Skip to content

Azure Security Policies

The Security Policies view provides a list of all security policies within the Cloudneeti application. Following is the security policies within the Cloudneeti application for different cloud account types, please refer Release Notes for latest updates.

Azure Security Policies

Category Name Service Name Policy Title
Azure - Business continuity and DR Virtual Machine (VM) Ensure that backup feature is configured for Virtual Machines
Azure - Business continuity and DR Recovery Services vault Ensure that backup policy is associated with every Backup Vault
Azure - Business continuity and DR Virtual Machine (VM) Ensure that sufficient capacity is available for Virtual Machines (SLA)
Azure - Business continuity and DR Web App Ensure that Backup feature is configured for App Service deployed on Standard and above App Service Plan
Azure - Business continuity and DR API App Ensure that Backup feature is configured for API Apps deployed on Standard and above App Service Plan
Azure - Business continuity and DR Function App Ensure that Backup feature is configured for Function Apps deployed on Standard and above App Service Plan
Azure - Business continuity and DR Mobile App Ensure that Backup feature is configured for Mobile Apps deployed on Standard and above App Service Plan
Azure - Compute (IaaS) Virtual Machine (VM) Ensure that Vulnerability Assessment solutions is installed on the Virtual Machines
Azure - Compute (IaaS) Virtual Machine (VM) Ensure that Endpoint Protection is installed on the Virtual Machines
Azure - Compute (IaaS) Virtual Machine (VM) Ensure that latest OS patches are applied to all Virtual Machines
Azure - Compute (IaaS) Virtual Machine (VM) Ensure that Disk Encryption policy is enforced on the Virtual Machines
Azure - Compute (IaaS) Virtual Machine (VM) Ensure that operating system disks are encrypted for Windows Virtual Machines
Azure - Compute (IaaS) Virtual Machine (VM) Ensure that data disks are encrypted for Windows Virtual Machines
Azure - Compute (IaaS) Virtual Machine (VM) Ensure that VM agent is installed on Virtual Machines
Azure - Compute (IaaS) Virtual Machine (VM) Ensure that Antivirus is enabled for Virtual Machines
Azure - Compute (IaaS) Virtual Machine (VM) Ensure that auto update for Antivirus software is enabled on the Virtual Machines
Azure - Compute (IaaS) Virtual Machine (VM) Ensure that real time protection is set to ON inside the Windows Virtual Machine
Azure - Compute (IaaS) Virtual Machine (VM) Ensure that diagnostics is enabled on Virtual Machine
Azure - Compute (IaaS) Service Fabric cluster Ensure that Service Fabric cluster consists more than one VM
Azure - Compute (IaaS) Service Fabric cluster Ensure that Certificate security is enabled on the Service Fabric cluster
Azure - Compute (IaaS) Service Fabric cluster Ensure that update mode is set to automatic for Service Fabric cluster
Azure - Compute (IaaS) Service Fabric cluster Ensure that log analytics storage is enabled for Service Fabric cluster
Azure - Compute (IaaS) Service Fabric cluster Ensure that Azure AD security is use to Service Fabric cluster
Azure - Compute (IaaS) Virtual Machine (VM) Ensure that Log Analytics VM extension is enabled for Windows Virtual Machines
Azure - Compute (IaaS) Virtual Machine (VM) Ensure that Windows Virtual Machines are always AD Domain joined
Azure - Compute (IaaS) Azure Disk Ensure that 'Unattached disks' are encrypted
Azure - Compute (IaaS) Virtual Machine (VM) Ensure than ASC showing healthy state for Virtual Machine
Azure - Compute (IaaS) Virtual Machine (VM) Ensure that Log Analytics VM extension is enabled for Linux Virtual Machines
Azure - Compute (IaaS) Virtual Machine (VM) Ensure that operating system disks are encrypted for Linux Virtual Machines
Azure - Compute (IaaS) Virtual Machine (VM) Ensure that data disks are encrypted for Linux Virtual Machines
Azure - Compute (IaaS) Virtual Machine (VM) Ensure that Virtual Machines are using managed disks
Azure - Compute (IaaS) Virtual Machine (VM) Ensure that only approved extensions are installed
Azure - Compute (PaaS and Serverless) Mobile App Ensure HTTP/2 is enabled for an App Service Mobile Apps
Azure - Compute (PaaS and Serverless) Web App Ensure that 'Always On' is enabled for App Services deployed on Basic and above App Service Plan
Azure - Compute (PaaS and Serverless) API App Ensure that 'Always On' is enabled for Api Apps deployed on Basic and above App Service Plan
