Policy DisplayName |
Policy Id |
Category |
Effect |
Roles# |
Roles |
State |
[Deprecated]: Azure Cognitive Search services should use private link |
0fda3595-9f2b-4592-8675-4231d6fa82fe |
Search |
Default Audit Allowed Audit, Disabled |
0 |
|
Deprecated |
[Deprecated]: Cognitive Services should use private link |
cddd188c-4b82-4c48-a19d-ddf74ee66a01 |
Cognitive Services |
Default Audit Allowed Audit, Disabled |
0 |
|
Deprecated |
[Preview]: All Internet traffic should be routed via your deployed Azure Firewall |
fc5e4038-4584-4632-8c85-c0448d374b2c |
Network |
Default AuditIfNotExists Allowed AuditIfNotExists, Disabled |
0 |
|
Preview |
[Preview]: Azure Arc enabled Kubernetes clusters should have Microsoft Defender for Cloud extension installed |
8dfab9c4-fe7b-49ad-85e4-1e9be085358f |
Kubernetes |
Default AuditIfNotExists Allowed AuditIfNotExists, Disabled |
0 |
|
Preview |
[Preview]: Azure Recovery Services vaults should use customer-managed keys for encrypting backup data |
2e94d99a-8a36-4563-bc77-810d8893b671 |
Backup |
Default Audit Allowed Audit, Deny, Disabled |
0 |
|
Preview |
[Preview]: IoT Hub device provisioning service data should be encrypted using customer-managed keys (CMK) |
47031206-ce96-41f8-861b-6a915f3de284 |
Internet of Things |
Default Audit Allowed Audit, Deny, Disabled |
0 |
|
Preview |
[Preview]: Log Analytics extension should be installed on your Linux Azure Arc machines |
842c54e8-c2f9-4d79-ae8d-38d8b8019373 |
Monitoring |
Default AuditIfNotExists Allowed AuditIfNotExists, Disabled |
0 |
|
Preview |
[Preview]: Log Analytics extension should be installed on your Windows Azure Arc machines |
d69b1763-b96d-40b8-a2d9-ca31e9fd0d3e |
Monitoring |
Default AuditIfNotExists Allowed AuditIfNotExists, Disabled |
0 |
|
Preview |
[Preview]: Network traffic data collection agent should be installed on Linux virtual machines |
04c4380f-3fae-46e8-96c9-30193528f602 |
Monitoring |
Default AuditIfNotExists Allowed AuditIfNotExists, Disabled |
0 |
|
Preview |
[Preview]: Network traffic data collection agent should be installed on Windows virtual machines |
2f2ee1de-44aa-4762-b6bd-0893fc3f306d |
Monitoring |
Default AuditIfNotExists Allowed AuditIfNotExists, Disabled |
0 |
|
Preview |
[Preview]: Storage account public access should be disallowed |
4fa4b6c0-31ca-4c0d-b10d-24b96f62a751 |
Storage |
Default Audit Allowed audit, Audit, deny, Deny, disabled, Disabled |
0 |
|
Preview |
A maximum of 3 owners should be designated for your subscription |
4f11b553-d42e-4e3a-89be-32ca364cad4c |
Security Center |
Default AuditIfNotExists Allowed AuditIfNotExists, Disabled |
0 |
|
GA |
A vulnerability assessment solution should be enabled on your virtual machines |
501541f7-f7e7-4cd6-868c-4190fdad3ac9 |
Security Center |
Default AuditIfNotExists Allowed AuditIfNotExists, Disabled |
0 |
|
GA |
Accept assessment results |
3054c74b-9b45-2581-56cf-053a1a716c39 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Accept only FICAM-approved third-party credentials |
2d2ca910-7957-23ee-2945-33f401606efc |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Accept PIV credentials |
55be3260-a7a2-3c06-7fe6-072d07525ab7 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Accounts with owner permissions on Azure resources should be MFA enabled |
e3e008c3-56b9-4133-8fd7-d3347377402a |
Security Center |
Default AuditIfNotExists Allowed AuditIfNotExists, Disabled |
0 |
|
GA |
Accounts with read permissions on Azure resources should be MFA enabled |
81b3ccb4-e6e8-4e4a-8d05-5df25cd29fd4 |
Security Center |
Default AuditIfNotExists Allowed AuditIfNotExists, Disabled |
0 |
|
GA |
Accounts with write permissions on Azure resources should be MFA enabled |
931e118d-50a1-4457-a5e4-78550e086c52 |
Security Center |
Default AuditIfNotExists Allowed AuditIfNotExists, Disabled |
0 |
|
GA |
Add system-assigned managed identity to enable Guest Configuration assignments on virtual machines with no identities |
3cf2ab00-13f1-4d0c-8971-2ac904541a7e |
Guest Configuration |
Fixed modify |
1 |
Contributor |
GA |
Add system-assigned managed identity to enable Guest Configuration assignments on VMs with a user-assigned identity |
497dff13-db2a-4c0f-8603-28fa3b331ab6 |
Guest Configuration |
Fixed modify |
1 |
Contributor |
GA |
Address coding vulnerabilities |
318b2bd9-9c39-9f8b-46a7-048401f33476 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Adhere to retention periods defined |
1ecb79d7-1a06-9a3b-3be8-f434d04d1ec1 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Adjust level of audit review, analysis, and reporting |
de251b09-4a5e-1204-4bef-62ac58d47999 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Adopt biometric authentication mechanisms |
7d7a8356-5c34-9a95-3118-1424cfaf192a |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Alert personnel of information spillage |
9622aaa9-5c49-40e2-5bf8-660b7cd23deb |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Align business objectives and IT goals |
ab02bb73-4ce1-89dd-3905-d93042809ba0 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
All network ports should be restricted on network security groups associated to your virtual machine |
9daedab3-fb2d-461e-b861-71790eead4f6 |
Security Center |
Default AuditIfNotExists Allowed AuditIfNotExists, Disabled |
0 |
|
GA |
Allocate resources in determining information system requirements |
90a156a6-49ed-18d1-1052-69aac27c05cd |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
An Azure Active Directory administrator should be provisioned for SQL servers |
1f314764-cb73-4fc9-b863-8eca98ac36e9 |
SQL |
Default AuditIfNotExists Allowed AuditIfNotExists, Disabled |
0 |
|
GA |
Analyse data obtained from continuous monitoring |
6a379d74-903b-244a-4c44-838728bea6b0 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
API Management services should use a virtual network |
ef619a2c-cc4d-4d03-b2ba-8c94a834d85b |
API Management |
Default Audit Allowed Audit, Deny, Disabled |
0 |
|
GA |
App Configuration should use private link |
ca610c1d-041c-4332-9d88-7ed3094967c7 |
App Configuration |
Default AuditIfNotExists Allowed AuditIfNotExists, Disabled |
0 |
|
GA |
App Service apps should have Client Certificates (Incoming client certificates) enabled |
19dd1db6-f442-49cf-a838-b0786b4401ef |
App Service |
Default AuditIfNotExists Allowed AuditIfNotExists, Disabled |
0 |
|
GA |
App Service apps should have remote debugging turned off |
cb510bfd-1cba-4d9f-a230-cb0976f4bb71 |
App Service |
Default AuditIfNotExists Allowed AuditIfNotExists, Disabled |
0 |
|
GA |
App Service apps should have resource logs enabled |
91a78b24-f231-4a8a-8da9-02c35b2b6510 |
App Service |
Default AuditIfNotExists Allowed AuditIfNotExists, Disabled |
0 |
|
GA |
App Service apps should not have CORS configured to allow every resource to access your apps |
5744710e-cc2f-4ee8-8809-3b11e89f4bc9 |
App Service |
Default AuditIfNotExists Allowed AuditIfNotExists, Disabled |
0 |
|
GA |
App Service apps should only be accessible over HTTPS |
a4af4a39-4135-47fb-b175-47fbdf85311d |
App Service |
Default Audit Allowed Audit, Disabled, Deny |
0 |
|
GA |
App Service apps should require FTPS only |
4d24b6d4-5e53-4a4f-a7f4-618fa573ee4b |
App Service |
Default AuditIfNotExists Allowed AuditIfNotExists, Disabled |
0 |
|
GA |
App Service apps should use latest 'HTTP Version' |
8c122334-9d20-4eb8-89ea-ac9a705b74ae |
App Service |
Default AuditIfNotExists Allowed AuditIfNotExists, Disabled |
0 |
|
GA |
App Service apps should use managed identity |
2b9ad585-36bc-4615-b300-fd4435808332 |
App Service |
Default AuditIfNotExists Allowed AuditIfNotExists, Disabled |
0 |
|
GA |
App Service apps should use the latest TLS version |
f0e6e85b-9b9f-4a4b-b67b-f730d42f1b0b |
App Service |
Default AuditIfNotExists Allowed AuditIfNotExists, Disabled |
0 |
|
GA |
App Service Environment should have internal encryption enabled |
fb74e86f-d351-4b8d-b034-93da7391c01f |
App Service |
Default Audit Allowed Audit, Disabled |
0 |
|
GA |
Assess information security events |
37b0045b-3887-367b-8b4d-b9a6fa911bb9 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Assess risk in third party relationships |
0d04cb93-a0f1-2f4b-4b1b-a72a1b510d08 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Assess Security Controls |
c423e64d-995c-9f67-0403-b540f65ba42a |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Assign account managers |
4c6df5ff-4ef2-4f17-a516-0da9189c603b |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Assign an authorizing official (AO) |
e29a8f1b-149b-2fa3-969d-ebee1baa9472 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Assign information security representative to change control |
6abdf7c7-362b-3f35-099e-533ed50988f9 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Assign risk designations |
b7897ddc-9716-2460-96f7-7757ad038cc4 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Assign system identifiers |
f29b17a4-0df2-8a50-058a-8570f9979d28 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Audit Linux machines that allow remote connections from accounts without passwords |
ea53dbee-c6c9-4f0e-9f9e-de0039b78023 |
Guest Configuration |
Default AuditIfNotExists Allowed AuditIfNotExists, Disabled |
0 |
|
GA |
Audit Linux machines that do not have the passwd file permissions set to 0644 |
e6955644-301c-44b5-a4c4-528577de6861 |
Guest Configuration |
Default AuditIfNotExists Allowed AuditIfNotExists, Disabled |
0 |
|
GA |
Audit Linux machines that have accounts without passwords |
f6ec09a3-78bf-4f8f-99dc-6c77182d0f99 |
Guest Configuration |
Default AuditIfNotExists Allowed AuditIfNotExists, Disabled |
0 |
|
GA |
Audit privileged functions |
f26af0b1-65b6-689a-a03f-352ad2d00f98 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Audit usage of custom RBAC roles |
a451c1ef-c6ca-483d-87ed-f49761e3ffb5 |
General |
Default Audit Allowed Audit, Disabled |
0 |
|
GA |
Audit user account status |
49c23d9b-02b0-0e42-4f94-e8cef1b8381b |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Audit virtual machines without disaster recovery configured |
0015ea4d-51ff-4ce3-8d8c-f3f8f0179a56 |
Compute |
Fixed auditIfNotExists |
0 |
|
GA |
Audit Windows machines that allow re-use of the passwords after the specified number of unique passwords |
5b054a0d-39e2-4d53-bea3-9734cad2c69b |
Guest Configuration |
Default AuditIfNotExists Allowed AuditIfNotExists, Disabled |
0 |
|
GA |
Audit Windows machines that do not have the maximum password age set to specified number of days |
4ceb8dc2-559c-478b-a15b-733fbf1e3738 |
Guest Configuration |
Default AuditIfNotExists Allowed AuditIfNotExists, Disabled |
0 |
|
GA |
Audit Windows machines that do not have the minimum password age set to specified number of days |
237b38db-ca4d-4259-9e47-7882441ca2c0 |
Guest Configuration |
Default AuditIfNotExists Allowed AuditIfNotExists, Disabled |
0 |
|
GA |
Audit Windows machines that do not have the password complexity setting enabled |
bf16e0bb-31e1-4646-8202-60a235cc7e74 |
Guest Configuration |
Default AuditIfNotExists Allowed AuditIfNotExists, Disabled |
0 |
|
GA |
Audit Windows machines that do not restrict the minimum password length to specified number of characters |
a2d0e922-65d0-40c4-8f87-ea6da2d307a2 |
Guest Configuration |
Default AuditIfNotExists Allowed AuditIfNotExists, Disabled |
0 |
|
GA |
Audit Windows machines that do not store passwords using reversible encryption |
da0f98fe-a24b-4ad5-af69-bd0400233661 |
Guest Configuration |
Default AuditIfNotExists Allowed AuditIfNotExists, Disabled |
0 |
|
GA |
Auditing on SQL server should be enabled |
a6fb4358-5bf4-4ad7-ba82-2cd2f41ce5e9 |
SQL |
Default AuditIfNotExists Allowed AuditIfNotExists, Disabled |
0 |
|
GA |
Authenticate to cryptographic module |
6f1de470-79f3-1572-866e-db0771352fc8 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Authentication to Linux machines should require SSH keys |
630c64f9-8b6b-4c64-b511-6544ceff6fd6 |
Guest Configuration |
Default AuditIfNotExists Allowed AuditIfNotExists, Disabled |
0 |
|
GA |
Authorize access to security functions and information |
aeed863a-0f56-429f-945d-8bb66bd06841 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Authorize and manage access |
50e9324a-7410-0539-0662-2c1e775538b7 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Authorize remote access |
dad8a2e9-6f27-4fc2-8933-7e99fe700c9c |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Authorize remote access to privileged commands |
01c387ea-383d-4ca9-295a-977fab516b03 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Authorize, monitor, and control usage of mobile code technologies |
291f20d4-8d93-1d73-89f3-6ce28b825563 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Authorize, monitor, and control voip |
e4e1f896-8a93-1151-43c7-0ad23b081ee2 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Authorized IP ranges should be defined on Kubernetes Services |
0e246bcf-5f6f-4f87-bc6f-775d4712c7ea |
Security Center |
Default Audit Allowed Audit, Disabled |
0 |
|
GA |
Automate account management |
2cc9c165-46bd-9762-5739-d2aae5ba90a1 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Automate approval request for proposed changes |
575ed5e8-4c29-99d0-0e4d-689fb1d29827 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Automate flaw remediation |
a90c4d44-7fac-8e02-6d5b-0d92046b20e6 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Automate implementation of approved change notifications |
c72fc0c8-2df8-7506-30be-6ba1971747e1 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Automate information sharing decisions |
e54901fe-42c2-7f3b-3c5f-327aa5320a69 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Automate notification of employee termination |
729c8708-2bec-093c-8427-2e87d2cd426d |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Automate process to document implemented changes |
