Control: 9.1.11 Ensure that Microsoft Cloud Security Benchmark policies are not set to 'Disabled'
Description
The Microsoft Cloud Security Benchmark (or "MCSB") is an Azure Policy Initiative containing many security policies to evaluate resource configuration against best practice recommendations. If a policy in the MCSB is set with effect type Disabled
, it is not evaluated and may prevent administrators from being informed of valuable security recommendations.
A security policy defines the desired configuration of resources in your environment and helps ensure compliance with company or regulatory security requirements. The MCSB Policy Initiative a set of security recommendations based on best practices and is associated with every subscription by default. When a policy "Effect" is set to Audit
, policies in the MCSB ensure that Defender for Cloud evaluates relevant resources for supported recommendations. To ensure that policies within the MCSB are not being missed when the Policy Initiative is evaluated, none of the policies should have an Effect of Disabled
.
Remediation
From Azure Portal
- From Azure Home select the Portal Menu.
- Select
Microsoft Defender for Cloud
. - Under
Management
, selectEnvironment settings
. - Click on the appropriate Management Group or Subscription.
- Click on
Security policies
in the left column. - Click on
Microsoft cloud security benchmark
. - Click
Add Filter
and selectEffect
. - Check the
Disabled
box to search for all disabled policies. - Click
Apply
. - Click the blue ellipsis
...
to the right of a policy name. - Click
Manage effect and parameters
. - Under
Policy effect
, select the radio button next toAudit
. - Click
Save
. - Click
Refresh
. - Repeat steps 10-14 until all disabled policies are updated.
- Repeat steps 1-15 for each Management Group or Subscription requiring remediation.
Default Value
By default, the MCSB policy initiative is assigned on all subscriptions, and most policies will have an effect of Audit
. Some policies will have a default effect of Disabled
.
Usage
Run the control in your terminal:
powerpipe control run azure_compliance.control.cis_v400_9_1_11
Snapshot and share results via Turbot Pipes:
powerpipe loginpowerpipe control run azure_compliance.control.cis_v400_9_1_11 --share
SQL
This control uses a named query:
select id as resource, 'info' as status, 'Manual verification required.' as reason, display_name as subscriptionfrom azure_subscription;