Benchmark: 0858.09m1Organizational.4-09.m 09.06 Network Security Management
Description
The organization monitors for all authorized and unauthorized wireless access to the information system and prohibits installation of wireless access points (WAPs) unless explicitly authorized in writing by the CIO or his/her designated representative.
Usage
Install the mod:
mkdir dashboardscd dashboardspowerpipe mod initpowerpipe mod install github.com/turbot/steampipe-mod-azure-complianceStart the Powerpipe server:
steampipe service startpowerpipe serverOpen http://localhost:9033 in your browser and select 0858.09m1Organizational.4-09.m 09.06 Network Security Management.
Run this benchmark in your terminal:
powerpipe benchmark run azure_compliance.benchmark.hipaa_hitrust_v92_0858_09m1organizationalSnapshot and share results via Turbot Pipes:
powerpipe benchmark run azure_compliance.benchmark.hipaa_hitrust_v92_0858_09m1organizational --shareControls
- Management ports of virtual machines should be protected with just-in-time network access control
 - Windows machines should meet requirements for 'Windows Firewall Properties'
 - All network ports should be restricted on network security groups associated to your virtual machine