turbot/steampipe-mod-azure-compliance

Control: 2.1.17 Ensure That 'All users with the following roles' is set to 'Owner'

Description

Enable security alert emails to subscription owners.

Enabling security alert emails to subscription owners ensures that they receive security alert emails from Microsoft. This ensures that they are aware of any potential security issues and can mitigate the risk in a timely fashion.

Remediation

From Azure Portal

  1. From Azure Home select the Portal Menu.
  2. Select Microsoft Defender for Cloud.
  3. Click on Environment Settings.
  4. Click on the appropriate Management Group, Subscription, or Workspace.
  5. Click on Email notifications.
  6. In the drop down of the All users with the following roles field select Owner.
  7. Click Save.

From Azure CLI

Use the below command to set Send email also to subscription owners to On.

az account get-access-token --query
"{subscription:subscription,accessToken:accessToken}" --out tsv | xargs -L1 bash -c 'curl -X PUT -H "Authorization: Bearer $1" -H "Content-Type: application/json"
https://management.azure.com/subscriptions/$0/providers/Microsoft.Security/se curityContacts/default1?api-version=2017-08-01-preview -d@"input.json"'

Where input.json contains the data below, replacing validEmailAddress with a single email address or multiple comma-separated email addresses:

{
"id":"/subscriptions/<Your_Subscription_Id>/providers/Microsoft.Security/securityC ontacts/default1",
"name": "default1",
"type": "Microsoft.Security/securityContacts",
"properties":{
"email": "<validEmailAddress>",
"alertNotifications": "On",
"alertsToAdmins": "On",
"notificationsByRole": "Owner"
}
}

Default Value

By default, Owner is selected.

Usage

Run the control in your terminal:

powerpipe control run azure_compliance.control.cis_v210_2_1_17

Snapshot and share results via Turbot Pipes:

powerpipe login
powerpipe control run azure_compliance.control.cis_v210_2_1_17 --share

SQL

This control uses a named query:

with contact_info as (
select
count(*) filter (where alerts_to_admins = 'On') as admin_alert_count,
subscription_id
from
azure_security_center_contact
group by
subscription_id
limit 1
)
select
sub.subscription_id as resource,
case
when admin_alert_count > 0 then 'ok'
else 'alarm'
end as status,
case
when admin_alert_count > 0 then '"All users with the following roles" set to Owner'
else '"All users with the following roles" not set to Owner.'
end as reason
, sub.display_name as subscription
from
azure_subscription sub
left join contact_info ci on sub.subscription_id = ci.subscription_id;

Tags