43ac3ccb-4ef6-7d63-9a3f-6848485ba4e8 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Automate process to highlight unreviewed change proposals |
92b49e92-570f-1765-804a-378e6c592e28 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Automate process to prohibit implementation of unapproved changes |
7d10debd-4775-85a7-1a41-7e128e0e8c50 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Automate proposed documented changes |
5c40f27b-6791-18c5-3f85-7b863bd99c11 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Automate remote maintenance activities |
b8587fce-138f-86e8-33a3-c60768bf1da6 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Automation account variables should be encrypted |
3657f5a0-770e-44a3-b44e-9431ba1e9735 |
Automation |
Default Audit Allowed Audit, Deny, Disabled |
0 |
|
GA |
Azure AI Services resources should encrypt data at rest with a customer-managed key (CMK) |
67121cc7-ff39-4ab8-b7e3-95b84dab487d |
Cognitive Services |
Default Audit Allowed Audit, Deny, Disabled |
0 |
|
GA |
Azure AI Services resources should have key access disabled (disable local authentication) |
71ef260a-8f18-47b7-abcb-62d0673d94dc |
Azure Ai Services |
Default Audit Allowed Audit, Deny, Disabled |
0 |
|
GA |
Azure AI Services resources should restrict network access |
037eea7a-bd0a-46c5-9a66-03aea78705d3 |
Azure Ai Services |
Default Audit Allowed Audit, Deny, Disabled |
0 |
|
GA |
Azure API for FHIR should use a customer-managed key to encrypt data at rest |
051cba44-2429-45b9-9649-46cec11c7119 |
API for FHIR |
Default Audit Allowed audit, Audit, disabled, Disabled |
0 |
|
GA |
Azure API for FHIR should use private link |
1ee56206-5dd1-42ab-b02d-8aae8b1634ce |
API for FHIR |
Default Audit Allowed Audit, Disabled |
0 |
|
GA |
Azure Automation accounts should use customer-managed keys to encrypt data at rest |
56a5ee18-2ae6-4810-86f7-18e39ce5629b |
Automation |
Default Audit Allowed Audit, Deny, Disabled |
0 |
|
GA |
Azure Backup should be enabled for Virtual Machines |
013e242c-8828-4970-87b3-ab247555486d |
Backup |
Default AuditIfNotExists Allowed AuditIfNotExists, Disabled |
0 |
|
GA |
Azure Batch account should use customer-managed keys to encrypt data |
99e9ccd8-3db9-4592-b0d1-14b1715a4d8a |
Batch |
Default Audit Allowed Audit, Deny, Disabled |
0 |
|
GA |
Azure Cache for Redis should use private link |
7803067c-7d34-46e3-8c79-0ca68fc4036d |
Cache |
Default AuditIfNotExists Allowed AuditIfNotExists, Disabled |
0 |
|
GA |
Azure Cognitive Search service should use a SKU that supports private link |
a049bf77-880b-470f-ba6d-9f21c530cf83 |
Search |
Default Audit Allowed Audit, Deny, Disabled |
0 |
|
GA |
Azure Cognitive Search services should disable public network access |
ee980b6d-0eca-4501-8d54-f6290fd512c3 |
Search |
Default Audit Allowed Audit, Deny, Disabled |
0 |
|
GA |
Azure Container Instance container group should use customer-managed key for encryption |
0aa61e00-0a01-4a3c-9945-e93cffedf0e6 |
Container Instance |
Default Audit Allowed Audit, Disabled, Deny |
0 |
|
GA |
Azure Cosmos DB accounts should have firewall rules |
862e97cf-49fc-4a5c-9de4-40d4e2e7c8eb |
Cosmos DB |
Default Deny Allowed Audit, Deny, Disabled |
0 |
|
GA |
Azure Cosmos DB accounts should use customer-managed keys to encrypt data at rest |
1f905d99-2ab7-462c-a6b0-f709acca6c8f |
Cosmos DB |
Default Audit Allowed audit, Audit, deny, Deny, disabled, Disabled |
0 |
|
GA |
Azure Data Box jobs should enable double encryption for data at rest on the device |
c349d81b-9985-44ae-a8da-ff98d108ede8 |
Data Box |
Default Audit Allowed Audit, Deny, Disabled |
0 |
|
GA |
Azure Data Box jobs should use a customer-managed key to encrypt the device unlock password |
86efb160-8de7-451d-bc08-5d475b0aadae |
Data Box |
Default Audit Allowed Audit, Deny, Disabled |
0 |
|
GA |
Azure Data Explorer encryption at rest should use a customer-managed key |
81e74cea-30fd-40d5-802f-d72103c2aaaa |
Azure Data Explorer |
Default Audit Allowed Audit, Deny, Disabled |
0 |
|
GA |
Azure data factories should be encrypted with a customer-managed key |
4ec52d6d-beb7-40c4-9a9e-fe753254690e |
Data Factory |
Default Audit Allowed Audit, Deny, Disabled |
0 |
|
GA |
Azure Data Factory should use private link |
8b0323be-cc25-4b61-935d-002c3798c6ea |
Data Factory |
Default AuditIfNotExists Allowed AuditIfNotExists, Disabled |
0 |
|
GA |
Azure DDoS Protection should be enabled |
a7aca53f-2ed4-4466-a25e-0b45ade68efd |
Security Center |
Default AuditIfNotExists Allowed AuditIfNotExists, Disabled |
0 |
|
GA |
Azure Defender for App Service should be enabled |
2913021d-f2fd-4f3d-b958-22354e2bdbcb |
Security Center |
Default AuditIfNotExists Allowed AuditIfNotExists, Disabled |
0 |
|
GA |
Azure Defender for Azure SQL Database servers should be enabled |
7fe3b40f-802b-4cdd-8bd4-fd799c948cc2 |
Security Center |
Default AuditIfNotExists Allowed AuditIfNotExists, Disabled |
0 |
|
GA |
Azure Defender for Key Vault should be enabled |
0e6763cc-5078-4e64-889d-ff4d9a839047 |
Security Center |
Default AuditIfNotExists Allowed AuditIfNotExists, Disabled |
0 |
|
GA |
Azure Defender for Resource Manager should be enabled |
c3d20c29-b36d-48fe-808b-99a87530ad99 |
Security Center |
Default AuditIfNotExists Allowed AuditIfNotExists, Disabled |
0 |
|
GA |
Azure Defender for servers should be enabled |
4da35fc9-c9e7-4960-aec9-797fe7d9051d |
Security Center |
Default AuditIfNotExists Allowed AuditIfNotExists, Disabled |
0 |
|
GA |
Azure Defender for SQL servers on machines should be enabled |
6581d072-105e-4418-827f-bd446d56421b |
Security Center |
Default AuditIfNotExists Allowed AuditIfNotExists, Disabled |
0 |
|
GA |
Azure Defender for SQL should be enabled for unprotected Azure SQL servers |
abfb4388-5bf4-4ad7-ba82-2cd2f41ceae9 |
SQL |
Default AuditIfNotExists Allowed AuditIfNotExists, Disabled |
0 |
|
GA |
Azure Defender for SQL should be enabled for unprotected SQL Managed Instances |
abfb7388-5bf4-4ad7-ba99-2cd2f41cebb9 |
SQL |
Default AuditIfNotExists Allowed AuditIfNotExists, Disabled |
0 |
|
GA |
Azure Event Grid domains should use private link |
9830b652-8523-49cc-b1b3-e17dce1127ca |
Event Grid |
Default Audit Allowed Audit, Disabled |
0 |
|
GA |
Azure Event Grid topics should use private link |
4b90e17e-8448-49db-875e-bd83fb6f804f |
Event Grid |
Default Audit Allowed Audit, Disabled |
0 |
|
GA |
Azure File Sync should use private link |
1d320205-c6a1-4ac6-873d-46224024e8e2 |
Storage |
Default AuditIfNotExists Allowed AuditIfNotExists, Disabled |
0 |
|
GA |
Azure HDInsight clusters should use customer-managed keys to encrypt data at rest |
64d314f6-6062-4780-a861-c23e8951bee5 |
HDInsight |
Default Audit Allowed Audit, Deny, Disabled |
0 |
|
GA |
Azure HDInsight clusters should use encryption at host to encrypt data at rest |
1fd32ebd-e4c3-4e13-a54a-d7422d4d95f6 |
HDInsight |
Default Audit Allowed Audit, Deny, Disabled |
0 |
|
GA |
Azure HDInsight clusters should use encryption in transit to encrypt communication between Azure HDInsight cluster nodes |
d9da03a1-f3c3-412a-9709-947156872263 |
HDInsight |
Default Audit Allowed Audit, Deny, Disabled |
0 |
|
GA |
Azure Key Vault should have firewall enabled |
55615ac9-af46-4a59-874e-391cc3dfb490 |
Key Vault |
Default Audit Allowed Audit, Deny, Disabled |
0 |
|
GA |
Azure Key Vaults should use private link |
a6abeaec-4d90-4a02-805f-6b26c4d3fbe9 |
Key Vault |
Default Audit Allowed Audit, Deny, Disabled |
0 |
|
GA |
Azure Machine Learning workspaces should be encrypted with a customer-managed key |
ba769a63-b8cc-4b2d-abf6-ac33c7204be8 |
Machine Learning |
Default Audit Allowed Audit, Deny, Disabled |
0 |
|
GA |
Azure Machine Learning workspaces should use private link |
45e05259-1eb5-4f70-9574-baf73e9d219b |
Machine Learning |
Default Audit Allowed Audit, Disabled |
0 |
|
GA |
Azure Monitor Logs clusters should be created with infrastructure-encryption enabled (double encryption) |
ea0dfaed-95fb-448c-934e-d6e713ce393d |
Monitoring |
Default Audit Allowed audit, Audit, deny, Deny, disabled, Disabled |
0 |
|
GA |
Azure Monitor Logs clusters should be encrypted with customer-managed key |
1f68a601-6e6d-4e42-babf-3f643a047ea2 |
Monitoring |
Default Audit Allowed audit, Audit, deny, Deny, disabled, Disabled |
0 |
|
GA |
Azure Policy Add-on for Kubernetes service (AKS) should be installed and enabled on your clusters |
0a15ec92-a229-4763-bb14-0ea34a568f8d |
Kubernetes |
Default Audit Allowed Audit, Disabled |
0 |
|
GA |
Azure Service Bus namespaces should use private link |
1c06e275-d63d-4540-b761-71f364c2111d |
Service Bus |
Default AuditIfNotExists Allowed AuditIfNotExists, Disabled |
0 |
|
GA |
Azure SignalR Service should use private link |
2393d2cf-a342-44cd-a2e2-fe0188fd1234 |
SignalR |
Default Audit Allowed Audit, Disabled |
0 |
|
GA |
Azure Spring Cloud should use network injection |
af35e2a4-ef96-44e7-a9ae-853dd97032c4 |
App Platform |
Default Audit Allowed Audit, Disabled, Deny |
0 |
|
GA |
Azure Stack Edge devices should use double-encryption |
b4ac1030-89c5-4697-8e00-28b5ba6a8811 |
Azure Stack Edge |
Default Audit Allowed audit, Audit, deny, Deny, disabled, Disabled |
0 |
|
GA |
Azure Stream Analytics jobs should use customer-managed keys to encrypt data |
87ba29ef-1ab3-4d82-b763-87fcd4f531f7 |
Stream Analytics |
Default Audit Allowed audit, Audit, deny, Deny, disabled, Disabled |
0 |
|
GA |
Azure Synapse workspaces should use customer-managed keys to encrypt data at rest |
f7d52b2d-e161-4dfa-a82b-55e564167385 |
Synapse |
Default Audit Allowed Audit, Deny, Disabled |
0 |
|
GA |
Azure Synapse workspaces should use private link |
72d11df1-dd8a-41f7-8925-b05b960ebafc |
Synapse |
Default Audit Allowed Audit, Disabled |
0 |
|
GA |
Azure Web Application Firewall should be enabled for Azure Front Door entry-points |
055aa869-bc98-4af8-bafc-23f1ab6ffe2c |
Network |
Default Audit Allowed Audit, Deny, Disabled |
0 |
|
GA |
Azure Web PubSub Service should use private link |
eb907f70-7514-460d-92b3-a5ae93b4f917 |
Web PubSub |
Default Audit Allowed Audit, Disabled |
0 |
|
GA |
Bind authenticators and identities dynamically |
6f311b49-9b0d-8c67-3d6e-db80ae528173 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Block untrusted and unsigned processes that run from USB |
3d399cf3-8fc6-0efc-6ab0-1412f1198517 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Blocked accounts with owner permissions on Azure resources should be removed |
0cfea604-3201-4e14-88fc-fae4c427a6c5 |
Security Center |
Default AuditIfNotExists Allowed AuditIfNotExists, Disabled |
0 |
|
GA |
Blocked accounts with read and write permissions on Azure resources should be removed |
8d7e1fde-fe26-4b5f-8108-f8e432cbc2be |
Security Center |
Default AuditIfNotExists Allowed AuditIfNotExists, Disabled |
0 |
|
GA |
Bot Service should be encrypted with a customer-managed key |
51522a96-0869-4791-82f3-981000c2c67f |
Bot Service |
Default Audit Allowed audit, Audit, deny, Deny, disabled, Disabled |
0 |
|
GA |
Both operating systems and data disks in Azure Kubernetes Service clusters should be encrypted by customer-managed keys |
7d7be79c-23ba-4033-84dd-45e2a5ccdd67 |
Kubernetes |
Default Audit Allowed Audit, Deny, Disabled |
0 |
|
GA |
Categorize information |
93fa357f-2e38-22a9-5138-8cc5124e1923 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Certificates should have the specified maximum validity period |
0a075868-4c26-42ef-914c-5bc007359560 |
Key Vault |
Default Audit Allowed audit, Audit, deny, Deny, disabled, Disabled |
0 |
|
GA |
Check for privacy and security compliance before establishing internal connections |
ee4bbbbb-2e52-9adb-4e3a-e641f7ac68ab |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Clear personnel with access to classified information |
c42f19c9-5d88-92da-0742-371a0ea03126 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Communicate contingency plan changes |
a1334a65-2622-28ee-5067-9d7f5b915cc5 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Compile Audit records into system wide audit |
214ea241-010d-8926-44cc-b90a96d52adc |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Conduct a full text analysis of logged privileged commands |
8eea8c14-4d93-63a3-0c82-000343ee5204 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Conduct a security impact analysis |
203101f5-99a3-1491-1b56-acccd9b66a9e |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Conduct backup of information system documentation |
b269a749-705e-8bff-055a-147744675cdf |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Conduct capacity planning |
33602e78-35e3-4f06-17fb-13dd887448e4 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Conduct exit interview upon termination |
496b407d-9b9e-81e8-4ba4-44bc686b016a |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Conduct incident response testing |
3545c827-26ee-282d-4629-23952a12008b |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Conduct Risk Assessment |
677e1da4-00c3-287a-563d-f4a1cf9b99a0 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Conduct risk assessment and distribute its results |
d7c1ecc3-2980-a079-1569-91aec8ac4a77 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Conduct risk assessment and document its results |
1dbd51c2-2bd1-5e26-75ba-ed075d8f0d68 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Configure actions for noncompliant devices |
b53aa659-513e-032c-52e6-1ce0ba46582f |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Configure Azure Audit capabilities |
a3e98638-51d4-4e28-910a-60e98c1a756f |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Configure detection whitelist |
2927e340-60e4-43ad-6b5f-7a1468232cc2 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Configure workstations to check for digital certificates |
26daf649-22d1-97e9-2a8a-01b182194d59 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Conform to FICAM-issued profiles |
