Control: 6.4 Ensure that Network Security Group Flow Log retention period is 'greater than 90 days'
Description
Network Security Group Flow Logs should be enabled and the retention period is set to greater than or equal to 90 days.
Flow logs enable capturing information about IP traffic flowing in and out of network security groups. Logs can be used to check for anomalies and give insight into suspected breaches. By default, Network Security Group Flow Logs are disabled.
Remediation
From Console
- Login to Azure console, go to Network Watcher
- Select
NSG flow logs
blade in the Logs section - Select each
Network Security Group
from the list - Ensure
Status
is set to On - Ensure
Retention (days)
setting greater than90
days - Select your storage account in the Storage account field
- Select Save
From Command Line
Enable the NSG flow logs and set the Retention (days) to greater than or equal to 90 days.
az network watcher flow-log configure --nsg <NameorID of the Network SecurityGroup> --enabled true --resource-group <resourceGroupName> --retention 91 -- storage-account <NameorID of the storage account to save flow logs>
Usage
Run the control in your terminal:
powerpipe control run azure_compliance.control.cis_v140_6_4
Snapshot and share results via Turbot Pipes:
powerpipe loginpowerpipe control run azure_compliance.control.cis_v140_6_4 --share
SQL
This control uses a named query:
network_sg_flowlog_retention_period_greater_than_90