Azure - Compute (PaaS and Serverless) Mobile App Ensure that 'Always On' is enabled for Mobile Apps deployed on Basic and above App Service Plan
Azure - Compute (PaaS and Serverless) Function App Ensure that 'Always On' is enabled for Function Apps deployed on Basic and above App Service Plan
Azure - Compute (PaaS and Serverless) Web App Ensure that 'Auto Heal' is enabled for App Services
Azure - Compute (PaaS and Serverless) Mobile App Ensure that 'Auto Heal' is enabled for Mobile Apps
Azure - Compute (PaaS and Serverless) API App Ensure that 'Auto Heal' is enabled for Api Apps
Azure - Compute (PaaS and Serverless) Function App Ensure that 'Auto Heal' is enabled for Function Apps
Azure - Compute (PaaS and Serverless) Web App Ensure that Register with Azure Active Directory is enabled on App Service
Azure - Compute (PaaS and Serverless) Mobile App Ensure that Managed Service Identity (MSI) is enabled for Mobile Apps
Azure - Compute (PaaS and Serverless) Function App Ensure that Managed Service Identity (MSI) is enabled for Function Apps
Azure - Compute (PaaS and Serverless) API App Ensure that Managed Service Identity (MSI) is enabled for Api Apps
Azure - Compute (PaaS and Serverless) Web App Ensure Web Sockets are disabled for App Services
Azure - Compute (PaaS and Serverless) Mobile App Ensure Web Sockets are disabled for Mobile Apps
Azure - Compute (PaaS and Serverless) API App Ensure Web Sockets are disabled for API Apps
Azure - Compute (PaaS and Serverless) Function App Ensure Web Sockets are disabled for Function Apps
Azure - Compute (PaaS and Serverless) Web App Ensure that WEBSITE_LOAD_CERTIFICATES parameter is not set to '*' for Web Apps
Azure - Compute (PaaS and Serverless) Mobile App Ensure that WEBSITE_LOAD_CERTIFICATES parameter is not set to '*' for Mobile Apps
Azure - Compute (PaaS and Serverless) API App Ensure that WEBSITE_LOAD_CERTIFICATES parameter is not set to '*' for API Apps
Azure - Compute (PaaS and Serverless) Function App Ensure that remote debugging is turned off for Function App
Azure - Compute (PaaS and Serverless) Function App Ensure that IP restrictions rules are configured for Function Apps
Azure - Compute (PaaS and Serverless) Web App Ensure that IP restrictions rules are configured for App Service
Azure - Compute (PaaS and Serverless) Web App Ensure that Custom Domains are configured in App Service
Azure - Compute (PaaS and Serverless) Function App Ensure that Custom Domains are configured in Function App
Azure - Compute (PaaS and Serverless) Mobile App Ensure that CORS should not allow every resource to access Mobile Apps
Azure - Compute (PaaS and Serverless) Mobile App Ensure that Custom Domains are configured in Mobile App
Azure - Compute (PaaS and Serverless) API App Ensure that Custom Domains are configured in API App
Azure - Compute (PaaS and Serverless) Mobile App Ensure that IP restrictions rules are configured for Mobile Apps
Azure - Compute (PaaS and Serverless) API App Ensure that IP restrictions rules are configured for API Apps
Azure - Compute (PaaS and Serverless) Function App Ensure that WEBSITE_LOAD_CERTIFICATES parameter is not set to '*' for Function Apps
Azure - Compute (PaaS and Serverless) Function App Ensure that CORS should not allow every resource to access Function Apps
Azure - Compute (PaaS and Serverless) Web App Ensure that CORS should not allow every resource to access Web Apps
Azure - Compute (PaaS and Serverless) API App Ensure that CORS should not allow every resource to access API Apps
Azure - Compute (PaaS and Serverless) Web App Ensure web app redirects all HTTP traffic to HTTPS in Azure App Service
Azure - Compute (PaaS and Serverless) Function App Ensure that HTTPS Only is enabled for Function Apps
Azure - Compute (PaaS and Serverless) API App Ensure that HTTPS Only is enabled for API App Services
Azure - Compute (PaaS and Serverless) Mobile App Ensure that HTTPS Only is enabled for Mobile App Services
Azure - Compute (PaaS and Serverless) Web App Ensure that remote debugging is turned off for App Service
Azure - Compute (PaaS and Serverless) Function App Ensure that 'App Service Authentication' is enabled for Function Apps
Azure - Compute (PaaS and Serverless) API App Ensure that 'App Service Authentication' is enabled for API Apps
Azure - Compute (PaaS and Serverless) Mobile App Ensure that 'App Service Authentication' is enabled for Mobile Apps