a8df9c78-4044-98be-2c05-31a315ac8957 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Container registries should be encrypted with a customer-managed key |
5b9159ae-1701-4a6f-9a7a-aa9c8ddd0580 |
Container Registry |
Default Audit Allowed Audit, Deny, Disabled |
0 |
|
GA |
Container registries should not allow unrestricted network access |
d0793b48-0edc-4296-a390-4c75d1bdfd71 |
Container Registry |
Default Audit Allowed Audit, Deny, Disabled |
0 |
|
GA |
Container registries should use private link |
e8eef0a8-67cf-4eb4-9386-14b0e78733d4 |
Container Registry |
Default Audit Allowed Audit, Disabled |
0 |
|
GA |
Control information flow |
59bedbdc-0ba9-39b9-66bb-1d1c192384e6 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Control maintenance and repair activities |
b6ad009f-5c24-1dc0-a25e-74b60e4da45f |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Control physical access |
55a7f9a0-6397-7589-05ef-5ed59a8149e7 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Control use of portable storage devices |
36b74844-4a99-4c80-1800-b18a516d1585 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Coordinate contingency plans with related plans |
c5784049-959f-6067-420c-f4cefae93076 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Coordinate with external organizations to achieve cross org perspective |
d4e6a629-28eb-79a9-000b-88030e4823ca |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Correlate audit records |
10874318-0bf7-a41f-8463-03e395482080 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Correlate Vulnerability scan information |
e3905a3c-97e7-0b4f-15fb-465c0927536f |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
CosmosDB accounts should use private link |
58440f8a-10c5-4151-bdce-dfbaad4a20b7 |
Cosmos DB |
Default Audit Allowed Audit, Disabled |
0 |
|
GA |
Create a data inventory |
043c1e56-5a16-52f8-6af8-583098ff3e60 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Create alternative actions for identified anomalies |
cc2f7339-2fac-1ea9-9ca3-cd530fbb0da2 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Create configuration plan protection |
874a6f2e-2098-53bc-3a16-20dcdc425a7e |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Create separate alternate and primary storage sites |
81b6267b-97a7-9aa5-51ee-d2584a160424 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Define a physical key management process |
51e4b233-8ee3-8bdc-8f5f-f33bd0d229b7 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Define acceptable and unacceptable mobile code technologies |
1afada58-8b34-7ac2-a38a-983218635201 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Define access authorizations to support separation of duties |
341bc9f1-7489-07d9-4ec6-971573e1546a |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Define and document government oversight |
cbfa1bd0-714d-8d6f-0480-2ad6a53972df |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Define and enforce conditions for shared and group accounts |
f7eb1d0b-6d4f-2d59-1591-7563e11a9313 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Define and enforce inactivity log policy |
2af4640d-11a6-a64b-5ceb-a468f4341c0c |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Define and enforce the limit of concurrent sessions |
d8350d4c-9314-400b-288f-20ddfce04fbd |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Define cryptographic use |
c4ccd607-702b-8ae6-8eeb-fc3339cd4b42 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Define information security roles and responsibilities |
ef5a7059-6651-73b1-18b3-75b1b79c1565 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Define information system account types |
623b5f0a-8cbd-03a6-4892-201d27302f0c |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Define mobile device requirements |
9ca3a3ea-3a1f-8ba0-31a8-6aed0fe1a7a4 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Define organizational requirements for cryptographic key management |
d661e9eb-4e15-5ba1-6f02-cdc467db0d6c |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Define requirements for managing assets |
25a1f840-65d0-900a-43e4-bee253de04de |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Define requirements for supplying goods and services |
2b2f3a72-9e68-3993-2b69-13dcdecf8958 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Deliver security assessment results |
8e49107c-3338-40d1-02aa-d524178a2afe |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Deploy the Linux Guest Configuration extension to enable Guest Configuration assignments on Linux VMs |
331e8ea8-378a-410f-a2e5-ae22f38bb0da |
Guest Configuration |
Fixed deployIfNotExists |
1 |
Contributor |
GA |
Deploy the Windows Guest Configuration extension to enable Guest Configuration assignments on Windows VMs |
385f5831-96d4-41db-9a3c-cd3af78aaae6 |
Guest Configuration |
Fixed deployIfNotExists |
1 |
Contributor |
GA |
Design an access control model |
03b6427e-6072-4226-4bd9-a410ab65317e |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Designate authorized personnel to post publicly accessible information |
b4512986-80f5-1656-0c58-08866bd2673a |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Designate personnel to supervise unauthorized maintenance activities |
7a489c62-242c-5db9-74df-c073056d6fa3 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Detect network services that have not been authorized or approved |
86ecd378-a3a0-5d5b-207c-05e6aaca43fc |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Determine assertion requirements |
7a0ecd94-3699-5273-76a5-edb8499f655a |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Determine auditable events |
2f67e567-03db-9d1f-67dc-b6ffb91312f4 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Determine supplier contract obligations |
67ada943-8539-083d-35d0-7af648974125 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Develop a concept of operations (CONOPS) |
e7422f08-65b4-50e4-3779-d793156e0079 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Develop acceptable use policies and procedures |
42116f15-5665-a52a-87bb-b40e64c74b6c |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Develop access control policies and procedures |
59f7feff-02aa-6539-2cf7-bea75b762140 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Develop an incident response plan |
2b4e134f-1e4c-2bff-573e-082d85479b6e |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Develop and document a business continuity and disaster recovery plan |
bd6cbcba-4a2d-507c-53e3-296b5c238a8e |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Develop and document a DDoS response plan |
b7306e73-0494-83a2-31f5-280e934a8f70 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Develop and document application security requirements |
6de65dc4-8b4f-34b7-9290-eb137a2e2929 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Develop and establish a system security plan |
b2ea1058-8998-3dd1-84f1-82132ad482fd |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Develop and maintain a vulnerability management standard |
055da733-55c6-9e10-8194-c40731057ec4 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Develop and maintain baseline configurations |
2f20840e-7925-221c-725d-757442753e7c |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Develop audit and accountability policies and procedures |
a28323fe-276d-3787-32d2-cef6395764c4 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Develop business classification schemes |
11ba0508-58a8-44de-5f3a-9e05d80571da |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Develop configuration item identification plan |
836f8406-3b8a-11bb-12cb-6c7fa0765668 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Develop configuration management plan |
04837a26-2601-1982-3da7-bf463e6408f4 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Develop contingency plan |
aa305b4d-8c84-1754-0c74-dec004e66be0 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Develop contingency planning policies and procedures |
75b42dcf-7840-1271-260b-852273d7906e |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Develop information security policies and procedures |
af227964-5b8b-22a2-9364-06d2cb9d6d7c |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Develop organization code of conduct policy |
d02498e0-8a6f-6b02-8332-19adf6711d1e |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Develop POA&M |
477bd136-7dd9-55f8-48ac-bae096b86a07 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Develop security assessment plan |
1c258345-5cd4-30c8-9ef3-5ee4dd5231d6 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Develop security safeguards |
423f6d9c-0c73-9cc6-64f4-b52242490368 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Develop spillage response procedures |
bb048641-6017-7272-7772-a008f285a520 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Develop SSP that meets criteria |
6b957f60-54cd-5752-44d5-ff5a64366c93 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Disable authenticators upon termination |
d9d48ffb-0d8c-0bd5-5f31-5a5826d19f10 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Disable user accounts posing a significant risk |
22c16ae4-19d0-29cb-422f-cb44061180ee |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Discover any indicators of compromise |
07b42fb5-027e-5a3c-4915-9d9ef3020ec7 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Disk access resources should use private link |
f39f5f49-4abf-44de-8c70-0756997bfb51 |
Compute |
Default AuditIfNotExists Allowed AuditIfNotExists, Disabled |
0 |
|
GA |
Disk encryption should be enabled on Azure Data Explorer |
f4b53539-8df9-40e4-86c6-6b607703bd4e |
Azure Data Explorer |
Default Audit Allowed Audit, Deny, Disabled |
0 |
|
GA |
Display an explicit logout message |
0471c6b7-1588-701c-2713-1fade73b75f6 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Disseminate security alerts to personnel |
9c93ef57-7000-63fb-9b74-88f2e17ca5d2 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Distribute authenticators |
098dcde7-016a-06c3-0985-0daaf3301d3a |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Distribute information system documentation |
84a01872-5318-049e-061e-d56734183e84 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Distribute policies and procedures |
eff6e4a5-3efe-94dd-2ed1-25d56a019a82 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Document access privileges |
a08b18c7-9e0a-89f1-3696-d80902196719 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Document acquisition contract acceptance criteria |
0803eaa7-671c-08a7-52fd-ac419f775e75 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Document and implement wireless access guidelines |
04b3e7f6-4841-888d-4799-cda19a0084f6 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Document customer-defined actions |
8c44a0ea-9b09-4d9c-0e91-f9bee3d05bfb |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Document mobility training |
83dfb2b8-678b-20a0-4c44-5c75ada023e6 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Document organizational access agreements |
c981fa70-2e58-8141-1457-e7f62ebc2ade |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Document personnel acceptance of privacy requirements |
271a3e58-1b38-933d-74c9-a580006b80aa |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Document protection of personal data in acquisition contracts |
f9ec3263-9562-1768-65a1-729793635a8d |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Document protection of security information in acquisition contracts |
d78f95ba-870a-a500-6104-8a5ce2534f19 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Document remote access guidelines |
3d492600-27ba-62cc-a1c3-66eb919f6a0d |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Document requirements for the use of shared data in contracts |
0ba211ef-0e85-2a45-17fc-401d1b3f8f85 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Document security and privacy training activities |
524e7136-9f6a-75ba-9089-501018151346 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Document security assurance requirements in acquisition contracts |
13efd2d7-3980-a2a4-39d0-527180c009e8 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Document security documentation requirements in acquisition contract |
a465e8e9-0095-85cb-a05f-1dd4960d02af |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Document security functional requirements in acquisition contracts |
57927290-8000-59bf-3776-90c468ac5b4b |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Document security operations |
2c6bee3a-2180-2430-440d-db3c7a849870 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Document security strength requirements in acquisition contracts |
ebb0ba89-6d8c-84a7-252b-7393881e43de |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Document separation of duties |
e6f7b584-877a-0d69-77d4-ab8b923a9650 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Document the information system environment in acquisition contracts |
c148208b-1a6f-a4ac-7abc-23b1d41121b1 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Document the protection of cardholder data in third party contracts |
77acc53d-0f67-6e06-7d04-5750653d4629 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Document third-party personnel security requirements |
b320aa42-33b4-53af-87ce-100091d48918 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Document wireless access security controls |
8f835d6a-4d13-9a9c-37dc-176cebd37fda |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Double encryption should be enabled on Azure Data Explorer |
ec068d99-e9c7-401f-8cef-5bdde4e6ccf1 |
Azure Data Explorer |
Default Audit Allowed Audit, Deny, Disabled |
0 |
|
GA |
Email notification for high severity alerts should be enabled |
6e2593d9-add6-4083-9c9b-4b7d2188c899 |
Security Center |
Default AuditIfNotExists Allowed AuditIfNotExists, Disabled |
0 |
|
GA |
