Control: 2.6 Ensure Any of the ASC Default Policy Settings are Not Set to 'Disabled'
Description
None of the settings offered by ASC Default policy should be set to effect Disabled.
A security policy defines the desired configuration of your workloads and helps ensure compliance with company or regulatory security requirements. ASC Default policy is associated with every subscription by default. ASC default policy assignment is a set of security recommendations based on best practices. Enabling recommendations in ASC default policy ensures that Azure security center provides the ability to monitor all of the supported recommendations and optionally allow automated action for a few of the supported recommendations.
Remediation
From Azure Portal
- From Azure Home select the Portal Menu
- Select
Microsoft Defender for Cloud
- Select
Environment Settings
blade - Click on a subscription
- Select
Security Policy
in the left column. - Click on
ASC Default
underDefault initiative
- Scroll down to
Policy Enforcement
and ensure it is set toEnabled
- Click on the
Parameters
tab and uncheckOnly show parameters that need input or review
- In section
PARAMETERS
, configure the impacted setting to any other available value thanDisable
or empty - Click
Save
Usage
Run the control in your terminal:
powerpipe control run azure_compliance.control.cis_v150_2_6
Snapshot and share results via Turbot Pipes:
powerpipe loginpowerpipe control run azure_compliance.control.cis_v150_2_6 --share
SQL
This control uses a named query:
securitycenter_asc_default_setting_not_disabled