turbot/steampipe-mod-azure-compliance

Control: 2.1.11 Ensure That Microsoft Defender for Resource Manager Is Set To 'On'

Description

Microsoft Defender for Resource Manager scans incoming administrative requests to change your infrastructure from both CLI and the Azure portal.

Scanning resource requests lets you be alerted every time there is suspicious activity in order to prevent a security threat from being introduced.

Remediation

From Azure Portal

  1. Go to Microsoft Defender for Cloud.
  2. Select Environment Settings blade.
  3. Click on the subscription name.
  4. Select the Defender plans blade.
  5. Select On under Status for Resource Manager.
  6. Select Save.

From Azure CLI

Use the below command to enable Standard pricing tier for Defender for Resource Manager

az security pricing create -n 'Arm' --tier 'Standard'

From PowerShell

Use the below command to enable Standard pricing tier for Defender for Resource Manager

Set-AzSecurityPricing -Name 'Arm' -PricingTier 'Standard'

Default Value

By default, Microsoft Defender for Resource Manager is not enabled.

Usage

Run the control in your terminal:

powerpipe control run azure_compliance.control.cis_v210_2_1_11

Snapshot and share results via Turbot Pipes:

powerpipe login
powerpipe control run azure_compliance.control.cis_v210_2_1_11 --share

SQL

This control uses a named query:

select
sub_pricing.id as resource,
case
when pricing_tier = 'Standard' then 'ok'
else 'alarm'
end as status,
case
when pricing_tier = 'Standard' then 'Azure Defender on for Resource Manager.'
else 'Azure Defender off for Resource Manager.'
end as reason
, sub.display_name as subscription
from
azure_security_center_subscription_pricing sub_pricing
right join azure_subscription sub on sub_pricing.subscription_id = sub.subscription_id
where
name = 'Arm';

Tags