Email notification to subscription owner for high severity alerts should be enabled |
0b15565f-aa9e-48ba-8619-45960f2c314d |
Security Center |
Default AuditIfNotExists Allowed AuditIfNotExists, Disabled |
0 |
|
GA |
Employ a media sanitization mechanism |
eaaae23f-92c9-4460-51cf-913feaea4d52 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Employ automated training environment |
c8aa992d-76b7-7ca0-07b3-31a58d773fa9 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Employ automatic emergency lighting |
aa892c0d-2c40-200c-0dd8-eac8c4748ede |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Employ automatic shutdown/restart when violations are detected |
1b8a7ec3-11cc-a2d3-8cd0-eedf074424a4 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Employ boundary protection to isolate information systems |
311802f9-098d-0659-245a-94c5d47c0182 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Employ FICAM-approved resources to accept third-party credentials |
db8b35d6-8adb-3f51-44ff-c648ab5b1530 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Employ FIPS 201-approved technology for PIV |
8b333332-6efd-7c0d-5a9f-d1eb95105214 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Employ flow control mechanisms of encrypted information |
79365f13-8ba4-1f6c-2ac4-aa39929f56d0 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Employ independent assessors for continuous monitoring |
3baee3fd-30f5-882c-018c-cc78703a0106 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Employ independent assessors to conduct security control assessments |
b65c5d8e-9043-9612-2c17-65f231d763bb |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Employ independent team for penetration testing |
611ebc63-8600-50b6-a0e3-fef272457132 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Employ least privilege access |
1bc7fd64-291f-028e-4ed6-6e07886e163f |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Employ restrictions on external system interconnections |
80029bc5-834f-3a9c-a2d8-acbc1aab4e9f |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Enable detection of network devices |
426c172c-9914-10d1-25dd-669641fc1af4 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Enable dual or joint authorization |
2c843d78-8f64-92b5-6a9b-e8186c0e7eb6 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Enable network protection |
8c255136-994b-9616-79f5-ae87810e0dcf |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Enforce a limit of consecutive failed login attempts |
b4409bff-2287-8407-05fd-c73175a68302 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Enforce and audit access restrictions |
8cd815bf-97e1-5144-0735-11f6ddb50a59 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Enforce appropriate usage of all accounts |
fd81a1b3-2d7a-107c-507e-29b87d040c19 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Enforce expiration of cached authenticators |
c7e8ddc1-14aa-1814-7fe1-aad1742b27da |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Enforce logical access |
10c4210b-3ec9-9603-050d-77e4d26c7ebb |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Enforce mandatory and discretionary access control policies |
b1666a13-8f67-9c47-155e-69e027ff6823 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Enforce random unique session identifiers |
c7d57a6a-7cc2-66c0-299f-83bf90558f5d |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Enforce rules of behavior and access agreements |
509552f5-6528-3540-7959-fbeae4832533 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Enforce security configuration settings |
058e9719-1ff9-3653-4230-23f76b6492e0 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Enforce software execution privileges |
68d2e478-3b19-23eb-1357-31b296547457 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Enforce SSL connection should be enabled for MySQL database servers |
e802a67a-daf5-4436-9ea6-f6d821dd0c5d |
SQL |
Default Audit Allowed Audit, Disabled |
0 |
|
GA |
Enforce SSL connection should be enabled for PostgreSQL database servers |
d158790f-bfb0-486c-8631-2dc6b4e8e6af |
SQL |
Default Audit Allowed Audit, Disabled |
0 |
|
GA |
Enforce user uniqueness |
e336d5f4-4d8f-0059-759c-ae10f63d1747 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Ensure access agreements are signed or resigned timely |
e7589f4e-1e8b-72c2-3692-1e14d7f3699f |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Ensure alternate storage site safeguards are equivalent to primary site |
178c8b7e-1b6e-4289-44dd-2f1526b678a1 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Ensure audit records are not altered |
27ce30dd-3d56-8b54-6144-e26d9a37a541 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Ensure authorized users protect provided authenticators |
37dbe3dc-0e9c-24fa-36f2-11197cbfa207 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Ensure cryptographic mechanisms are under configuration management |
b8dad106-6444-5f55-307e-1e1cc9723e39 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Ensure external providers consistently meet interests of the customers |
3eabed6d-1912-2d3c-858b-f438d08d0412 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Ensure information system fails in known state |
12af7c7a-92af-9e96-0d0c-5e732d1a3751 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Ensure resources are authorized |
0716f0f5-4955-2ccb-8d5e-c6be14d57c0f |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Ensure security categorization is approved |
6c79c3e5-5f7b-a48a-5c7b-8c158bc01115 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Ensure security safeguards not needed when the individuals return |
1fdf0b24-4043-3c55-357e-036985d50b52 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Ensure system capable of dynamic isolation of resources |
83eea3d3-0d2c-9ccd-1021-2111b29b2a62 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Ensure there are no unencrypted static authenticators |
eda0cbb7-6043-05bf-645b-67411f1a59b3 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Eradicate contaminated information |
54a9c072-4a93-2a03-6a43-a060d30383d7 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Establish a configuration control board |
7380631c-5bf5-0e3a-4509-0873becd8a63 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Establish a data leakage management procedure |
3c9aa856-6b86-35dc-83f4-bc72cec74dea |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Establish a discrete line item in budgeting documentation |
06af77de-02ca-0f3e-838a-a9420fe466f5 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Establish a password policy |
d8bbd80e-3bb1-5983-06c2-428526ec6a63 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Establish a privacy program |
39eb03c1-97cc-11ab-0960-6209ed2869f7 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Establish a risk management strategy |
d36700f2-2f0d-7c2a-059c-bdadd1d79f70 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Establish a secure software development program |
e750ca06-1824-464a-2cf3-d0fa754d1cb4 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Establish a threat intelligence program |
b0e3035d-6366-2e37-796e-8bcab9c649e6 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Establish alternate storage site that facilitates recovery operations |
245fe58b-96f8-9f1e-48c5-7f49903f66fd |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Establish alternate storage site to store and retrieve backup information |
0a412110-3874-9f22-187a-c7a81c8a6704 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Establish an alternate processing site |
af5ff768-a34b-720e-1224-e6b3214f3ba6 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Establish an information security program |
84245967-7882-54f6-2d34-85059f725b47 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Establish and document a configuration management plan |
526ed90e-890f-69e7-0386-ba5c0f1f784f |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Establish and document change control processes |
bd4dc286-2f30-5b95-777c-681f3a7913d3 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Establish and maintain an asset inventory |
27965e62-141f-8cca-426f-d09514ee5216 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Establish authenticator types and processes |
921ae4c1-507f-5ddb-8a58-cfa9b5fd96f0 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Establish backup policies and procedures |
4f23967c-a74b-9a09-9dc2-f566f61a87b9 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Establish benchmarks for flaw remediation |
dd2523d5-2db3-642b-a1cf-83ac973b32c2 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Establish conditions for role membership |
97cfd944-6f0c-7db2-3796-8e890ef70819 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Establish configuration management requirements for developers |
8747b573-8294-86a0-8914-49e9b06a5ace |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Establish electronic signature and certificate requirements |
6f3866e8-6e12-69cf-788c-809d426094a1 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Establish firewall and router configuration standards |
398fdbd8-56fd-274d-35c6-fa2d3b2755a1 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Establish network segmentation for card holder data environment |
f476f3b0-4152-526e-a209-44e5f8c968d7 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Establish parameters for searching secret authenticators and verifiers |
0065241c-72e9-3b2c-556f-75de66332a94 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Establish policies for supply chain risk management |
9150259b-617b-596d-3bf5-5ca3fce20335 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Establish procedures for initial authenticator distribution |
35963d41-4263-0ef9-98d5-70eb058f9e3c |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Establish relationship between incident response capability and external providers |
b470a37a-7a47-3792-34dd-7a793140702e |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Establish requirements for audit review and reporting |
b3c8cc83-20d3-3890-8bc8-5568777670f4 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Establish requirements for internet service providers |
5f2e834d-7e40-a4d5-a216-e49b16955ccf |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Establish security requirements for the manufacturing of connected devices |
afbecd30-37ee-a27b-8e09-6ac49951a0ee |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Establish terms and conditions for accessing resources |
3c93dba1-84fd-57de-33c7-ef0400a08134 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Establish terms and conditions for processing resources |
5715bf33-a5bd-1084-4e19-bc3c83ec1c35 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Establish third-party personnel security requirements |
3881168c-5d38-6f04-61cc-b5d87b2c4c58 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Establish usage restrictions for mobile code technologies |
ffdaa742-0d6f-726f-3eac-6e6c34e36c93 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Establish voip usage restrictions |
68a39c2b-0f17-69ee-37a3-aa10f9853a08 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Evaluate alternate processing site capabilities |
60442979-6333-85f0-84c5-b887bac67448 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Event Hub namespaces should use a customer-managed key for encryption |
a1ad735a-e96f-45d2-a7b2-9a4932cab7ec |
Event Hub |
Default Audit Allowed Audit, Disabled |
0 |
|
GA |
Event Hub namespaces should use private link |
b8564268-eb4a-4337-89be-a19db070c59d |
Event Hub |
Default AuditIfNotExists Allowed AuditIfNotExists, Disabled |
0 |
|
GA |
Execute actions in response to information spills |
ba78efc6-795c-64f4-7a02-91effbd34af9 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Explicitly notify use of collaborative computing devices |
62fa14f0-4cbe-762d-5469-0899a99b98aa |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Facilitate information sharing |
a44c9fba-43f8-4b7b-7ee6-db52c96b4366 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Function apps should have Client Certificates (Incoming client certificates) enabled |
ab6a902f-9493-453b-928d-62c30b11b5a6 |
App Service |
Default AuditIfNotExists Allowed AuditIfNotExists, Disabled |
0 |
|
GA |
Function apps should have remote debugging turned off |
0e60b895-3786-45da-8377-9c6b4b6ac5f9 |
App Service |
Default AuditIfNotExists Allowed AuditIfNotExists, Disabled |
0 |
|
GA |
Function apps should not have CORS configured to allow every resource to access your apps |
0820b7b9-23aa-4725-a1ce-ae4558f718e5 |
App Service |
Default AuditIfNotExists Allowed AuditIfNotExists, Disabled |
0 |
|
GA |
Function apps should only be accessible over HTTPS |
6d555dd1-86f2-4f1c-8ed7-5abae7c6cbab |
App Service |
Default Audit Allowed Audit, Disabled, Deny |
0 |
|
GA |
Function apps should require FTPS only |
399b2637-a50f-4f95-96f8-3a145476eb15 |
App Service |
Default AuditIfNotExists Allowed AuditIfNotExists, Disabled |
0 |
|
GA |
Function apps should use latest 'HTTP Version' |
e2c1c086-2d84-4019-bff3-c44ccd95113c |
App Service |
Default AuditIfNotExists Allowed AuditIfNotExists, Disabled |
0 |
|
GA |
Function apps should use managed identity |
0da106f2-4ca3-48e8-bc85-c638fe6aea8f |
App Service |
Default AuditIfNotExists Allowed AuditIfNotExists, Disabled |
0 |
|
GA |
Function apps should use the latest TLS version |
f9d614c5-c173-4d56-95a7-b4437057d193 |
App Service |
Default AuditIfNotExists Allowed AuditIfNotExists, Disabled |
0 |
|
GA |
Generate error messages |
c2cb4658-44dc-9d11-3dad-7c6802dd5ba3 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Generate internal security alerts |
171e377b-5224-4a97-1eaa-62a3b5231dac |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Geo-redundant backup should be enabled for Azure Database for MariaDB |
0ec47710-77ff-4a3d-9181-6aa50af424d0 |
