Control: 6.1.3 Ensure the storage account containing the container with activity logs is encrypted with Customer Managed Key
Description
Storage accounts with the activity log exports can be configured to use Customer Managed Keys (CMK).
Configuring the storage account with the activity log export container to use CMKs provides additional confidentiality controls on log data, as a given user must have read permission on the corresponding storage account and must be granted decrypt permission by the CMK.
Remediation
From Azure Portal
- Go to
Monitor
. - Select
Activity log
. - Select
Export Activity Logs
. - Select a
Subscription
. - Note the name of the
Storage Account
for the diagnostic setting. - Navigate to
Storage accounts
. - Click on the storage account.
- Under
Security + networking
, clickEncryption
. - Next to
Encryption type
, selectCustomer-managed keys
. - Complete the steps to configure a customer-managed key for encryption of the storage account.
From Azure CLI
az storage account update --name <name of the storage account> --resource-group <resource group for a storage account> --encryption-key-source=Microsoft.Keyvault --encryption-key-vault <Key Vault URI> --encryption-key-name <KeyName> --encryption-key-version <Key Version>
From PowerShell
Set-AzStorageAccount -ResourceGroupName <resource group name> -Name <storage account name> -KeyvaultEncryption -KeyVaultUri <key vault URI> -KeyName <key name>
Default Value
By default, for a storage account keySource
is set to Microsoft.Storage
allowing encryption with vendor Managed key and not a Customer Managed Key.
Usage
Run the control in your terminal:
powerpipe control run azure_compliance.control.cis_v300_6_1_3
Snapshot and share results via Turbot Pipes:
powerpipe loginpowerpipe control run azure_compliance.control.cis_v300_6_1_3 --share
SQL
This control uses a named query:
monitor_logs_storage_container_insights_activity_logs_encrypted_with_byok