standard
turbot/azure_cis

Pipeline: 3.1.11 Ensure that Microsoft Cloud Security Benchmark policies are not set to 'Disabled'

Description

The Microsoft Cloud Security Benchmark (or "MCSB") is an Azure Policy Initiative containing many security policies to evaluate resource configuration against best practice recommendations. If a policy in the MCSB is set with effect type Disabled, it is not evaluated and may prevent administrators from being informed of valuable security recommendations.

A security policy defines the desired configuration of resources in your environment and helps ensure compliance with company or regulatory security requirements. The MCSB Policy Initiative a set of security recommendations based on best practices and is associated with every subscription by default. When a policy "Effect" is set to Audit, policies in the MCSB ensure that Defender for Cloud evaluates relevant resources for supported recommendations. To ensure that policies within the MCSB are not being missed when the Policy Initiative is evaluated, none of the policies should have an Effect of Disabled.

Remediation

From Azure Portal

Part A - List all disabled policies

  1. From Azure Home select the Portal Menu.
  2. Select Microsoft Defender for Cloud.
  3. Under Management, select Environment Settings.
  4. Select the appropriate Subscription.
  5. Click on Security policies in the left column.
  6. Click on Microsoft cloud security benchmark.
  7. Click Add Filter and select Effect.
  8. Check the Disabled box to search for all disabled policies.
  9. Click Apply.

Part B - Remediate Policy Effect

For each policy that remains in the list:

  1. Click the blue ellipses ... to the right of the policy name.
  2. Click Manage effect and parameters.
  3. Under Policy effect, select the Audit radio button.
  4. Click Save.
  5. Click Refresh.

Repeat "Part B - Remediate Policy Effect" until no more policies are listed.

Default Value

By default, the MCSB policy initiative is associated to all subscriptions and most policies will have an effect of Audit. Some policies will have a default effect of Disabled.

Run the pipeline

To run this pipeline from your terminal:

flowpipe pipeline run azure_cis.pipeline.cis_v300_3_1_11

Use this pipeline

To call this pipeline from your pipeline, use a step:

step "pipeline" "step_name" {
pipeline = azure_cis.pipeline.cis_v300_3_1_11
}

Params

NameTypeRequiredDescriptionDefault
database
connection.steampipe
YesDatabase connection string.connection.steampipe.default
notifier
notifier
YesThe name of the notifier to use for sending notification messages.notifier.default
notification_level
string
YesThe verbosity level of notification messages to send. Valid options are 'verbose', 'info', 'error'.info
approvers
list(notifier)
YesList of notifiers to be used for obtaining action/approval decisions.notifier.default

Outputs

This pipeline has no outputs.

Tags

folder = CIS v3.0.0/3 Security/3.1 Microsoft Defender for Cloud