SQL |
Default Audit Allowed Audit, Disabled |
0 |
|
GA |
Geo-redundant backup should be enabled for Azure Database for MySQL |
82339799-d096-41ae-8538-b108becf0970 |
SQL |
Default Audit Allowed Audit, Disabled |
0 |
|
GA |
Geo-redundant backup should be enabled for Azure Database for PostgreSQL |
48af4db5-9b8b-401c-8e74-076be876a430 |
SQL |
Default Audit Allowed Audit, Disabled |
0 |
|
GA |
Geo-redundant storage should be enabled for Storage Accounts |
bf045164-79ba-4215-8f95-f8048dc1780b |
Storage |
Default Audit Allowed Audit, Disabled |
0 |
|
GA |
Govern and monitor audit processing activities |
333b4ada-4a02-0648-3d4d-d812974f1bb2 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Govern compliance of cloud service providers |
5c33538e-02f8-0a7f-998b-a4c1e22076d3 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Govern policies and procedures |
1a2a03a4-9992-5788-5953-d8f6615306de |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Govern the allocation of resources |
33d34fac-56a8-1c0f-0636-3ed94892a709 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Guest accounts with owner permissions on Azure resources should be removed |
339353f6-2387-4a45-abe4-7f529d121046 |
Security Center |
Default AuditIfNotExists Allowed AuditIfNotExists, Disabled |
0 |
|
GA |
Guest accounts with read permissions on Azure resources should be removed |
e9ac8f8e-ce22-4355-8f04-99b911d6be52 |
Security Center |
Default AuditIfNotExists Allowed AuditIfNotExists, Disabled |
0 |
|
GA |
Guest accounts with write permissions on Azure resources should be removed |
94e1c2ac-cbbe-4cac-a2b5-389c812dee87 |
Security Center |
Default AuditIfNotExists Allowed AuditIfNotExists, Disabled |
0 |
|
GA |
Guest Configuration extension should be installed on your machines |
ae89ebca-1c92-4898-ac2c-9f63decb045c |
Security Center |
Default AuditIfNotExists Allowed AuditIfNotExists, Disabled |
0 |
|
GA |
HPC Cache accounts should use customer-managed key for encryption |
970f84d8-71b6-4091-9979-ace7e3fb6dbb |
Storage |
Default Audit Allowed Audit, Disabled, Deny |
0 |
|
GA |
Identify actions allowed without authentication |
92a7591f-73b3-1173-a09c-a08882d84c70 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Identify and authenticate network devices |
ae5345d5-8dab-086a-7290-db43a3272198 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Identify and authenticate non-organizational users |
e1379836-3492-6395-451d-2f5062e14136 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Identify and manage downstream information exchanges |
c7fddb0e-3f44-8635-2b35-dc6b8e740b7c |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Identify and mitigate potential issues at alternate storage site |
13939f8c-4cd5-a6db-9af4-9dfec35e3722 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Identify classes of Incidents and Actions taken |
23d1a569-2d1e-7f43-9e22-1f94115b7dd5 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Identify contaminated systems and components |
279052a0-8238-694d-9661-bf649f951747 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Identify external service providers |
46ab2c5e-6654-1f58-8c83-e97a44f39308 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Identify incident response personnel |
037c0089-6606-2dab-49ad-437005b5035f |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Identify individuals with security roles and responsibilities |
0dcbaf2f-075e-947b-8f4c-74ecc5cd302c |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Identify spilled information |
69d90ee6-9f9f-262a-2038-d909fb4e5723 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Identify status of individual users |
ca748dfe-3e28-1d18-4221-89aea30aa0a5 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Implement a fault tolerant name/address service |
ced727b3-005e-3c5b-5cd5-230b79d56ee8 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Implement a penetration testing methodology |
c2eabc28-1e5c-78a2-a712-7cc176c44c07 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Implement an automated configuration management tool |
33832848-42ab-63f3-1a55-c0ad309d44cd |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Implement controls to secure all media |
e435f7e3-0dd9-58c9-451f-9b44b96c0232 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Implement controls to secure alternate work sites |
cd36eeec-67e7-205a-4b64-dbfe3b4e3e4e |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Implement cryptographic mechanisms |
10c3a1b1-29b0-a2d5-8f4c-a284b0f07830 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Implement formal sanctions process |
5decc032-95bd-2163-9549-a41aba83228e |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Implement incident handling |
433de59e-7a53-a766-02c2-f80f8421469a |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Implement Incident handling capability |
98e33927-8d7f-6d5f-44f5-2469b40b7215 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Implement managed interface for each external service |
b262e1dd-08e9-41d4-963a-258909ad794b |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Implement parameters for memorized secret verifiers |
3b30aa25-0f19-6c04-5ca4-bd3f880a763d |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Implement personnel screening |
e0c480bf-0d68-a42d-4cbb-b60f851f8716 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Implement physical security for offices, working areas, and secure areas |
05ec66a2-137c-14b8-8e75-3d7a2bef07f8 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Implement privileged access for executing vulnerability scanning activities |
5b802722-71dd-a13d-2e7e-231e09589efb |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Implement security directives |
26d178a4-9261-6f04-a100-47ed85314c6e |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Implement security engineering principles of information systems |
df2e9507-169b-4114-3a52-877561ee3198 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Implement system boundary protection |
01ae60e2-38bb-0a32-7b20-d3a091423409 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Implement training for protecting authenticators |
e4b00788-7e1c-33ec-0418-d048508e095b |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Implement transaction based recovery |
ba02d0a0-566a-25dc-73f1-101c726a19c5 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Include dynamic reconfig of customer deployed resources |
1e0d5ba8-a433-01aa-829c-86b06c9631ec |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Incorporate flaw remediation into configuration management |
34aac8b2-488a-2b96-7280-5b9b481a317a |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Incorporate simulated contingency training |
9c954fcf-6dd8-81f1-41b5-832ae5c62caf |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Incorporate simulated events into incident response training |
1fdeb7c4-4c93-8271-a135-17ebe85f1cc7 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Information flow control using security policy filters |
13ef3484-3a51-785a-9c96-500f21f84edd |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Infrastructure encryption should be enabled for Azure Database for MySQL servers |
3a58212a-c829-4f13-9872-6371df2fd0b4 |
SQL |
Default Audit Allowed Audit, Deny, Disabled |
0 |
|
GA |
Infrastructure encryption should be enabled for Azure Database for PostgreSQL servers |
24fba194-95d6-48c0-aea7-f65bf859c598 |
SQL |
Default Audit Allowed Audit, Deny, Disabled |
0 |
|
GA |
Initiate contingency plan testing corrective actions |
8bfdbaa6-6824-3fec-9b06-7961bf7389a6 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Initiate transfer or reassignment actions |
b8a9bb2f-7290-3259-85ce-dca7d521302d |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Install an alarm system |
aa0ddd99-43eb-302d-3f8f-42b499182960 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Integrate Audit record analysis |
85335602-93f5-7730-830b-d43426fd51fa |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Integrate audit review, analysis, and reporting |
f741c4e6-41eb-15a4-25a2-61ac7ca232f0 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Integrate cloud app security with a siem |
9fdde4a9-85fa-7850-6df4-ae9c4a2e56f9 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Integrate risk management process into SDLC |
00f12b6f-10d7-8117-9577-0f2b76488385 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Internet-facing virtual machines should be protected with network security groups |
f6de0be7-9a8a-4b8a-b349-43cf02d22f7c |
Security Center |
Default AuditIfNotExists Allowed AuditIfNotExists, Disabled |
0 |
|
GA |
Invalidate session identifiers at logout |
396f465d-375e-57de-58ba-021adb008191 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
IoT Hub device provisioning service instances should use private link |
df39c015-56a4-45de-b4a3-efe77bed320d |
Internet of Things |
Default Audit Allowed Audit, Disabled |
0 |
|
GA |
IP Forwarding on your virtual machine should be disabled |
bd352bd5-2853-4985-bf0d-73806b4a5744 |
Security Center |
Default AuditIfNotExists Allowed AuditIfNotExists, Disabled |
0 |
|
GA |
Isolate information spills |
22457e81-3ec6-5271-a786-c3ca284601dd |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Isolate SecurID systems, Security Incident Management systems |
dd6d00a8-701a-5935-a22b-c7b9c0c698b2 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Issue public key certificates |
97d91b33-7050-237b-3e23-a77d57d84e13 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Key Vault keys should have an expiration date |
152b15f7-8e1f-4c1f-ab71-8c010ba5dbc0 |
Key Vault |
Default Audit Allowed Audit, Deny, Disabled |
0 |
|
GA |
Key Vault secrets should have an expiration date |
98728c90-32c7-4049-8429-847dc0f4fe37 |
Key Vault |
Default Audit Allowed Audit, Deny, Disabled |
0 |
|
GA |
Key vaults should have deletion protection enabled |
0b60c0b2-2dc2-4e1c-b5c9-abbed971de53 |
Key Vault |
Default Audit Allowed Audit, Deny, Disabled |
0 |
|
GA |
Key vaults should have soft delete enabled |
1e66c121-a66a-4b1f-9b83-0fd99bf0fc2d |
Key Vault |
Default Audit Allowed Audit, Deny, Disabled |
0 |
|
GA |
Kubernetes cluster containers CPU and memory resource limits should not exceed the specified limits |
e345eecc-fa47-480f-9e88-67dcc122b164 |
Kubernetes |
Default Deny Allowed audit, Audit, deny, Deny, disabled, Disabled |
0 |
|
GA |
Kubernetes cluster containers should not share host process ID or host IPC namespace |
47a1ee2f-2a2a-4576-bf2a-e0e36709c2b8 |
Kubernetes |
Default Audit Allowed audit, Audit, deny, Deny, disabled, Disabled |
0 |
|
GA |
Kubernetes cluster containers should only use allowed AppArmor profiles |
511f5417-5d12-434d-ab2e-816901e72a5e |
Kubernetes |
Default Audit Allowed audit, Audit, deny, Deny, disabled, Disabled |
0 |
|
GA |
Kubernetes cluster containers should only use allowed capabilities |
c26596ff-4d70-4e6a-9a30-c2506bd2f80c |
Kubernetes |
Default Audit Allowed audit, Audit, deny, Deny, disabled, Disabled |
0 |
|
GA |
Kubernetes cluster containers should only use allowed images |
febd0533-8e55-448f-b837-bd0e06f16469 |
Kubernetes |
Default Deny Allowed audit, Audit, deny, Deny, disabled, Disabled |
0 |
|
GA |
Kubernetes cluster containers should run with a read only root file system |
df49d893-a74c-421d-bc95-c663042e5b80 |
Kubernetes |
Default Audit Allowed audit, Audit, deny, Deny, disabled, Disabled |
0 |
|
GA |
Kubernetes cluster pod hostPath volumes should only use allowed host paths |
098fc59e-46c7-4d99-9b16-64990e543d75 |
Kubernetes |
Default Audit Allowed audit, Audit, deny, Deny, disabled, Disabled |
0 |
|
GA |
Kubernetes cluster pods and containers should only run with approved user and group IDs |
f06ddb64-5fa3-4b77-b166-acb36f7f6042 |
Kubernetes |
Default Audit Allowed audit, Audit, deny, Deny, disabled, Disabled |
0 |
|
GA |
Kubernetes cluster pods should only use approved host network and port range |
82985f06-dc18-4a48-bc1c-b9f4f0098cfe |
Kubernetes |
Default Audit Allowed audit, Audit, deny, Deny, disabled, Disabled |
0 |
|
GA |
Kubernetes cluster services should listen only on allowed ports |
233a2a17-77ca-4fb1-9b6b-69223d272a44 |
Kubernetes |
Default Deny Allowed audit, Audit, deny, Deny, disabled, Disabled |
0 |
|
GA |
Kubernetes cluster should not allow privileged containers |
95edb821-ddaf-4404-9732-666045e056b4 |
Kubernetes |
Default Deny Allowed audit, Audit, deny, Deny, disabled, Disabled |
0 |
|
GA |
Kubernetes clusters should be accessible only over HTTPS |
1a5b4dca-0b6f-4cf5-907c-56316bc1bf3d |
Kubernetes |
Default Deny Allowed audit, Audit, deny, Deny, disabled, Disabled |
0 |
|
GA |
Kubernetes clusters should not allow container privilege escalation |
1c6e92c9-99f0-4e55-9cf2-0c234dc48f99 |
Kubernetes |
Default Audit Allowed audit, Audit, deny, Deny, disabled, Disabled |
0 |
|
GA |
Kubernetes Services should be upgraded to a non-vulnerable Kubernetes version |
fb893a29-21bb-418c-a157-e99480ec364c |
Security Center |
Default Audit Allowed Audit, Disabled |
0 |
|
GA |
Limit privileges to make changes in production environment |
2af551d5-1775-326a-0589-590bfb7e9eb2 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Linux machines should meet requirements for the Azure compute security baseline |
fc9b3da7-8347-4380-8e70-0a0361d8dedd |
Guest Configuration |
Default AuditIfNotExists Allowed AuditIfNotExists, Disabled |
0 |
|
GA |
Logic Apps Integration Service Environment should be encrypted with customer-managed keys |
1fafeaf6-7927-4059-a50a-8eb2a7a6f2b5 |
Logic Apps |
Default Audit Allowed Audit, Deny, Disabled |
0 |
|
GA |
Long-term geo-redundant backup should be enabled for Azure SQL Databases |
d38fc420-0735-4ef3-ac11-c806f651a570 |
SQL |
Default AuditIfNotExists Allowed AuditIfNotExists, Disabled |
0 |
|
GA |
Maintain availability of information |
