Policy: Azure > CIS v5.0 > 6 - Management and Governance Services > 6.01 - Logging and Monitoring > 6.01.01 - Configuring Diagnostic Settings
This section covers security recommendations for configuring diagnostic settings across Azure resources.
Diagnostic settings enable you to send platform logs and metrics to different destinations for analysis and long-term storage.
Primary Policy
This policy is used with the following primary policy:
Related Policies
- 6.01.01.01 - Ensure that a 'Diagnostic Setting' exists for Subscription Activity Logs
- 6.01.01.02 - Ensure Diagnostic Setting captures appropriate categories
- 6.01.01.03 - Ensure the storage account containing the container with activity logs is encrypted with customer-managed key (CMK)
- 6.01.01.04 - Ensure that logging for Azure Key Vault is 'Enabled'
- 6.01.01.05 - Ensure that Network Security Group Flow logs are captured and sent to Log Analytics
- 6.01.01.06 - Ensure that logging for Azure AppService 'HTTP logs' is enabled
- 6.01.01.07 - Ensure that virtual network flow logs are captured and sent to Log Analytics
- 6.01.01.08 - Ensure that a Microsoft Entra diagnostic setting exists to send Microsoft Graph activity logs to an appropriate destination
- 6.01.01.09 - Ensure that a Microsoft Entra diagnostic setting exists to send Microsoft Entra activity logs to an appropriate destination
- 6.01.01.10 - Ensure that Intune logs are captured and sent to Log Analytics
Policy Specification
Schema Type | |
|---|---|
Default | |
Valid Values [YAML] |
|
Examples [YAML] |
|
Category
In Your Workspace
Developers
- tmod:@turbot/cis#/control/categories/cis
- tmod:@turbot/azure-cisv5-0#/policy/types/s060101
- turbot graphql policy-type --id "tmod:@turbot/azure-cisv5-0#/policy/types/s060101"
- turbot graphql policy-settings --filter "policyTypeId:tmod:@turbot/azure-cisv5-0#/policy/types/s060101"
Get Policy TypeGet Policy Settings
Category URI
Policy Type URI
GraphQL
CLI