turbot/azure_compliance

Control: 2.12 Ensure any of the ASC Default policy setting is not set to "Disabled"

Description

None of the settings offered by ASC Default policy should be set to effect Disabled. A security policy defines the desired configuration of your workloads and helps ensure compliance with company or regulatory security requirements. ASC Default policy is associated with every subscription by default. ASC default policy assignment is set of security recommendations based on best practices.

Enabling recommendations in ASC default policy ensures that Azure security center provides ability to monitor all of the supported recommendations and allow automated action optionally for few of the supported recommendations.

Remediation

From Console

Perform the following action to check ASC Default policy is set to enabled:

  1. Login to Azure console and navigate to Security Center.
  2. Select Security policy blade under Management.
  3. Click on the subscription name,
  4. Expand All the available sections.
  5. Ensure that any of the setting is not set to Disabled.

Perform the following action to enable ASC Default policies:

  1. Navigate to Azure Policy.
  2. On Policy Overview tab, click on Policy ASC Default.
  3. On ASC Default blade, click on Edit Assignments.
  4. In section Parameters, configure the impacted setting to any other available value than Disabled or empty.
  5. Click Review + Save.
  6. Click Save.

Usage

Run the control in your terminal:

powerpipe control run azure_compliance.control.cis_v130_2_12

Snapshot and share results via Turbot Pipes:

powerpipe login
powerpipe control run azure_compliance.control.cis_v130_2_12 --share

SQL

This control uses a named query:

securitycenter_asc_default_setting_not_disabled

Tags