3ad7f0bc-3d03-0585-4d24-529779bb02c2 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Maintain data breach records |
0fd1ca29-677b-2f12-1879-639716459160 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Maintain incident response plan |
37546841-8ea1-5be0-214d-8ac599588332 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Maintain integrity of audit system |
c0559109-6a27-a217-6821-5a6d44f92897 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Maintain list of authorized remote maintenance personnel |
4ce91e4e-6dab-3c46-011a-aa14ae1561bf |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Maintain records of processing of personal data |
92ede480-154e-0e22-4dca-8b46a74a3a51 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Maintain separate execution domains for running processes |
bfc540fe-376c-2eef-4355-121312fa4437 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Manage a secure surveillance camera system |
f2222056-062d-1060-6dc2-0107a68c34b2 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Manage authenticator lifetime and reuse |
29363ae1-68cd-01ca-799d-92c9197c8404 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Manage Authenticators |
4aacaec9-0628-272c-3e83-0d68446694e0 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Manage availability and capacity |
edcc36f1-511b-81e0-7125-abee29752fe7 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Manage gateways |
63f63e71-6c3f-9add-4c43-64de23e554a7 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Manage maintenance personnel |
b273f1e3-79e7-13ee-5b5d-dca6c66c3d5d |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Manage nonlocal maintenance and diagnostic activities |
1fb1cb0e-1936-6f32-42fd-89970b535855 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Manage symmetric cryptographic keys |
9c276cf3-596f-581a-7fbd-f5e46edaa0f4 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Manage system and admin accounts |
34d38ea7-6754-1838-7031-d7fd07099821 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Manage the input, output, processing, and storage of data |
e603da3a-8af7-4f8a-94cb-1bcc0e0333d2 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Manage the transportation of assets |
4ac81669-00e2-9790-8648-71bc11bc91eb |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Manage transfers between standby and active system components |
df54d34f-65f3-39f1-103c-a0464b8615df |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Managed disks should be double encrypted with both platform-managed and customer-managed keys |
ca91455f-eace-4f96-be59-e6e2c35b4816 |
Compute |
Default Audit Allowed Audit, Deny, Disabled |
0 |
|
GA |
Management ports of virtual machines should be protected with just-in-time network access control |
b0f33259-77d7-4c9e-aac6-3aabcfae693c |
Security Center |
Default AuditIfNotExists Allowed AuditIfNotExists, Disabled |
0 |
|
GA |
Management ports should be closed on your virtual machines |
22730e10-96f6-4aac-ad84-9383d35b5917 |
Security Center |
Default AuditIfNotExists Allowed AuditIfNotExists, Disabled |
0 |
|
GA |
Map authenticated identities to individuals |
4012c2b7-4e0e-a7ab-1688-4aab43f14420 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Measure the time between flaw identification and flaw remediation |
dad1887d-161b-7b61-2e4d-5124a7b5724e |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Microsoft Defender for Containers should be enabled |
1c988dd6-ade4-430f-a608-2a3e5b0a6d38 |
Security Center |
Default AuditIfNotExists Allowed AuditIfNotExists, Disabled |
0 |
|
GA |
Microsoft Defender for Storage should be enabled |
640d2586-54d2-465f-877f-9ffc1d2109f4 |
Security Center |
Default AuditIfNotExists Allowed AuditIfNotExists, Disabled |
0 |
|
GA |
Modify access authorizations upon personnel transfer |
979ed3b6-83f9-26bc-4b86-5b05464700bf |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Monitor access across the organization |
48c816c5-2190-61fc-8806-25d6f3df162f |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Monitor account activity |
7b28ba4f-0a87-46ac-62e1-46b7c09202a8 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Monitor privileged role assignment |
ed87d27a-9abf-7c71-714c-61d881889da4 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Monitor security and privacy training completion |
82bd024a-5c99-05d6-96ff-01f539676a1a |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Monitor third-party provider compliance |
f8ded0c6-a668-9371-6bb6-661d58787198 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
MySQL servers should use customer-managed keys to encrypt data at rest |
83cef61d-dbd1-4b20-a4fc-5fbc7da10833 |
SQL |
Default AuditIfNotExists Allowed AuditIfNotExists, Disabled |
0 |
|
GA |
Network Watcher should be enabled |
b6e2945c-0b7b-40f5-9233-7a5323b5cdc6 |
Network |
Default AuditIfNotExists Allowed AuditIfNotExists, Disabled |
0 |
|
GA |
Non-internet-facing virtual machines should be protected with network security groups |
bb91dfba-c30d-4263-9add-9c2384e659a6 |
Security Center |
Default AuditIfNotExists Allowed AuditIfNotExists, Disabled |
0 |
|
GA |
Not allow for information systems to accompany with individuals |
41172402-8d73-64c7-0921-909083c086b0 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Notify Account Managers of customer controlled accounts |
4b8fd5da-609b-33bf-9724-1c946285a14c |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Notify personnel of any failed security verification tests |
18e9d748-73d4-0c96-55ab-b108bfbd5bc3 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Notify personnel upon sanctions |
6228396e-2ace-7ca5-3247-45767dbf52f4 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Notify upon termination or transfer |
c79d378a-2521-822a-0407-57454f8d2c74 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Notify users of system logon or access |
fe2dff43-0a8c-95df-0432-cb1c794b17d0 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Notify when account is not needed |
8489ff90-8d29-61df-2d84-f9ab0f4c5e84 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Obscure feedback information during authentication process |
1ff03f2a-974b-3272-34f2-f6cd51420b30 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Observe and report security weaknesses |
ff136354-1c92-76dc-2dab-80fb7c6a9f1a |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Obtain Admin documentation |
3f1216b0-30ee-1ac9-3899-63eb744e85f5 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Obtain approvals for acquisitions and outsourcing |
92b94485-1c49-3350-9ada-dffe94f08e87 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Obtain continuous monitoring plan for security controls |
ca6d7878-3189-1833-4620-6c7254ed1607 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Obtain design and implementation information for the security controls |
22a02c9a-49e4-5dc9-0d14-eb35ad717154 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Obtain functional properties of security controls |
44b71aa8-099d-8b97-1557-0e853ec38e0d |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Obtain legal opinion for monitoring system activities |
d9af7f88-686a-5a8b-704b-eafdab278977 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Obtain user security function documentation |
be1c34ab-295a-07a6-785c-36f63c1d223e |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Only secure connections to your Azure Cache for Redis should be enabled |
22bee202-a82f-4305-9a2a-6d7f44d4dedb |
Cache |
Default Audit Allowed Audit, Deny, Disabled |
0 |
|
GA |
OS and data disks should be encrypted with a customer-managed key |
702dd420-7fcc-42c5-afe8-4026edd20fe0 |
Compute |
Default Audit Allowed Audit, Deny, Disabled |
0 |
|
GA |
Perform a business impact assessment and application criticality assessment |
cb8841d4-9d13-7292-1d06-ba4d68384681 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Perform a privacy impact assessment |
d18af1ac-0086-4762-6dc8-87cdded90e39 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Perform a risk assessment |
8c5d3d8d-5cba-0def-257c-5ab9ea9644dc |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Perform a trend analysis on threats |
50e81644-923d-33fc-6ebb-9733bc8d1a06 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Perform all non-local maintenance |
5bac5fb7-7735-357b-767d-02264bfe5c3b |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Perform audit for configuration change control |
1282809c-9001-176b-4a81-260a085f4872 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Perform information input validation |
8b1f29eb-1b22-4217-5337-9207cb55231e |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Perform security function verification at a defined frequency |
f30edfad-4e1d-1eef-27ee-9292d6d89842 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Perform threat modeling |
bf883b14-9c19-0f37-8825-5e39a8b66d5b |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Perform vulnerability scans |
3c5e0e1a-216f-8f49-0a15-76ed0d8b8e1f |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Plan for continuance of essential business functions |
d9edcea6-6cb8-0266-a48c-2061fbac4310 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Plan for resumption of essential business functions |
7ded6497-815d-6506-242b-e043e0273928 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
PostgreSQL servers should use customer-managed keys to encrypt data at rest |
18adea5e-f416-4d0f-8aa8-d24321e3e274 |
SQL |
Default AuditIfNotExists Allowed AuditIfNotExists, Disabled |
0 |
|
GA |
Prepare alternate processing site for use as operational site |
0f31d98d-5ce2-705b-4aa5-b4f6705110dd |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Prevent identifier reuse for the defined time period |
4781e5fd-76b8-7d34-6df3-a0a7fca47665 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Prevent split tunneling for remote devices |
66e5cb69-9f1c-8b8d-8fbd-b832466d5aa8 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Private endpoint connections on Azure SQL Database should be enabled |
7698e800-9299-47a6-b3b6-5a0fee576eed |
SQL |
Default Audit Allowed Audit, Disabled |
0 |
|
GA |
Private endpoint should be enabled for MariaDB servers |
0a1302fb-a631-4106-9753-f3d494733990 |
SQL |
Default AuditIfNotExists Allowed AuditIfNotExists, Disabled |
0 |
|
GA |
Private endpoint should be enabled for MySQL servers |
7595c971-233d-4bcf-bd18-596129188c49 |
SQL |
Default AuditIfNotExists Allowed AuditIfNotExists, Disabled |
0 |
|
GA |
Private endpoint should be enabled for PostgreSQL servers |
0564d078-92f5-4f97-8398-b9f58a51f70b |
SQL |
Default AuditIfNotExists Allowed AuditIfNotExists, Disabled |
0 |
|
GA |
Produce complete records of remote maintenance activities |
74041cfe-3f87-1d17-79ec-34ca5f895542 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Produce Security Assessment report |
70a7a065-a060-85f8-7863-eb7850ed2af9 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Produce, control and distribute asymmetric cryptographic keys |
de077e7e-0cc8-65a6-6e08-9ab46c827b05 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Produce, control and distribute symmetric cryptographic keys |
16c54e01-9e65-7524-7c33-beda48a75779 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Prohibit binary/machine-executable code |
8e920169-739d-40b5-3f99-c4d855327bb2 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Prohibit remote activation of collaborative computing devices |
678ca228-042d-6d8e-a598-c58d5670437d |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Prohibit unfair practices |
5fe84a4c-1b0c-a738-2aba-ed49c9069d3b |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Protect administrator and user documentation |
09960521-759e-5d12-086f-4192a72a5e92 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Protect against and prevent data theft from departing employees |
80a97208-264e-79da-0cc7-4fca179a0c9c |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Protect audit information |
0e696f5a-451f-5c15-5532-044136538491 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Protect data in transit using encryption |
b11697e8-9515-16f1-7a35-477d5c8a1344 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Protect incident response plan |
2401b496-7f23-79b2-9f80-89bb5abf3d4a |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Protect passwords with encryption |
b2d3e5a2-97ab-5497-565a-71172a729d93 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Protect special information |
a315c657-4a00-8eba-15ac-44692ad24423 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Protect wireless access |
d42a8f69-a193-6cbc-48b9-04a9e29961f1 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Provide audit review, analysis, and reporting capability |
44f8a42d-739f-8030-89a8-4c2d5b3f6af3 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Provide capability to disconnect or disable remote access |
4edaca8c-0912-1ac5-9eaa-6a1057740fae |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Provide capability to process customer-controlled audit records |
21633c09-804e-7fcd-78e3-635c6bfe2be7 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Provide contingency training |
de936662-13dc-204c-75ec-1af80f994088 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Provide information spillage training |
2d4d0e90-32d9-4deb-2166-a00d51ed57c0 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Provide monitoring information as needed |
7fc1f0da-0050-19bb-3d75-81ae15940df6 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Provide periodic role-based security training |
9ac8621d-9acd-55bf-9f99-ee4212cc3d85 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Provide periodic security awareness training |
516be556-1353-080d-2c2f-f46f000d5785 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Provide privacy training |
518eafdd-08e5-37a9-795b-15a8d798056d |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Provide real-time alerts for audit event failures |
