turbot/azure_compliance

Control: 2.6 Ensure Any of the ASC Default Policy Settings are Not Set to 'Disabled'

Description

None of the settings offered by ASC Default policy should be set to effect Disabled.

A security policy defines the desired configuration of your workloads and helps ensure compliance with company or regulatory security requirements. ASC Default policy is associated with every subscription by default. ASC default policy assignment is a set of security recommendations based on best practices. Enabling recommendations in ASC default policy ensures that Azure security center provides the ability to monitor all of the supported recommendations and optionally allow automated action for a few of the supported recommendations.

Remediation

From Azure Portal

  1. From Azure Home select the Portal Menu
  2. Select Microsoft Defender for Cloud
  3. Select Environment Settings blade
  4. Click on a subscription
  5. Select Security Policy in the left column.
  6. Click on ASC Default under Default initiative
  7. Scroll down to Policy Enforcement and ensure it is set to Enabled
  8. Click on the Parameters tab and uncheck Only show parameters that need input or review
  9. In section PARAMETERS, configure the impacted setting to any other available value than Disable or empty
  10. Click Save

Usage

Run the control in your terminal:

powerpipe control run azure_compliance.control.cis_v150_2_6

Snapshot and share results via Turbot Pipes:

powerpipe login
powerpipe control run azure_compliance.control.cis_v150_2_6 --share

SQL

This control uses a named query:

securitycenter_asc_default_setting_not_disabled

Tags