Policy: Azure > CIS v5.0 > 6 - Management and Governance Services > 6.01 - Logging and Monitoring > 6.01.02 - Monitoring using Activity Log Alerts
This section covers security recommendations for configuring activity log alerts.
Activity log alerts notify you when specific events occur in your Azure subscription, enabling rapid response to security-relevant changes.
Primary Policy
This policy is used with the following primary policy:
Related Policies
- 6.01.02.01 - Ensure that Activity Log Alert exists for Create Policy Assignment
- 6.01.02.02 - Ensure that Activity Log Alert exists for Delete Policy Assignment
- 6.01.02.03 - Ensure that Activity Log Alert exists for Create or Update Network Security Group
- 6.01.02.04 - Ensure that Activity Log Alert exists for Delete Network Security Group
- 6.01.02.05 - Ensure that Activity Log Alert exists for Create or Update Security Solution
- 6.01.02.06 - Ensure that Activity Log Alert exists for Delete Security Solution
- 6.01.02.07 - Ensure that Activity Log Alert exists for Create or Update SQL Server Firewall Rule
- 6.01.02.08 - Ensure that Activity Log Alert exists for Delete SQL Server Firewall Rule
- 6.01.02.09 - Ensure that Activity Log Alert exists for Create or Update Public IP Address rule
- 6.01.02.10 - Ensure that Activity Log Alert exists for Delete Public IP Address rule
- 6.01.02.11 - Ensure that an Activity Log Alert exists for Service Health
Policy Specification
Schema Type | |
|---|---|
Default | |
Valid Values [YAML] |
|
Examples [YAML] |
|
Category
In Your Workspace
Developers
- tmod:@turbot/cis#/control/categories/cis
- tmod:@turbot/azure-cisv5-0#/policy/types/s060102
- turbot graphql policy-type --id "tmod:@turbot/azure-cisv5-0#/policy/types/s060102"
- turbot graphql policy-settings --filter "policyTypeId:tmod:@turbot/azure-cisv5-0#/policy/types/s060102"
Get Policy TypeGet Policy Settings
Category URI
Policy Type URI
GraphQL
CLI