0f4fa857-079d-9d3d-5c49-21f616189e03 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Provide role-based practical exercises |
d041726f-00e0-41ca-368c-b1a122066482 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Provide role-based security training |
4c385143-09fd-3a34-790c-a5fd9ec77ddc |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Provide role-based training on suspicious activities |
f6794ab8-9a7d-3b24-76ab-265d3646232b |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Provide secure name and address resolution services |
bbb2e6d6-085f-5a35-a55d-e45daad38933 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Provide security awareness training for insider threats |
9b8b05ec-3d21-215e-5d98-0f7cf0998202 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Provide security training before providing access |
2b05dca2-25ec-9335-495c-29155f785082 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Provide security training for new users |
1cb7bf71-841c-4741-438a-67c65fdd7194 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Provide the capability to extend or limit auditing on customer-deployed resources |
d200f199-69f4-95a6-90b0-37ff0cf1040c |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Provide the logout capability |
db580551-0b3c-4ea1-8a4c-4cdb5feb340f |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Provide timely maintenance support |
eb598832-4bcc-658d-4381-3ecbe17b9866 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Provide updated security awareness training |
d136ae80-54dd-321c-98b4-17acf4af2169 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Public network access on Azure SQL Database should be disabled |
1b8ca024-1d5c-4dec-8995-b1a932b41780 |
SQL |
Default Audit Allowed Audit, Deny, Disabled |
0 |
|
GA |
Public network access should be disabled for MariaDB servers |
fdccbe47-f3e3-4213-ad5d-ea459b2fa077 |
SQL |
Default Audit Allowed Audit, Deny, Disabled |
0 |
|
GA |
Public network access should be disabled for MySQL servers |
d9844e8a-1437-4aeb-a32c-0c992f056095 |
SQL |
Default Audit Allowed Audit, Deny, Disabled |
0 |
|
GA |
Public network access should be disabled for PostgreSQL servers |
b52376f7-9612-48a1-81cd-1ffe4b61032c |
SQL |
Default Audit Allowed Audit, Deny, Disabled |
0 |
|
GA |
Reassign or remove user privileges as needed |
7805a343-275c-41be-9d62-7215b96212d8 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Reauthenticate or terminate a user session |
d6653f89-7cb5-24a4-9d71-51581038231b |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Recover and reconstitute resources after any disruption |
f33c3238-11d2-508c-877c-4262ec1132e1 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Reevaluate access upon personnel transfer |
e89436d8-6a93-3b62-4444-1d2a42ad56b2 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Refresh authenticators |
3ae68d9a-5696-8c32-62d3-c6f9c52e437c |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Reissue authenticators for changed groups and accounts |
2f204e72-1896-3bf8-75c9-9128b8683a36 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Remediate information system flaws |
be38a620-000b-21cf-3cb3-ea151b704c3b |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Report atypical behavior of user accounts |
e4054c0e-1184-09e6-4c5e-701e0bc90f81 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Require approval for account creation |
de770ba6-50dd-a316-2932-e0d972eaa734 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Require compliance with intellectual property rights |
725164e5-3b21-1ec2-7e42-14f077862841 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Require developer to identify SDLC ports, protocols, and services |
f6da5cca-5795-60ff-49e1-4972567815fe |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Require developers to build security architecture |
f131c8c5-a54a-4888-1efc-158928924bc1 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Require developers to describe accurate security functionality |
3e37c891-840c-3eb4-78d2-e2e0bb5063e0 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Require developers to document approved changes and potential impact |
3a868d0c-538f-968b-0191-bddb44da5b75 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Require developers to implement only approved changes |
085467a6-9679-5c65-584a-f55acefd0d43 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Require developers to manage change integrity |
b33d61c1-7463-7025-0ec0-a47585b59147 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Require developers to produce evidence of security assessment plan execution |
f8a63511-66f1-503f-196d-d6217ee0823a |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Require developers to provide training |
676c3c35-3c36-612c-9523-36d266a65000 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Require developers to provide unified security protection approach |
7a114735-a420-057d-a651-9a73cd0416ef |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Require external service providers to comply with security requirements |
4e45863d-9ea9-32b4-a204-2680bc6007a6 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Require interconnection security agreements |
096a7055-30cb-2db4-3fda-41b20ac72667 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Require notification of third-party personnel transfer or termination |
afd5d60a-48d2-8073-1ec2-6687e22f2ddd |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Require third-party providers to comply with personnel security policies and procedures |
e8c31e15-642d-600f-78ab-bad47a5787e6 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Require use of individual authenticators |
08ad71d0-52be-6503-4908-e015460a16ae |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Require users to sign access agreement |
3af53f59-979f-24a8-540f-d7cdbc366607 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Rescreen individuals at a defined frequency |
c6aeb800-0b19-944d-92dc-59b893722329 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Resource logs in Azure Data Lake Store should be enabled |
057ef27e-665e-4328-8ea3-04b3122bd9fb |
Data Lake |
Default AuditIfNotExists Allowed AuditIfNotExists, Disabled |
0 |
|
GA |
Resource logs in Azure Stream Analytics should be enabled |
f9be5368-9bf5-4b84-9e0a-7850da98bb46 |
Stream Analytics |
Default AuditIfNotExists Allowed AuditIfNotExists, Disabled |
0 |
|
GA |
Resource logs in Batch accounts should be enabled |
428256e6-1fac-4f48-a757-df34c2b3336d |
Batch |
Default AuditIfNotExists Allowed AuditIfNotExists, Disabled |
0 |
|
GA |
Resource logs in Data Lake Analytics should be enabled |
c95c74d9-38fe-4f0d-af86-0c7d626a315c |
Data Lake |
Default AuditIfNotExists Allowed AuditIfNotExists, Disabled |
0 |
|
GA |
Resource logs in Event Hub should be enabled |
83a214f7-d01a-484b-91a9-ed54470c9a6a |
Event Hub |
Default AuditIfNotExists Allowed AuditIfNotExists, Disabled |
0 |
|
GA |
Resource logs in IoT Hub should be enabled |
383856f8-de7f-44a2-81fc-e5135b5c2aa4 |
Internet of Things |
Default AuditIfNotExists Allowed AuditIfNotExists, Disabled |
0 |
|
GA |
Resource logs in Key Vault should be enabled |
cf820ca0-f99e-4f3e-84fb-66e913812d21 |
Key Vault |
Default AuditIfNotExists Allowed AuditIfNotExists, Disabled |
0 |
|
GA |
Resource logs in Logic Apps should be enabled |
34f95f76-5386-4de7-b824-0d8478470c9d |
Logic Apps |
Default AuditIfNotExists Allowed AuditIfNotExists, Disabled |
0 |
|
GA |
Resource logs in Search services should be enabled |
b4330a05-a843-4bc8-bf9a-cacce50c67f4 |
Search |
Default AuditIfNotExists Allowed AuditIfNotExists, Disabled |
0 |
|
GA |
Resource logs in Service Bus should be enabled |
f8d36e2f-389b-4ee4-898d-21aeb69a0f45 |
Service Bus |
Default AuditIfNotExists Allowed AuditIfNotExists, Disabled |
0 |
|
GA |
Restore resources to operational state |
f801d58e-5659-9a4a-6e8d-02c9334732e5 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Restrict access to private keys |
8d140e8b-76c7-77de-1d46-ed1b2e112444 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Restrict access to privileged accounts |
873895e8-0e3a-6492-42e9-22cd030e9fcd |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Restrict location of information processing, storage and services |
0040d2e5-2779-170d-6a2c-1f5fca353335 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Restrict media use |
6122970b-8d4a-7811-0278-4c6c68f61e4f |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Restrict unauthorized software and firmware installation |
4ee5975d-2507-5530-a20a-83a725889c6f |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Restrict use of open source software |
08c11b48-8745-034d-1c1b-a144feec73b9 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Resume all mission and business functions |
91a54089-2d69-0f56-62dc-b6371a1671c0 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Retain previous versions of baseline configs |
5e4e9685-3818-5934-0071-2620c4fa2ca5 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Retain security policies and procedures |
efef28d0-3226-966a-a1e8-70e89c1b30bc |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Retain terminated user data |
7c7032fe-9ce6-9092-5890-87a1a3755db1 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Retain training records |
3153d9c0-2584-14d3-362d-578b01358aeb |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Reveal error messages |
20762f1e-85fb-31b0-a600-e833633f10fe |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Review access control policies and procedures |
03d550b4-34ee-03f4-515f-f2e2faf7a413 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Review account provisioning logs |
a830fe9e-08c9-a4fb-420c-6f6bf1702395 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Review administrator assignments weekly |
f27a298f-9443-014a-0d40-fef12adf0259 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Review and reevaluate privileges |
585af6e9-90c0-4575-67a7-2f9548972e32 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Review and sign revised rules of behavior |
6c0a312f-04c5-5c97-36a5-e56763a02b6b |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Review and update configuration management policies and procedures |
eb8a8df9-521f-3ccd-7e2c-3d1fcc812340 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Review and update contingency planning policies and procedures |
e9c60c37-65b0-2d72-6c3c-af66036203ae |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Review and update identification and authentication policies and procedures |
29acfac0-4bb4-121b-8283-8943198b1549 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Review and update incident response policies and procedures |
b28c8687-4bbd-8614-0b96-cdffa1ac6d9c |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Review and update information integrity policies and procedures |
6bededc0-2985-54d5-4158-eb8bad8070a0 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Review and update media protection policies and procedures |
b4e19d22-8c0e-7cad-3219-c84c62dc250f |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Review and update personnel security policies and procedures |
e5c5fc78-4aa5-3d6b-81bc-5fcc88b318e9 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Review and update physical and environmental policies and procedures |
91cf132e-0c9f-37a8-a523-dc6a92cd2fb2 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Review and update planning policies and procedures |
28aa060e-25c7-6121-05d8-a846f11433df |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Review and update risk assessment policies and procedures |
20012034-96f0-85c2-4a86-1ae1eb457802 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Review and update system and communications protection policies and procedures |
adf517f3-6dcd-3546-9928-34777d0c277e |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Review and update system and services acquisition policies and procedures |
f49925aa-9b11-76ae-10e2-6e973cc60f37 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Review and update system maintenance policies and procedures |
2067b904-9552-3259-0cdd-84468e284b7c |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Review and update the events defined in AU-02 |
a930f477-9dcb-2113-8aa7-45bb6fc90861 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Review and update the information security architecture |
ced291b8-1d3d-7e27-40cf-829e9dd523c8 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Review audit data |
6625638f-3ba1-7404-5983-0ea33d719d34 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Review changes for any unauthorized changes |
c246d146-82b0-301f-32e7-1065dcd248b7 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Review cloud identity report overview |
8aec4343-9153-9641-172c-defb201f56b3 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Review cloud service provider's compliance with policies and agreements |
ffea18d9-13de-6505-37f3-4c1f88070ad7 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Review content prior to posting publicly accessible information |
9e3c505e-7aeb-2096-3417-b132242731fc |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Review contingency plan |
53fc1282-0ee3-2764-1319-e20143bb0ea5 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Review controlled folder access events |
f48b60c6-4b37-332f-7288-b6ea50d300eb |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Review development process, standards and tools |
1e876c5c-0f2a-8eb6-69f7-5f91e7918ed6 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Review exploit protection events |
a30bd8e9-7064-312a-0e1f-e1b485d59f6e |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Review file and folder activity |
