Policy | Description |
Audit CORS resource access restrictions for an API App | Cross origin Resource Sharing (CORS) should not allow all domains to access your API app. Allow only required domains to interact with your API app. |
Audit CORS resource access restrictions for a Function App | Cross origin Resource Sharing (CORS) should not allow all domains to access your Function app. Allow only required domains to interact with your Function app. |
Audit CORS resource access restrictions for a Web Application | Cross origin Resource Sharing (CORS) should not allow all domains to access your web application. Allow only required domains to interact with your web app. |
Audit enabling of diagnostic logs in App Services | Audit enabling of diagnostic logs on the app. This enables you to recreate activity trails for investigation purposes if a security incident occurs or your network is compromised |
Audit enablement of encryption of Automation account variables | It is important to enable encryption of Automation account variable assets when storing sensitive data |
Audit enabling of diagnostic logs in Batch accounts | Audit enabling of diagnostic logs. This enables you to recreate activity trails to use for investigation purposes; when a security incident occurs or when your network is compromised |
Audit configuration of metric alert rules on Batch accounts | Audit configuration of metric alert rules on Batch account to enable the required metric |
Audit enabling of diagnostic logs in Data Lake Analytics | Audit enabling of diagnostic logs. This enables you to recreate activity trails to use for investigation purposes; when a security incident occurs or when your network is compromised |
Audit enabling of diagnostic logs in Azure Data Lake Store | Audit enabling of diagnostic logs. This enables you to recreate activity trails to use for investigation purposes; when a security incident occurs or when your network is compromised |
Audit enabling of diagnostic logs in Event Hub | Audit enabling of diagnostic logs. This enables you to recreate activity trails to use for investigation purposes; when a security incident occurs or when your network is compromised |
Audit authorization rules on Event Hub namespaces | Event Hub clients should not use a namespace level access policy that provides access to all queues and topics in a namespace. To align with the least privilege security model, you shoud create access policies at the entity level for queues and topics to provide access to only the specific entity |
Audit existence of authorization rules on Event Hub entities | Audit existence of authorization rules on Event Hub entities to grant least-privileged access |
Audit enabling of diagnostic logs in Key Vault | Audit enabling of diagnostic logs. This enables you to recreate activity trails to use for investigation purposes; when a security incident occurs or when your network is compromised |
Audit enabling of diagnostic logs in Logic Apps | Audit enabling of diagnostic logs. This enables you to recreate activity trails to use for investigation purposes; when a security incident occurs or when your network is compromised |
Audit enabling of diagnostic logs for Search service | Audit enabling of diagnostic logs. This enables you to recreate activity trails to use for investigation purposes; when a security incident occurs or when your network is compromised |
Audit enabling of diagnostic logs in Service Bus | Audit enabling of diagnostic logs. This enables you to recreate activity trails to use for investigation purposes; when a security incident occurs or when your network is compromised |
Audit authorization rules on Service Bus namespaces | Service Bus clients should not use a namespace level access policy that provides access to all queues and topics in a namespace. To align with the least privilege security model, you shoud create access policies at the entity level for queues and topics to provide access to only the specific entity |
Audit enabling of diagnostics logs in Service Fabric and Virtual Machine Scale Sets | It is recommended to enable Logs so that activity trail can be recreated when investigations are required in the event of an incident or a compromise. |
Audit SQL server level Auditing settings | Audits the existence of SQL Auditing at the server level |
Monitor unaudited SQL servers in Azure Security Center | SQL servers which don't have SQL auditing turned on will be monitored by Azure Security Center as recommendations |
Audit enabling of diagnostic logs in Azure Stream Analytics | Audit enabling of diagnostic logs. This enables you to recreate activity trails to use for investigation purposes; when a security incident occurs or when your network is compromised |
Audit usage of custom RBAC rules | Audit built-in roles such as 'Owner, Contributer, Reader' instead of custom RBAC roles, which are error prone. Using custom roles is treated as an exception and requires a rigorous review and threat modeling |
Audit maximum number of owners for a subscription | It is recommended to designate up to 3 subscription owners in order to reduce the potential for breach by a compromised owner. |
Audit minimum number of owners for subscription | It is recommended to designate more than one subscription owner in order to have administrator access redundancy. |
Audit deprecated accounts with owner permissions on a subscription | Deprecated accounts with owner permissions should be removed from your subscription. Deprecated accounts are accounts that have been blocked from signing in. |
[Preview]: Monitor open management ports on Virtual Machines | Open remote management ports are exposing your VM to a high level of risk from Internet-based attacks. These attacks attempt to brute force credentials to gain admin access to the machine. |
Monitor Internet-facing virtual machines for Network Security Group traffic hardening recommendations | Azure Security Center analyzes the traffic patterns of Internet facing virtual machines and provides Network Security Group rule recommendations that reduce the potential attack surface |
Monitor permissive network access in Azure Security Center | Network Security Groups with too permissive rules will be monitored by Azure Security Center as recommendations |
[Preview]: Monitor IP forwarding on virtual machines | Enabling IP forwarding on a virtual machine's NIC allows the machine to receive traffic addressed to other destinations. IP forwarding is rarely required (e.g., when using the VM as a network virtual appliance), and therefore, this should be reviewed by the network security team. |
Audit enabling of diagnostic logs in IoT Hubs | Audit enabling of diagnostic logs. This enables you to recreate activity trails to use for investigation purposes; when a security incident occurs or when your network is compromised |
Monitor possible network Just In Time (JIT) access in Azure Security Center | Possible network Just In Time (JIT) access will be monitored by Azure Security Center as recommendations |
Monitor possible app Whitelisting in Azure Security Center | Possible Application Whitelist configuration will be monitored by Azure Security Center |
Monitor permissive network access of VMs running web-apps in Azure Security Center | Azure security center has discovered that some of your virtual machines are running web applications, and the NSGs associated to these virtual machines are overly permissive with regards to the web application ports |
Monitor unprotected network endpoints in Azure Security Center | Network endpoints without a Next Generation Firewall's protection will be monitored by Azure Security Center as recommendations |
[Preview]: Monitor SQL data discovery and classification recommendations in Azure Security Center | Azure Security Center monitors the data discovery and classification scan results for your SQL databases and provides recommendations to classify the sensitive data in your databases for better monitoring and security |
Audit SQL servers without Vulnerability Assessment | Audit Azure SQL servers which do not have recurring vulnerability assessment scans enabled. Vulnerability assessment can discover, track, and help you remediate potential database vulnerabilities. |
Audit SQL managed instances without Vulnerability Assessment | Audit SQL managed instances which do not have recurring vulnerability assessment scans enabled. Vulnerability assessment can discover, track, and help you remediate potential database vulnerabilities. |
[Preview]: Monitor permissive network access to app-services | Azure security center has discovered that the networking configuration of some of your app services are overly permissive and allow inbound traffic from ranges that are too broad |