Azure - Compute (PaaS and Serverless) Web App Ensure that 'App Service Authentication' is enabled for Web apps
Azure - Compute (PaaS and Serverless) Mobile App Ensure that remote debugging is turned off for Mobile App
Azure - Compute (PaaS and Serverless) API App Ensure that remote debugging is turned off for API App
Azure - Compute (PaaS and Serverless) API App Ensure that 'Availability Web Tests' are configured for API Apps
Azure - Compute (PaaS and Serverless) Mobile App Ensure that 'Availability Web Tests' are configured for Mobile Apps
Azure - Compute (PaaS and Serverless) Function App Ensure that 'Availability Web Tests' are configured for Function Apps
Azure - Compute (PaaS and Serverless) Mobile App Ensure that 'App Insights' are configured for Azure Mobile Apps
Azure - Compute (PaaS and Serverless) Function App Ensure that 'App Insights' are configured for Azure Function Apps
Azure - Compute (PaaS and Serverless) API App Ensure that 'App Insights' are configured for Azure API Apps
Azure - Compute (PaaS and Serverless) Web App Ensure web app has 'Client Certificates (Incoming client certificates)' set to 'On'
Azure - Compute (PaaS and Serverless) Web App Ensure that 'HTTP Version' is the latest, if used to run the web app
Azure - Compute (PaaS and Serverless) Function App Ensure HTTP/2 is enabled for an App Service Function Apps
Azure - Compute (PaaS and Serverless) API App Ensure HTTP/2 is enabled for an App Service API Apps
Azure - Data Analytics HDInsight Ensure that HDInsight Cluster is AD Domain joined
Azure - Data Analytics Network Security Groups (NSG) Ensure that NSG always allows traffic from the specific IP addresses for HDInsight Cluster
Azure - Data Analytics Network Security Groups (NSG) Ensure that NSG always allows traffic from the specific region for HDInsight Cluster
Azure - Data Analytics HDInsight Ensure that Enterprise Security Package is enabled for HDInsight cluster
Azure - Data Analytics Azure Data Factory (ADF) Ensure that Service Identity is enabled for Azure Data Factory
Azure - Data Analytics Azure Data Factory (ADF) Ensure that Azure Data Factory connection credentials are stored in Azure Key Vault
Azure - Data in Transit Application Gateway Ensure that TLS 1.0 and 1.1 protocols are disabled for Application Gateway
Azure - Data in Transit Application Gateway Ensure only SSL traffic is enabled for Application Gateway
Azure - Data in Transit Application Gateway Ensure that minimum protocol version of TLS1.2 or higher is enabled for Application Gateway
Azure - Data in Transit Web App Ensure web app is using the latest version of TLS encryption
Azure - Data in Transit Function App Ensure that TLS is configured for Function Apps
Azure - Data in Transit API App Ensure that TLS is configured for API Apps
Azure - Data in Transit Mobile App Ensure that TLS is configured for Mobile Apps
Azure - Data in Transit Application Gateway Ensure that latest version of OWASP ruleset is used for Application Gateway
Azure - Data in Transit Application Gateway Ensure that WAF is enabled for Application Gateway
Azure - Data in Transit Application Gateway Ensure that your deployment architecture is protected by Azure SLA for Application Gateway
Azure - Data in Transit Application Gateway Ensure that WAF is set to 'Prevention mode' for Application Gateway
Azure - Fundamentals Azure Resource Ensure that Department tag has been applied for individual Azure resources
Azure - Fundamentals Azure Resource Ensure that Environment tag has been applied for individual Azure resources
Azure - Fundamentals Azure Resource Ensure that ProjectName tag has been applied for individual Azure resources
Azure - Fundamentals Azure Resource Ensure that ApplicationOwner tag has been applied for individual Azure resources
Azure - Fundamentals Azure Resource Ensure that BusinessUnit tag has been applied for individual Azure resources
Azure - Fundamentals Azure Resource Ensure that CostCenter tag has been applied for individual Azure resources
Azure - Fundamentals Azure Resource Ensure that DataProfile tag has been applied for individual Azure resources
Azure - Fundamentals Azure Resource Ensure that Resource Locks are set for mission critical Azure resources
Azure - Identity and Access Identify and access management (IAM) Ensure that no custom subscription owner roles are created
