turbot/steampipe-mod-azure-compliance

Control: 5.1.5 Ensure that logging for Azure KeyVault is 'Enabled'

Description

Enable AuditEvent logging for key vault instances to ensure interactions with key vaults are logged and available.

Monitoring how and when key vaults are accessed, and by whom enables an audit trail of interactions with confidential information, keys and certificates managed by Azure Keyvault. Enabling logging for Key Vault saves information in an Azure storage account that the user provides. This creates a new container named insights-logs-auditevent automatically for the specified storage account, and this same storage account can be used for collecting logs for multiple key vaults.

Remediation

Follow Microsoft Azure documentation and setup Azure Key Vault Logging.

Usage

Run the control in your terminal:

powerpipe control run azure_compliance.control.cis_v140_5_1_5

Snapshot and share results via Turbot Pipes:

powerpipe login
powerpipe control run azure_compliance.control.cis_v140_5_1_5 --share

SQL

This control uses a named query:

with audit_logging_details as (
select
id
from
azure_key_vault,
jsonb_array_elements(diagnostic_settings) setting,
jsonb_array_elements(setting -> 'properties' -> 'logs') log
where
diagnostic_settings is not null
and log -> 'categoryGroup' = '"audit"'
and (log -> 'enabled')::bool = true
),
alllogs_logging_details as (
select
id
from
azure_key_vault,
jsonb_array_elements(diagnostic_settings) setting,
jsonb_array_elements(setting -> 'properties' -> 'logs') log
where
diagnostic_settings is not null
and log -> 'categoryGroup' = '"allLogs"'
and (log -> 'enabled')::bool = true
)
select
v.id as resource,
case
when v.diagnostic_settings is null then 'alarm'
when audit.id is not null and alllogs.id is not null then 'ok'
else 'alarm'
end as status,
case
when v.diagnostic_settings is null then v.name || ' logging not enabled.'
when audit.id is not null and alllogs.id is not null then v.name || ' logging enabled.'
when audit.id is null then v.name || ' logging not enabled for audit category group.'
when alllogs.id is null then v.name || ' logging not enabled for allLogs category group.'
else v.name || ' logging not enabled.'
end as reason
, v.resource_group as resource_group
, sub.display_name as subscription
from
azure_key_vault v
left join audit_logging_details as audit on audit.id = v.id
left join alllogs_logging_details as alllogs on alllogs.id = v.id,
azure_subscription sub

Tags