last sync: 2024-Sep-18 17:50:24 UTC

Microsoft Managed Control 1503 - Information Security Architecture | Regulatory Compliance - Planning

Azure BuiltIn Policy definition

Source Azure Portal
Display name Microsoft Managed Control 1503 - Information Security Architecture
Id c1fa9c2f-d439-4ab9-8b83-81fb1934f81d
Version 1.0.0
Details on versioning
Versioning Versions supported for Versioning: 0
Built-in Versioning [Preview]
Category Regulatory Compliance
Microsoft Learn
Description Microsoft implements this Planning control
Additional metadata Name/Id: ACF1503 / Microsoft Managed Control 1503
Category: Planning
Title: Information Security Architecture - Describes Philosophy, Requirements, And Approach to Confidentiality, Integrity, And Availability
Ownership: Customer, Microsoft
Description: The organization: Develops an information security architecture for the information system that: Describes the overall philosophy, requirements, and approach to be taken with regard to protecting the confidentiality, integrity, and availability of organizational information; Describes how the information security architecture is integrated into and supports the enterprise architecture; and Describes any information security assumptions about, and dependencies on, external services;
Requirements: Azure’s security architecture describes: * The overall philosophy, requirements, and approach to be taken with regard to protecting the confidentiality, integrity, and availability of data relevant to and stored within Azure * The integration of Azure architecture into Azure’s Infrastructure architecture * Assumptions about and dependencies on external services Guidance for the development of the information system architecture for Azure is included in the Microsoft Security Program Policy (MSPP), MSP-08 Operations Security. Documented Operating Procedures, Service Architecture, and Threat Modeling Operating procedures for systems providing Microsoft’s services must also be formally documented, approved, and communicated and should contain, at a minimum, those processes that impact the confidentiality, integrity, or availability of a system and critical data. Service architecture must be documented and threat modeling is performed to identify security threats to the service and ensure adequate mitigations are in place. System operations staff must develop Security configuration baseline for systems and ensure that systems are implemented according to approved security configuration baseline. Anti-Malware Protection All Microsoft information systems must be protected from malicious software and hardware. Microsoft staff must be made aware of the potential dangers resulting from circumvention of network controls, such as downloading files from unknown or untrusted sources or providing inappropriate access. Security incidents that occur must be logged, verified, retained, secured, and appropriate corrective actions must be taken in response to these events. Security Logging, Monitoring, and Reporting System operations staff must implement monitoring technology and/or procedures to ensure timely detection and response to security incidents. Audit logs must be examined in a timely manner, and all identified anomalies must be investigated for possible misuse or compromise. Any log event which indicates a potential violation of Microsoft’s Security Policy must be brought to the attention of the respective organization’s appropriate service team. System operations staff ensure key systems must have appropriate logging enabled and securely transmit logs to a central collection point. Logs must be maintained for a specified period of time according to standards. Monitoring and reporting tools must be available and used to assess the security posture of Microsoft. Change Control and Acceptance An operational change control procedure must be in place for each operational service team within Microsoft. These procedures must include a process for organizational management review and approval. These change control procedures must be communicated to all parties (Microsoft and third parties) who perform system maintenance on or in any of Microsoft’s facilities. Acceptance criteria must be established by each security organization for new systems, upgrades to existing systems, and changes to processes to ensure services meet this security policy and any associated procedures and standards. Security Vulnerabilities and Penetration Testing To help prevent the risk of exposure to known security vulnerabilities, it is the responsibility of each Asset Owner to ensure their systems have the latest security related patches. Systems operations staff must proactively monitor the information systems assets for possible exposures. This monitoring must include scanning for known system vulnerabilities and penetration testing from outside as well as inside Microsoft’s environment. These activities must be scheduled and conducted in such a fashion as to minimize impact to the environment or organization. The frequency of scanning and penetration testing is determined by the sensitivity and criticality of the system.
Mode Indexed
Type Static
Preview False
Deprecated False
Effect Fixed
audit
RBAC role(s) none
Rule aliases none
Rule resource types IF (2)
Microsoft.Resources/subscriptions
Microsoft.Resources/subscriptions/resourceGroups
Compliance
The following 1 compliance controls are associated with this Policy definition 'Microsoft Managed Control 1503 - Information Security Architecture' (c1fa9c2f-d439-4ab9-8b83-81fb1934f81d)
Control Domain Control Name MetadataId Category Title Owner Requirements Description Info Policy#
op.pl.2 Security Architecture op.pl.2 Security Architecture 404 not found n/a n/a 65
Initiatives usage
Initiative DisplayName Initiative Id Initiative Category State Type
Spain ENS 175daf90-21e1-4fec-b745-7b4c909aa94c Regulatory Compliance GA BuiltIn
History none
JSON compare n/a
JSON
api-version=2021-06-01
EPAC