Azure - Identity and Access Identify and access management (IAM) Enforce the policy to set Password to 'always' expire in Azure Active Directory for all Organization Users
Azure - Identity and Access Identify and access management (IAM) Ensure that Azure resources are accessible only through Organization Account
Azure - Identity and Access Identify and access management (IAM) Ensure that Service Principal Certificates are renewed before it expires
Azure - Identity and Access Identify and access management (IAM) Ensure that there are no guest users
Azure - Identity and Access Identify and access management (IAM) Ensure that 'Users can consent to apps accessing company data on their behalf' is set to 'No'
Azure - Identity and Access Identify and access management (IAM) Ensure that 'Users can add gallery apps to their Access Panel' is set to 'No'
Azure - Identity and Access Identify and access management (IAM) Ensure that 'Restrict access to Azure AD administration portal' is set to 'Yes'
Azure - Identity and Access Identify and access management (IAM) Ensure that 'Users can register applications' is set to 'No'
Azure - Identity and Access Identify and access management (IAM) Ensure that 'Guest user permissions are limited' is set to 'Yes'
Azure - Identity and Access Identify and access management (IAM) Ensure that 'Members can invite' is set to 'No'
Azure - Identity and Access Identify and access management (IAM) Ensure that 'Guests can invite' is set to 'No'
Azure - Identity and Access Identify and access management (IAM) Ensure that 'Self-service group management enabled' is set to 'No'
Azure - Identity and Access Identify and access management (IAM) Ensure that 'Users can create security groups' is set to 'No'
Azure - Identity and Access Identify and access management (IAM) Ensure that 'Users who can manage security groups' is set to 'None'
Azure - Identity and Access Identify and access management (IAM) Ensure that 'Users can create Office 365 groups' is set to 'No'
Azure - Identity and Access Identify and access management (IAM) Ensure that 'Users who can manage Office 365 groups' is set to 'None'
Azure - Identity and Access Identify and access management (IAM) Ensure that 'Enable All Users group' is set to 'Yes'
Azure - Identity and Access Identify and access management (IAM) Ensure that 'Require Multi-Factor Auth to join devices' is set to 'Yes'
Azure - Identity and Access Identify and access management (IAM) Ensure that 'Number of methods required to reset' is set to '2'
Azure - Identity and Access Identify and access management (IAM) Ensure that 'Number of days before users are asked to re-confirm their authentication information' is not set to '0'
Azure - Identity and Access Identify and access management (IAM) Ensure that 'Notify users on password resets?' is set to 'Yes'
Azure - Identity and Access Identify and access management (IAM) Ensure that 'Notify all admins when other admins reset their password?' is set to 'Yes'
Azure - Identity and Access Identify and access management (IAM) Ensure that multi-factor authentication is enabled for all privileged users
Azure - Key Management Identify and access management (IAM) Ensure that AD Application keys are rotated before they expires
Azure - Key Management Key Vault Ensure that the expiry date is set on all Secrets in a Key Vault
Azure - Key Management Key Vault Ensure that Diagnostics logs are set with a retention period of at least 365 days for Azure Key Vaults
Azure - Key Management Key Vault Ensure that Soft Delete is enabled for Key Vault
Azure - Key Management Key Vault Ensure mission critical Azure KeyVaults are not open to the Internet
Azure - Key Management Key Vault Ensure that the expiration date is set on all keys
Azure - Kubernetes & Containers Azure Kubernetes Service (AKS) Ensure Azure Active Directory RBAC is enabled for Azure Kubernetes Services (AKS)
Azure - Kubernetes & Containers Azure Kubernetes Service (AKS) Ensure that AAD is enabled in Kubernetes Service
Azure - Kubernetes & Containers Azure Kubernetes Service (AKS) Ensure that Monitoring is enabled for Azure Kubernetes Service
Azure - Kubernetes & Containers Azure Kubernetes Service (AKS) Ensure Azure Kubernetes Service clusters are always running with latest Kubernetes versions
Azure - Kubernetes & Containers Azure Kubernetes Service (AKS) Ensure that latest system updates are applied to all Azure Kubernetes Cluster nodes
