last sync: 2024-Nov-25 18:54:24 UTC

Microsoft Managed Control 1204 - Access Restrictions For Change | Review System Changes | Regulatory Compliance - Configuration Management

Azure BuiltIn Policy definition

Source Azure Portal
Display name Microsoft Managed Control 1204 - Access Restrictions For Change | Review System Changes
Id 0f4f6750-d1ab-4a4c-8dfd-af3237682665
Version 1.0.0
Details on versioning
Versioning Versions supported for Versioning: 0
Built-in Versioning [Preview]
Category Regulatory Compliance
Microsoft Learn
Description Microsoft implements this Configuration Management control
Additional metadata Name/Id: ACF1204 / Microsoft Managed Control 1204
Category: Configuration Management
Title: Access Restrictions For Change | Review System Changes
Ownership: Customer, Microsoft
Description: The organization reviews information system changes Every 30 days; Continuous and during post-implementation Review process defined in the Microsoft Change Management Standard and After any change that affects the defined security posture to determine whether unauthorized changes have occurred.
Requirements: The Microsoft Change Management Standard specifies that all substantial changes must be reassessed and require review by the change review committee. Where appropriate, a Post-Implementation Review (PIR) may confirm that the change has met its objectives and that there have been no unexpected side-effects. Post-implementation actions should include: * Assessing the implementation process * Validating success * Identifying lessons learned * Finalizing the change documentation Azure also maintains a dedicated security incident monitoring team that investigates if indications so warrant to determine whether unauthorized changes have occurred in the environment. All Microsoft personnel have a responsibility to report events that they believe indicate a security incident has occurred. Servers Azure develops, applies, and controls configuration settings and changes to configuration settings following the change and release process. This process ensures that no unauthorized changes are made to settings. When a change is made to a configuration setting, all servers with that configuration setting are redeployed. This ensures that all servers of a particular role are deployed identically. If an attacker were to compromise and change the configuration of an individual server, any anomalous behavior is detected using Azure’s auditing and monitoring processes. Additionally, any changes made by the attacker are overwritten upon the next deployment. Microsoft develops new code bases every thirty (30) days and as part of the continuous monitoring and patching process and pushed out to the servers. Network Devices All configuration changes performed on network devices are captured in syslog events, and multiple high-level monitoring tools which conducts continuous daily monitoring of all network devices for conformance to Azure Networking standards. The Config Policy Verifier (CPV) tool conducts continuous daily monitoring of all network devices for conformance to Azure Networking standards. The tool checks for any policy violations and alerts appropriate personnel of findings.
Mode Indexed
Type Static
Preview False
Deprecated False
Effect Fixed
audit
RBAC role(s) none
Rule aliases none
Rule resource types IF (2)
Microsoft.Resources/subscriptions
Microsoft.Resources/subscriptions/resourceGroups
Compliance Not a Compliance control
Initiatives usage none
History none
JSON compare n/a
JSON
api-version=2021-06-01
EPAC