ef718fe4-7ceb-9ddf-3198-0ee8f6fe9cba |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Review label activity and analytics |
e23444b9-9662-40f3-289e-6d25c02b48fa |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Review malware detections report weekly |
4a6f5cbd-6c6b-006f-2bb1-091af1441bce |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Review publicly accessible content for nonpublic information |
b5244f81-6cab-3188-2412-179162294996 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Review role group changes weekly |
70fe686f-1f91-7dab-11bf-bca4201e183b |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Review security assessment and authorization policies and procedures |
a4493012-908c-5f48-a468-1e243be884ce |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Review the results of contingency plan testing |
5d3abfea-a130-1208-29c0-e57de80aa6b0 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Review threat protection status weekly |
fad161f5-5261-401a-22dd-e037bae011bd |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Review user accounts |
79f081c7-1634-01a1-708e-376197999289 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Review user groups and applications with access to sensitive data |
eb1c944e-0e94-647b-9b7e-fdb8d2af0838 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Review user privileges |
f96d2186-79df-262d-3f76-f371e3b71798 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Revoke privileged roles as appropriate |
32f22cfa-770b-057c-965b-450898425519 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Route traffic through authenticated proxy network |
d91558ce-5a5c-551b-8fbb-83f793255e09 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Route traffic through managed network access points |
bab9ef1d-a16d-421a-822d-3fa94e808156 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Run simulation attacks |
a8f9c283-9a66-3eb3-9e10-bdba95b85884 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Satisfy token quality requirements |
056a723b-4946-9d2a-5243-3aa27c4d31a1 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Saved-queries in Azure Monitor should be saved in customer storage account for logs encryption |
fa298e57-9444-42ba-bf04-86e8470e32c7 |
Monitoring |
Default Audit Allowed audit, Audit, deny, Deny, disabled, Disabled |
0 |
|
GA |
Secure commitment from leadership |
70057208-70cc-7b31-3c3a-121af6bc1966 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Secure the interface to external systems |
ff1efad2-6b09-54cc-01bf-d386c4d558a8 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Secure transfer to storage accounts should be enabled |
404c3081-a854-4457-ae30-26a93ef643f9 |
Storage |
Default Audit Allowed Audit, Deny, Disabled |
0 |
|
GA |
Select additional testing for security control assessments |
f78fc35e-1268-0bca-a798-afcba9d2330a |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Separate duties of individuals |
60ee1260-97f0-61bb-8155-5d8b75743655 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Separate user and information system management functionality |
8a703eb5-4e53-701b-67e4-05ba2f7930c8 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Separately store backup information |
fc26e2fd-3149-74b4-5988-d64bb90f8ef7 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Service Bus Premium namespaces should use a customer-managed key for encryption |
295fc8b1-dc9f-4f53-9c61-3f313ceab40a |
Service Bus |
Default Audit Allowed Audit, Disabled |
0 |
|
GA |
Service Fabric clusters should have the ClusterProtectionLevel property set to EncryptAndSign |
617c02be-7f02-4efd-8836-3180d47b6c68 |
Service Fabric |
Default Audit Allowed Audit, Deny, Disabled |
0 |
|
GA |
Service Fabric clusters should only use Azure Active Directory for client authentication |
b54ed75b-3e1a-44ac-a333-05ba39b99ff0 |
Service Fabric |
Default Audit Allowed Audit, Deny, Disabled |
0 |
|
GA |
Set automated notifications for new and trending cloud applications in your organization |
af38215f-70c4-0cd6-40c2-c52d86690a45 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Specify permitted actions associated with customer audit information |
3eecf628-a1c8-1b48-1b5c-7ca781e97970 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
SQL databases should have vulnerability findings resolved |
feedbf84-6b99-488c-acc2-71c829aa5ffc |
Security Center |
Default AuditIfNotExists Allowed AuditIfNotExists, Disabled |
0 |
|
GA |
SQL managed instances should use customer-managed keys to encrypt data at rest |
ac01ad65-10e5-46df-bdd9-6b0cad13e1d2 |
SQL |
Default Audit Allowed Audit, Deny, Disabled |
0 |
|
GA |
SQL servers on machines should have vulnerability findings resolved |
6ba6d016-e7c3-4842-b8f2-4992ebc0d72d |
Security Center |
Default AuditIfNotExists Allowed AuditIfNotExists, Disabled |
0 |
|
GA |
SQL servers should use customer-managed keys to encrypt data at rest |
0a370ff3-6cab-4e85-8995-295fd854c5b8 |
SQL |
Default Audit Allowed Audit, Deny, Disabled |
0 |
|
GA |
SQL servers with auditing to storage account destination should be configured with 90 days retention or higher |
89099bee-89e0-4b26-a5f4-165451757743 |
SQL |
Default AuditIfNotExists Allowed AuditIfNotExists, Disabled |
0 |
|
GA |
Storage account encryption scopes should use customer-managed keys to encrypt data at rest |
b5ec538c-daa0-4006-8596-35468b9148e8 |
Storage |
Default Audit Allowed Audit, Deny, Disabled |
0 |
|
GA |
Storage accounts should be migrated to new Azure Resource Manager resources |
37e0d2fe-28a5-43d6-a273-67d37d1f5606 |
Storage |
Default Audit Allowed Audit, Deny, Disabled |
0 |
|
GA |
Storage accounts should have infrastructure encryption |
4733ea7b-a883-42fe-8cac-97454c2a9e4a |
Storage |
Default Audit Allowed Audit, Deny, Disabled |
0 |
|
GA |
Storage accounts should restrict network access |
34c877ad-507e-4c82-993e-3452a6e0ad3c |
Storage |
Default Audit Allowed Audit, Deny, Disabled |
0 |
|
GA |
Storage accounts should restrict network access using virtual network rules |
2a1a9cdf-e04d-429a-8416-3bfb72a1b26f |
Storage |
Default Audit Allowed Audit, Deny, Disabled |
0 |
|
GA |
Storage accounts should use customer-managed key for encryption |
6fac406b-40ca-413b-bf8e-0bf964659c25 |
Storage |
Default Audit Allowed Audit, Disabled |
0 |
|
GA |
Storage accounts should use private link |
6edd7eda-6dd8-40f7-810d-67160c639cd9 |
Storage |
Default AuditIfNotExists Allowed AuditIfNotExists, Disabled |
0 |
|
GA |
Subnets should be associated with a Network Security Group |
e71308d3-144b-4262-b144-efdc3cc90517 |
Security Center |
Default AuditIfNotExists Allowed AuditIfNotExists, Disabled |
0 |
|
GA |
Subscriptions should have a contact email address for security issues |
4f4f78b8-e367-4b10-a341-d9a4ad5cf1c7 |
Security Center |
Default AuditIfNotExists Allowed AuditIfNotExists, Disabled |
0 |
|
GA |
Support personal verification credentials issued by legal authorities |
1d39b5d9-0392-8954-8359-575ce1957d1a |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Take action in response to customer information |
d25cbded-121e-0ed6-1857-dc698c9095b1 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Temp disks and cache for agent node pools in Azure Kubernetes Service clusters should be encrypted at host |
41425d9f-d1a5-499a-9932-f8ed8453932c |
Kubernetes |
Default Audit Allowed Audit, Deny, Disabled |
0 |
|
GA |
Terminate customer controlled account credentials |
76d66b5c-85e4-93f5-96a5-ebb2fad61dc6 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Terminate user session automatically |
4502e506-5f35-0df4-684f-b326e3cc7093 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Test contingency plan at an alternate processing location |
ba99d512-3baa-1c38-8b0b-ae16bbd34274 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Test the business continuity and disaster recovery plan |
58a51cde-008b-1a5d-61b5-d95849770677 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
There should be more than one owner assigned to your subscription |
09024ccc-0c5f-475e-9457-b7c0d9ed487b |
Security Center |
Default AuditIfNotExists Allowed AuditIfNotExists, Disabled |
0 |
|
GA |
Track software license usage |
77cc89bb-774f-48d7-8a84-fb8c322c3000 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Train personnel on disclosure of nonpublic information |
97f0d974-1486-01e2-2088-b888f46c0589 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Transfer backup information to an alternate storage site |
7bdb79ea-16b8-453e-4ca4-ad5b16012414 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Transparent Data Encryption on SQL databases should be enabled |
17k78e20-9358-41c9-923c-fb736d382a12 |
SQL |
Default AuditIfNotExists Allowed AuditIfNotExists, Disabled |
0 |
|
GA |
Turn on sensors for endpoint security solution |
5fc24b95-53f7-0ed1-2330-701b539b97fe |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Undergo independent security review |
9b55929b-0101-47c0-a16e-d6ac5c7d21f8 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Update antivirus definitions |
ea9d7c95-2f10-8a4d-61d8-7469bd2e8d65 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Update contingency plan |
14a4fd0a-9100-1e12-1362-792014a28155 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Update information security policies |
5226dee6-3420-711b-4709-8e675ebd828f |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Update interconnection security agreements |
d48a6f19-a284-6fc6-0623-3367a74d3f50 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Update organizational access agreements |
e21f91d1-2803-0282-5f2d-26ebc4b170ef |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Update POA&M items |
cc057769-01d9-95ad-a36f-1e62a7f9540b |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Update rules of behavior and access agreements |
6610f662-37e9-2f71-65be-502bdc2f554d |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Update rules of behavior and access agreements every 3 years |
7ad83b58-2042-085d-08f0-13e946f26f89 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Update the security authorization |
449ebb52-945b-36e5-3446-af6f33770f8f |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Use automated mechanisms for security alerts |
b8689b2e-4308-a58b-a0b4-6f3343a000df |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Use dedicated machines for administrative tasks |
b8972f60-8d77-1cb8-686f-9c9f4cdd8a59 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Use privileged identity management |
e714b481-8fac-64a2-14a9-6f079b2501a4 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Use system clocks for audit records |
1ee4c7eb-480a-0007-77ff-4ba370776266 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Verify identity before distributing authenticators |
72889284-15d2-90b2-4b39-a1e9541e1152 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Verify security controls for external information systems |
dc7ec756-221c-33c8-0afe-c48e10e42321 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Verify security functions |
ece8bb17-4080-5127-915f-dc7267ee8549 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Verify software, firmware and information integrity |
db28735f-518f-870e-15b4-49623cbe3aa0 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
View and configure system diagnostic data |
0123edae-3567-a05a-9b05-b53ebe9d3e7e |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
View and investigate restricted users |
98145a9b-428a-7e81-9d14-ebb154a24f93 |
Regulatory Compliance |
Default Manual Allowed Manual, Disabled |
0 |
|
GA |
Virtual machines and virtual machine scale sets should have encryption at host enabled |
fc4d8e41-e223-45ea-9bf5-eada37891d87 |
Compute |
Default Audit Allowed Audit, Deny, Disabled |
0 |
|
GA |
Virtual machines' Guest Configuration extension should be deployed with system-assigned managed identity |
d26f7642-7545-4e18-9b75-8c9bbdee3a9a |
Security Center |
Default AuditIfNotExists Allowed AuditIfNotExists, Disabled |
0 |
|
GA |
Virtual machines should be migrated to new Azure Resource Manager resources |
1d84d5fb-01f6-4d12-ba4f-4a26081d403d |
Compute |
Default Audit Allowed Audit, Deny, Disabled |
0 |
|
GA |
VM Image Builder templates should use private link |
2154edb9-244f-4741-9970-660785bccdaa |
VM Image Builder |
Default Audit Allowed Audit, Disabled, Deny |
0 |
|
GA |
Vulnerabilities in security configuration on your machines should be remediated |
e1e5fd5d-3e4c-4ce1-8661-7d1873ae6b15 |
Security Center |
Default AuditIfNotExists Allowed AuditIfNotExists, Disabled |
0 |
|
GA |
Vulnerability assessment should be enabled on SQL Managed Instance |
1b7aa243-30e4-4c9e-bca8-d0d3022b634a |
SQL |
Default AuditIfNotExists Allowed AuditIfNotExists, Disabled |
0 |
|
GA |
Vulnerability assessment should be enabled on your SQL servers |
ef2a8f2a-b3d9-49cd-a8a8-9a3aaaf647d9 |
SQL |
Default AuditIfNotExists Allowed AuditIfNotExists, Disabled |
0 |
|
GA |
Vulnerability assessment should be enabled on your Synapse workspaces |
0049a6b3-a662-4f3e-8635-39cf44ace45a |
Synapse |
Default AuditIfNotExists Allowed AuditIfNotExists, Disabled |
0 |
|
GA |
Web Application Firewall (WAF) should be enabled for Application Gateway |
564feb30-bf6a-4854-b4bb-0d2d2d1e6c66 |
Network |
Default Audit Allowed Audit, Deny, Disabled |
0 |
|
GA |
Windows Defender Exploit Guard should be enabled on your machines |
bed48b13-6647-468e-aa2f-1af1d3f4dd40 |
Guest Configuration |
Default AuditIfNotExists Allowed AuditIfNotExists, Disabled |
0 |
|
GA |
Windows machines should be configured to use secure communication protocols |
5752e6d6-1206-46d8-8ab1-ecc2f71a8112 |
Guest Configuration |
Default AuditIfNotExists Allowed AuditIfNotExists, Disabled |
0 |
|
GA |
Windows machines should meet requirements of the Azure compute security baseline |
72650e9f-97bc-4b2a-ab5f-9781a9fcecbc |
Guest Configuration |
Default AuditIfNotExists Allowed AuditIfNotExists, Disabled |
0 |
|
GA |