Azure - Kubernetes & Containers Azure Kubernetes Service (AKS) Ensure that Diagnostics logs must be enabled with a retention period of at least 365 days for Azure Kubernetes Service
Azure - Kubernetes & Containers Azure Container Registry (ACR) Ensure that credentials of service principal used for Container Registry are stored in Key Vault
Azure - Kubernetes & Containers Azure Container Registry (ACR) Ensure that Container Registry has latest/patched image(s) all the time
Azure - Kubernetes & Containers Azure Container Registry (ACR) Ensure that Activity logs for Data Container Registry are reviewed periodically
Azure - Kubernetes & Containers Azure Container Registry (ACR) Ensure that only signed images are pushed to Container Registry
Azure - Kubernetes & Containers Azure Container Registry (ACR) Ensure that a service principal is used to access container images in Container Registry
Azure - Kubernetes & Containers Azure Container Registry (ACR) Ensure that all users/identities are granted minimum required permissions on Container Registry using Role Based Access Control (RBAC)
Azure - Kubernetes & Containers Azure Kubernetes Service (AKS) Ensure that management ports are not kept open on Kubernetes nodes unless required
Azure - Kubernetes & Containers Azure Kubernetes Service (AKS) Ensure that cluster admin level access is not directly or indirectly granted to developers
Azure - Kubernetes & Containers Azure Kubernetes Service (AKS) Ensure that container images (including nested images) deployed in Kubernetes are from a trustworthy source
Azure - Kubernetes & Containers Azure Kubernetes Service (AKS) Ensure that default cluster namespace is not used to deploy applications
Azure - Kubernetes & Containers Azure Kubernetes Service (AKS) Ensure that all Kubernetes Service secrets are stored in Key Vault
Azure - Kubernetes & Containers Azure Kubernetes Service (AKS) Ensure that all the Kubernetes cluster nodes have all the required OS patches installed
Azure - Kubernetes & Containers Azure Kubernetes Service (AKS) Ensure that Pod Identity is used for accessing other AAD(Azure Active Directory)-protected resources from the Kubernetes Service
Azure - Kubernetes & Containers Azure Kubernetes Service (AKS) Ensure that issues/recommendations provided by kube advisor are reviewed periodically
Azure - Kubernetes & Containers Azure Kubernetes Service (AKS) Ensure that data transit inside/across Kubernetes are using encrypted channel
Azure - Kubernetes & Containers Azure Kubernetes Service (AKS) Ensure that all users/identities are granted minimum required permissions on Kubernetes Cluster using Role Based Access Control (RBAC)
Azure - Logging and Auditing Web App Ensure that 'Availability Web Tests' are configured for Azure Web Apps
Azure - Logging and Auditing Azure Monitor Ensure that a Log Profile exists for Azure Monitor
Azure - Logging and Auditing Azure Monitor Ensure that retention period is set to 365 days or greater for Activity Logs
Azure - Logging and Auditing Azure Monitor Ensure that Activity Log Alert exists for Create Policy Assignment
Azure - Logging and Auditing Azure Monitor Ensure Activity Log Alert exists for Create or Update Network Security Group
Azure - Logging and Auditing Azure Monitor Ensure Activity Log Alert exists for Delete Network Security Group
Azure - Logging and Auditing Azure Monitor Ensure Activity Log Alert exists for Create or Update Network Security Group Rule
Azure - Logging and Auditing Azure Monitor Ensure Activity Log Alert exists for Delete Network Security Group Rule
Azure - Logging and Auditing Azure Monitor Ensure Activity Log Alert exists for Create or Update Security Solution
Azure - Logging and Auditing Azure Monitor Ensure Activity Log Alert exists for Delete Security Solution
Azure - Logging and Auditing Azure Monitor Ensure Activity Log Alert(s) have configured for Create or Update SQL Server Firewall Rule
Azure - Logging and Auditing Azure Monitor Ensure Activity Log Alert exists for Delete SQL Server Firewall Rule
Azure - Logging and Auditing Azure Monitor Ensure Activity Log Alert exists for Update Security Policy
Azure - Logging and Auditing Key Vault Ensure that Logging is enabled for Azure Key Vault
Azure - Logging and Auditing Web App Ensure that Auditing and Monitoring is enabled for App Service
Azure - Logging and Auditing Mobile App Ensure that Auditing and Monitoring is enabled for Mobile App
Azure - Logging and Auditing API App Ensure that Auditing and Monitoring is enabled for API App
