standard
turbot/azure_cis
Get Involved
Version
Pipeline: 6.2.5 Ensure that Activity Log Alert exists for Create or Update Security Solution
Description
Create an activity log alert for the Create or Update Security Solution event.
Monitoring for Create or Update Security Solution events gives insight into changes to the active security solutions and may reduce the time it takes to detect suspicious activity.
Remediation
From Azure Portal
- Navigate to the
Monitor
blade. - Select
Alerts
. - Select
Create
. - Select
Alert rule
. - Choose a subscription.
- Select
Apply
. - Select the
Condition
tab. - Click
See all signals
. - Select
Create or Update Security Solutions (Security Solutions)
. - Click
Apply
. - Select the
Actions
tab. - Click
Select action groups
to select an existing action group, orCreate action group
to create a new action group. - Follow the prompts to choose or create an action group.
- Select the
Details
tab. - Select a
Resource group
, provide anAlert rule name
and an optionalAlert rule description
. - Click
Review + create
. - Click
Create
.
From Azure CLI
az monitor activity-log alert create --resource-group "<resource group name>" --condition category=Administrative and operationName=Microsoft.Security/securitySolutions/write and level=<verbose | information | warning | error | critical> --scope "/subscriptions/<subscription ID>" --name "<activity log rule name>" --subscription <subscription id> --action-group <action group ID>
From PowerShell
Create the Conditions
object.
$conditions = @()$conditions += New-AzActivityLogAlertAlertRuleAnyOfOrLeafConditionObject -Equal Administrative -Field category$conditions += New-AzActivityLogAlertAlertRuleAnyOfOrLeafConditionObject -Equal Microsoft.Security/securitySolutions/write -Field operationName$conditions += New-AzActivityLogAlertAlertRuleAnyOfOrLeafConditionObject -Equal Verbose -Field level
Retrieve the Action Group
information and store in a variable, then create the Actions
object.
$actionGroup = Get-AzActionGroup -ResourceGroupName <resource group name> -Name <action group name>$actionObject = New-AzActivityLogAlertActionGroupObject -Id $actionGroup.Id
Create the Scope
object
$scope = "/subscriptions/<subscription ID>"
Create the Activity Log Alert Rule
for Microsoft.Security/securitySolutions/write
New-AzActivityLogAlert -Name "<activity log alert rule name>" -ResourceGroupName "<resource group name>" -Condition $conditions -Scope $scope -Location global -Action $actionObject -Subscription <subscription ID> -Enabled $true
Default Value
By default, no monitoring alerts are created.
Run the pipeline
To run this pipeline from your terminal:
flowpipe pipeline run azure_cis.pipeline.cis_v300_6_2_5
Use this pipeline
To call this pipeline from your pipeline, use a step:
step "pipeline" "step_name" { pipeline = azure_cis.pipeline.cis_v300_6_2_5 }
Params
Name | Type | Required | Description | Default |
---|---|---|---|---|
database | connection.steampipe | Yes | Database connection string. | connection.steampipe.default |
notifier | notifier | Yes | The name of the notifier to use for sending notification messages. | notifier.default |
notification_level | string | Yes | The verbosity level of notification messages to send. Valid options are 'verbose', 'info', 'error'. | info |
Outputs
This pipeline has no outputs.
Tags
folder = CIS v3.0.0/6 Logging and Monitoring/6.2 Monitoring using Activity Log Alerts