0 > 6 - Management and Governance Services > 6.01 - Logging and Monitoring > 6.01.02 - Monitoring using Activity Log Alerts > 6.01.02.01 - Ensure that Activity Log Alert exists for Create Policy Assignment
- Azure > CIS v5.0 > 6 - Management and Governance Services > 6.01 - Logging and Monitoring > 6.01.02 - Monitoring using Activity Log Alerts > 6.01.02.02 - Ensure that Activity Log Alert exists for Delete Policy Assignment
- Azure > CIS v5.0 > 6 - Management and Governance Services > 6.01 - Logging and Monitoring > 6.01.02 - Monitoring using Activity Log Alerts > 6.01.02.03 - Ensure that Activity Log Alert exists for Create or Update Network Security Group
- Azure > CIS v5.0 > 6 - Management and Governance Services > 6.01 - Logging and Monitoring > 6.01.02 - Monitoring using Activity Log Alerts > 6.01.02.04 - Ensure that Activity Log Alert exists for Delete Network Security Group
- Azure > CIS v5.0 > 6 - Management and Governance Services > 6.01 - Logging and Monitoring > 6.01.02 - Monitoring using Activity Log Alerts > 6.01.02.05 - Ensure that Activity Log Alert exists for Create or Update Security Solution
- Azure > CIS v5.0 > 6 - Management and Governance Services > 6.01 - Logging and Monitoring > 6.01.02 - Monitoring using Activity Log Alerts > 6.01.02.06 - Ensure that Activity Log Alert exists for Delete Security Solution
- Azure > CIS v5.0 > 6 - Management and Governance Services > 6.01 - Logging and Monitoring > 6.01.02 - Monitoring using Activity Log Alerts > 6.01.02.07 - Ensure that Activity Log Alert exists for Create or Update SQL Server Firewall Rule
- Azure > CIS v5.0 > 6 - Management and Governance Services > 6.01 - Logging and Monitoring > 6.01.02 - Monitoring using Activity Log Alerts > 6.01.02.08 - Ensure that Activity Log Alert exists for Delete SQL Server Firewall Rule
- Azure > CIS v5.0 > 6 - Management and Governance Services > 6.01 - Logging and Monitoring > 6.01.02 - Monitoring using Activity Log Alerts > 6.01.02.09 - Ensure that Activity Log Alert exists for Create or Update Public IP Address rule
- Azure > CIS v5.0 > 6 - Management and Governance Services > 6.01 - Logging and Monitoring > 6.01.02 - Monitoring using Activity Log Alerts > 6.01.02.10 - Ensure that Activity Log Alert exists for Delete Public IP Address rule
- Azure > CIS v5.0 > 6 - Management and Governance Services > 6.01 - Logging and Monitoring > 6.01.02 - Monitoring using Activity Log Alerts > 6.01.02.11 - Ensure that an Activity Log Alert exists for Service Health
- Azure > CIS v5.0 > 6 - Management and Governance Services > 6.01 - Logging and Monitoring > 6.01.03 - Configuring Application Insights > 6.01.03.01 - Ensure Application Insights are Configured
- Azure > CIS v5.0 > 6 - Management and Governance Services > 6.01 - Logging and Monitoring > 6.01.04 - Ensure that Azure Monitor Resource Logging is Enabled for All Services that Support it
- Azure > CIS v5.0 > 6 - Management and Governance Services > 6.01 - Logging and Monitoring > 6.01.05 - Ensure that SKU Basic/Consumption is not used on artifacts that need to be monitored (Particularly for Production Workloads)
- Azure > CIS v5.0 > 6 - Management and Governance Services > 6.02 - Ensure that Resource Locks are set for Mission-Critical Azure Resources
Policy Specification
Schema Type | |
|---|---|
Default | |
Valid Values [YAML] |
|
Examples [YAML] |
|
Category
In Your Workspace
Developers
- tmod:@turbot/cis#/control/categories/cis
- tmod:@turbot/azure-cisv5-0#/policy/types/s06
- turbot graphql policy-type --id "tmod:@turbot/azure-cisv5-0#/policy/types/s06"
- turbot graphql policy-settings --filter "policyTypeId:tmod:@turbot/azure-cisv5-0#/policy/types/s06"
Get Policy TypeGet Policy Settings
Category URI
Policy Type URI
GraphQL
CLI