Azure - Logging and Auditing Function App Ensure that Auditing and Monitoring is enabled for Function App
Azure - Logging and Auditing Log Analytics Ensure that data retention period is set to 365 days or longer for Log Analytics
Azure - Logging and Auditing Azure Monitor Ensure Audit Profile captures all the Activities
Azure - Logging and Auditing Azure Monitor Ensure Log Profile captures activity logs for all Regions including global
Azure - Logging and Auditing Storage Account Ensure Storage Container storing activity logs is not Publicly accessible
Azure - Logging and Auditing Storage Account Ensure the storage account containing the container with activity logs is encrypted with BYOK
Azure - Logging and Auditing Cosmos DB Ensure that 'Geo replication' is enabled for Cosmos DB
Azure - Logging and Auditing SQL Database Ensure that 'Also send email notification to admin and subscription owners' in Advanced Threat Protection Settings is enabled for SQL database
Azure - Logging and Auditing SQL Server Ensure that periodic recurring scans is enabled for SQL server
Azure - Logging and Auditing SQL Server Ensure that 'Also send email notification to admin and subscription owners' in Periodic recurring scan is enabled for SQL Server
Azure - Logging and Auditing SQL Server Ensure that 'Send alerts to' in Advanced Threat Protection Settings is set for SQL Server
Azure - Logging and Auditing SQL Server Ensure that 'Also send email notification to admin and subscription owners' in Advanced Threat Protection Settings is enabled for SQL Server
Azure - Logging and Auditing SQL Database Ensure that 'Advanced Data Security' on a SQL database is set to 'On'
Azure - Logging and Auditing SQL Database Ensure that 'Send alerts to' in Advanced Threat Protection Settings is set for SQL database
Azure - Logging and Auditing SQL Server Ensure that 'Send scan reports to' is set for SQL Server
Azure - Networking Virtual Network (VNET) Ensure that inbound and outbound traffic rules are configured for Subnets by associating NSGs to Subnets
Azure - Networking Network Security Groups (NSG) Ensure that DenyAll rule is configured for all NSG's
Azure - Networking Network Security Groups (NSG) Ensure that RDP access is restricted from the internet on NSG's
Azure - Networking Network Security Groups (NSG) Ensure that SSH access is restricted from the internet on NSG's
Azure - Networking Network Watcher Ensure that Network Watcher is 'Enabled'
Azure - Networking SQL Server Ensure no SQL Databases allow ingress 0.0.0.0/0 (ANY IP)
Azure - Networking Virtual Network (VNET) Ensure that DDOS protection is enabled for Virtual Network
Azure - Networking Network Security Groups (NSG) Ensure that Flow Log Status is set to On for Network Security Groups
Azure - Networking Network Security Groups (NSG) Ensure that ingress traffic to 'Known internal web port' (TCP:8000) is restricted from the public internet on NSG's
Azure - Networking Network Security Groups (NSG) Ensure that ingress traffic to 'Known internal web port' (TCP:8080) is restricted from the public internet on NSG's
Azure - Networking Network Security Groups (NSG) Ensure that ingress traffic to 'NetBIOS Name Service' (UDP:137) is restricted from the public internet on NSG's
Azure - Networking Network Security Groups (NSG) Ensure that ingress traffic to 'NetBios Datagram Service' (UDP:138) is restricted from the public internet on NSG's
Azure - Networking Network Security Groups (NSG) Ensure that ingress traffic to 'NetBios Datagram Service' (UDP:139) is restricted from the public internet on NSG's
Azure - Networking Network Security Groups (NSG) Ensure that ingress traffic to 'SNMP' (UDP:161) is restricted from the public internet on NSG's
Azure - Networking Network Security Groups (NSG) Ensure that ingress traffic to CiscoSecure,websm (TCP:9090) is restricted from the public internet on NSG's
Azure - Networking Network Security Groups (NSG) Ensure that ingress traffic to 'Cassandra' (TCP:7001) is restricted from the public internet on NSG's
Azure - Networking Network Security Groups (NSG) Ensure that ingress traffic to 'MSSQL Server' (TCP:1433) is restricted from the public internet on NSG's
Azure - Networking Network Security Groups (NSG) Ensure that ingress traffic to 'MySQL' (TCP:3306) is restricted from the public internet on NSG's
Azure - Networking Network Security Groups (NSG) Ensure that ingress traffic to 'Postgres SQL' (TCP:5432) is restricted from the public internet on NSG's
