turbot/steampipe-mod-azure-compliance

Control: 5.1.2 Ensure Diagnostic Setting captures appropriate categories

Description

The diagnostic setting should be configured to log the appropriate activities from the control/management plane.

A diagnostic setting controls how the diagnostic log is exported. Capturing the diagnostic setting categories for appropriate control/management plane activities allows proper alerting.

Remediation

From Console

  1. Login to Azure Monitor console
  2. Click Activity log
  3. Click on Diagnostic settings
  4. Click on Add or Edit Settings for the diagnostic settings entry
  5. Ensure that the following categories are checked: Administrative, Alert, Policy, and Security

Note: By default, diagnostic setting is not set.

Usage

Run the control in your terminal:

powerpipe control run azure_compliance.control.cis_v130_5_1_2

Snapshot and share results via Turbot Pipes:

powerpipe login
powerpipe control run azure_compliance.control.cis_v130_5_1_2 --share

SQL

This control uses a named query:

with enabled_settings as (
select
name,
id,
_ctx,
resource_group,
subscription_id,
count(*) filter (where l ->> 'enabled' = 'true'
and l ->> 'category' in ('Administrative', 'Security', 'Alert', 'Policy')
) as valid_category_count,
string_agg(l ->> 'category', ', ') filter (where l ->> 'enabled' = 'true'
and l ->> 'category' in ('Administrative', 'Security', 'Alert', 'Policy')
) as valid_categories
from
azure_diagnostic_setting,
jsonb_array_elements(logs) as l
group by
name,
id,
_ctx,
resource_group,
subscription_id
)
select
sett.id as resource,
case
when valid_category_count = 4 then 'ok'
else 'alarm'
end as status,
case
when valid_category_count = 4
then name || ' logs enabled for required categories administrative, security, alert and policy.'
when valid_category_count > 0
then sett.name || ' logs enabled for ' || valid_categories || ' categories.'
else sett.name || ' logs not enabled for categories administrative, security, alert and policy.'
end as reason
, sett.resource_group as resource_group
, sub.display_name as subscription
from
enabled_settings sett,
azure_subscription sub
where
sub.subscription_id = sett.subscription_id;

Tags