turbot/azure_compliance

Control: 6.4 Ensure that Network Security Group Flow Log retention period is 'greater than 90 days'

Description

Network Security Group Flow Logs should be enabled and the retention period is set to greater than or equal to 90 days.

Flow logs enable capturing information about IP traffic flowing in and out of network security groups. Logs can be used to check for anomalies and give insight into suspected breaches. By default, Network Security Group Flow Logs are disabled.

Remediation

From Console

  1. Login to Azure console, go to Network Watcher
  2. Select NSG flow logs blade in the Logs section
  3. Select each Network Security Groupfrom the list
  4. Ensure Status is set to On
  5. Ensure Retention (days) setting greater than 90 days
  6. Select your storage account in the Storage account field
  7. Select Save

From Command Line

Enable the NSG flow logs and set the Retention (days) to greater than or equal to 90 days.

az network watcher flow-log configure --nsg <NameorID of the Network SecurityGroup> --enabled true --resource-group <resourceGroupName> --retention 91 -- storage-account <NameorID of the storage account to save flow logs>

Usage

Run the control in your terminal:

powerpipe control run azure_compliance.control.cis_v140_6_4

Snapshot and share results via Turbot Pipes:

powerpipe login
powerpipe control run azure_compliance.control.cis_v140_6_4 --share

SQL

This control uses a named query:

network_sg_flowlog_retention_period_greater_than_90

Tags