Azure - Networking Network Security Groups (NSG) Ensure that ingress traffic to 'SQL Server Analysis Services' (TCP:2383) is restricted from the public internet on NSG's
Azure - Networking Network Security Groups (NSG) Ensure that ingress traffic to Cassandra Client (TCP:9042) is restricted from the public internet on NSG's
Azure - Networking Network Security Groups (NSG) Ensure that ingress traffic to Cassandra Internode Communication (TCP:7000) is restricted from the public internet on NSG's
Azure - Networking Network Security Groups (NSG) Ensure that ingress traffic to Cassandra Monitoring (TCP:7199) is restricted from the public internet on NSG's
Azure - Networking Network Security Groups (NSG) Ensure that ingress traffic to Cassandra OpsCenter Monitoring (TCP:61620) is restricted from the public internet on NSG's
Azure - Networking Network Security Groups (NSG) Ensure that ingress traffic to Cassandra OpsCenter Website (TCP:8888) is restricted from the public internet on NSG's
Azure - Networking Network Security Groups (NSG) Ensure that ingress traffic to Cassandra Thrift (TCP:9160) is restricted from the public internet on NSG's
Azure - Networking Network Security Groups (NSG) Ensure that ingress traffic to Elastic search (TCP:9200) is restricted from the public internet on NSG's
Azure - Networking Network Security Groups (NSG) Ensure that ingress traffic to Elastic search (TCP:9300) is restricted from the public internet on NSG's
Azure - Networking Network Security Groups (NSG) Ensure that ingress traffic to LDAP (UDP:389) is restricted from the public internet on NSG's
Azure - Networking Network Security Groups (NSG) Ensure that ingress traffic to Memcached (TCP:11211) is restricted from the public internet on NSG's
Azure - Networking Network Security Groups (NSG) Ensure that ingress traffic to Memcached (UDP:11211) is restricted from the public internet on NSG's
Azure - Networking Network Security Groups (NSG) Ensure that ingress traffic to Mongo (TCP:27017) is restricted from the public internet on NSG's
Azure - Networking Network Security Groups (NSG) Ensure that ingress traffic to Oracle DB (TCP:1521) is restricted from the public internet on NSG's
Azure - Networking Network Security Groups (NSG) Ensure that ingress traffic to Oracle DB (TCP:2483) is restricted from the public internet on NSG's
Azure - Networking Network Security Groups (NSG) Ensure that ingress traffic to Oracle DB (UDP:2483) is restricted from the public internet on NSG's
Azure - Networking Network Security Groups (NSG) Ensure that ingress traffic to Redis (TCP:6379) is restricted from the public internet on NSG's
Azure - Networking Network Security Groups (NSG) Ensure that ingress traffic to Remote Desktop (TCP:3389) is restricted from the public internet on NSG's
Azure - Networking Network Security Groups (NSG) Ensure that ingress traffic to SSH (TCP:22) is restricted from the public internet on NSG's
Azure - Networking Network Interface Card (NIC) Ensure that less than 3 Public IP's (i.e. NIC's with Public IP) are used for Virtual Network
Azure - Networking Network Security Groups (NSG) Ensure that ingress traffic to bitcoin ports (TCP 8332 and 8333) is restricted from the public internet on NSG's
Azure - Networking Network Security Groups (NSG) Ensure that ingress traffic to Ethereum port (TCP 8545) is restricted from the public internet on NSG's
Azure - Networking Network Security Groups (NSG) Ensure that ingress traffic to 'POP3' (TCP:110) is restricted from the public internet on NSG's
Azure - Networking Network Security Groups (NSG) Ensure that ingress traffic to SMTP (TCP:25) is restricted from the public internet on NSG's
Azure - Security Center Azure Security Center (ASC) Ensure that AAD authentication in Service Fabric is set to enabled in ASC
Azure - Security Center Azure Security Center (ASC) Ensure that AAD authentication in SQL server is set to enabled in ASC
Azure - Security Center Azure Security Center (ASC) Ensure that monitor of Adaptive Application whitelisting is set to enabled in ASC
Azure - Security Center Azure Security Center (ASC) Ensure that Automatic Provisioning of monitoring agent is set to On in ASC
Azure - Security Center Azure Security Center (ASC) Ensure that Cluster Protection level in Service Fabric is set to enabled in ASC
Azure - Security Center Azure Security Center (ASC) Ensure that diagnostics logs in Batch Account is set to enabled in ASC
