turbot/azure_compliance

Control: 7.4 Ensure that only approved extensions are installed

Description

For added security, only install organization-approved extensions on VMs.

Azure virtual machine extensions are small applications that provide post-deployment configuration and automation tasks on Azure virtual machines. These extensions run with administrative privileges and could potentially access anything on a virtual machine. The Azure Portal and community provide several such extensions. Each organization should carefully evaluate these extensions and ensure that only those that are approved for use are actually implemented

Remediation

From Azure Console

  1. Go to Virtual machines
  2. For each virtual machine, go to Settings
  3. Click on Extensions + applications
  4. If there are unapproved extensions, uninstall them.

From Azure Command Line Interface 2.0e

From the audit command identify the unapproved extensions, and use the below CLI command to remove an unapproved extension attached to VM.

aaz vm extension delete --resource-group <resourceGroupName> --vm-name
<vmName> --name <extensionName>

Using PowerShell

For each VM and each unsecured extension from the Audit Procedure run the following command.

Remove-AzVMExtension -ResourceGroupName <ResourceGroupName> -Name
<ExtensionName> -VMName <VirtualMachineName>

Default Value

By default, no extensions are added to the virtual machines.

Usage

Run the control in your terminal:

powerpipe control run azure_compliance.control.cis_v150_7_4

Snapshot and share results via Turbot Pipes:

powerpipe login
powerpipe control run azure_compliance.control.cis_v150_7_4 --share

SQL

This control uses a named query:

manual_control

Tags