Source | Azure Portal | ||
Display name | Microsoft Managed Control 1061 - Remote Access | Automated Monitoring / Control | ||
Id | 7ac22808-a2e8-41c4-9d46-429b50738914 | ||
Version | 1.0.0 Details on versioning |
||
Versioning |
Versions supported for Versioning: 0 Built-in Versioning [Preview] |
||
Category | Regulatory Compliance Microsoft Learn |
||
Description | Microsoft implements this Access Control control | ||
Additional metadata |
Name/Id: ACF1061 / Microsoft Managed Control 1061 Category: Access Control Title: Remote Access | Automated Monitoring / Control Ownership: Customer, Microsoft Description: The information system monitors and controls remote access methods. Requirements: Azure utilizes Azure Security Monitoring (ASM) and SCUBA for monitoring logs for unauthorized remote access to the information system. ASM and SCUBA look for indicators of attempted security attacks and indicators of compromised systems. In addition, ASM and SCUBA look for indicators of attempted security attacks and indicators of compromised systems. Any unauthorized or otherwise unusual remote access to the information system automatically generates an Incident Management (IcM) ticket to the service owners or the Security Response Team for investigation. Geneva Monitoring is configured to collect remote access events from the Windows Event log. These events are uploaded to the security information and event management tools. These events are processed by the Security Response Team to ensure normal usage of the system, and to examine deviations from this range. Unusual activity is flagged for further review. |
||
Mode | Indexed | ||
Type | Static | ||
Preview | False | ||
Deprecated | False | ||
Effect | Fixed audit |
||
RBAC role(s) | none | ||
Rule aliases | none | ||
Rule resource types | IF (2) Microsoft.Resources/subscriptions Microsoft.Resources/subscriptions/resourceGroups |
||
Compliance | Not a Compliance control | ||
Initiatives usage | none | ||
History | none | ||
JSON compare | n/a | ||
JSON |
|