last sync: 2024-Sep-19 17:51:32 UTC

Microsoft Managed Control 1634 - Boundary Protection | Prevent Unauthorized Exfiltration | Regulatory Compliance - System and Communications Protection

Azure BuiltIn Policy definition

Source Azure Portal
Display name Microsoft Managed Control 1634 - Boundary Protection | Prevent Unauthorized Exfiltration
Id 292a7c44-37fa-4c68-af7c-9d836955ded2
Version 1.0.0
Details on versioning
Versioning Versions supported for Versioning: 0
Built-in Versioning [Preview]
Category Regulatory Compliance
Microsoft Learn
Description Microsoft implements this System and Communications Protection control
Additional metadata Name/Id: ACF1634 / Microsoft Managed Control 1634
Category: System and Communications Protection
Title: Boundary Protection | Prevent Unauthorized Exfiltration
Ownership: Customer, Microsoft
Description: The organization prevents the unauthorized exfiltration of information across managed interfaces.
Requirements: For Azure services, onboarding to Azure Security Pack (AzSecPack) enables monitoring of network communication correlated with network logs and in-memory lateral movement during post exploitation for all deployment types via Process Investigation, which is available externally via Azure Security Center via Fileless Attack detections, and via the Network Risk Management (NRM) Service. The NRM service assesses the resultant set of open ports and protocols based on data provided by the VM agent. Additionally, for VMs hosted on Azure, the Network Security Group (NSG) settings are considered and the resultant set of the settings is calculated. Additionally, for the assets running in Bare Metal, Azure assesses the Surface Area Manager configuration settings. For Linux VMs hosted in Azure, Azure uses the NSG settings to validate that the configuration meets the network baseline requirements. For all deployment types, if there is a network baseline violation that exposes a management port to the internet, an alert is generated and provided to the service team. For internal services, there is monitoring and alerting for unusual behavior of key security features including, but not limited to, if a user accesses an asset without using Azure Just In Time (JIT) access, if a dSTS account has an unusual access pattern, if the Geneva Actions have unusual activity, if the Azure Fabric is accessed without using Azure JIT, or if a service owner has unexpected changes to permissions in the service team subscription. Additionally, service teams regardless of deployment type must monitor their own network connections for unexpected network activities at the application layer. However, to protect customer end user identifiable information, Azure does not monitor the customer traffic in the security monitoring solutions. Azure does not inspect or monitor customer traffic. By default, Microsoft is unaware of what data is outbound from the environment by the customer. In the event of customer data spillage, upon customer request, Microsoft may assist with the incident including accessing customer data according to the Azure Incident Management SOP.
Mode Indexed
Type Static
Preview False
Deprecated False
Effect Fixed
audit
RBAC role(s) none
Rule aliases none
Rule resource types IF (2)
Microsoft.Resources/subscriptions
Microsoft.Resources/subscriptions/resourceGroups
Compliance Not a Compliance control
Initiatives usage none
History none
JSON compare n/a
JSON
api-version=2021-06-01
EPAC