Azure - Security Center Azure Security Center (ASC) Ensure that diagnostics logs in Data Lake Analytics is set to enabled in ASC
Azure - Security Center Azure Security Center (ASC) Ensure that diagnostics logs in Data Lake Store is set to enabled in ASC
Azure - Security Center Azure Security Center (ASC) Ensure that diagnostics logs in Event Hub is set to enabled in ASC
Azure - Security Center Azure Security Center (ASC) Ensure that diagnostics logs in Key Vault is set to enabled in ASC
Azure - Security Center Azure Security Center (ASC) Ensure that diagnostics logs in Logic Apps is set to enabled in ASC
Azure - Security Center Azure Security Center (ASC) Ensure that diagnostics logs in Redis Cache is set to enabled in ASC
Azure - Security Center Azure Security Center (ASC) Ensure that diagnostics logs in Search Service is set to enabled in ASC
Azure - Security Center Azure Security Center (ASC) Ensure that diagnostics logs in Service Bus is set to enabled in ASC
Azure - Security Center Azure Security Center (ASC) Ensure that diagnostics logs in Virtual Machine Scale Sets is set to enabled in ASC
Azure - Security Center Azure Security Center (ASC) Ensure that diagnostics logs in Stream Analytics is set to enabled in ASC
Azure - Security Center Azure Security Center (ASC) Ensure that disable unrestricted network to storage account is set to enabled in ASC
Azure - Security Center Azure Security Center (ASC) Ensure that monitor disk encryption is set to enabled in ASC
Azure - Security Center Azure Security Center (ASC) Designate up to 3 subscription owners is set to enabled in ASC
Azure - Security Center Azure Security Center (ASC) Designate more than one subscription owner is set to enabled in ASC
Azure - Security Center Azure Security Center (ASC) Ensure that MFA is enabled for all subscription accounts with owner permissions in ASC
Azure - Security Center Azure Security Center (ASC) Ensure that MFA is enabled for all subscription accounts with read permissions in ASC
Azure - Security Center Azure Security Center (ASC) Ensure that MFA is enabled for all subscription accounts with write permissions in ASC
Azure - Security Center Azure Security Center (ASC) Ensure that deprecated accounts is removed on subscription are set to enabled in ASC
Azure - Security Center Azure Security Center (ASC) Ensure that deprecated accounts with owner permissions are removed from subscription is set to enabled in ASC
Azure - Security Center Azure Security Center (ASC) Ensure that external accounts with owner permissions are removed from subscription is set to enabled in ASC
Azure - Security Center Azure Security Center (ASC) Ensure that external accounts with read permissions are removed from subscription is set to enabled in ASC
Azure - Security Center Azure Security Center (ASC) Ensure that external accounts with write permissions are removed from subscription is set to enabled in ASC
Azure - Security Center Azure Security Center (ASC) Ensure that metric alerts in Batch account is set to enabled in ASC
Azure - Security Center Azure Security Center (ASC) Ensure that namespace authorization rules in service bus is set to enabled in ASC
Azure - Security Center Azure Security Center (ASC) Ensure that monitoring of network security groups is set to enabled in ASC
Azure - Security Center Azure Security Center (ASC) Ensure that next generation firewall is set to enabled in ASC
Azure - Security Center Azure Security Center (ASC) Ensure that monitoring of OS vulnerabilities is set to enabled in ASC
Azure - Security Center Azure Security Center (ASC) Ensure that secure transfer to storage account is set to enabled in ASC
Azure - Security Center Azure Security Center (ASC) Ensure that security contact email is provided in ASC
Azure - Security Center Azure Security Center (ASC) Ensure that phone number is provided in ASC
Azure - Security Center Azure Security Center (ASC) Ensure that alert notification is set to On in ASC
Azure - Security Center Azure Security Center (ASC) Ensure that email notification is set to On to subscription owners in ASC
Azure - Security Center Azure Security Center (ASC) Ensure that monitoring of SQL auditing is set to enabled in ASC
Azure - Security Center Azure Security Center (ASC) Ensure that SqlDb Vulnerability Assessment is set to enabled in ASC
Azure - Security Center Azure Security Center (ASC) Ensure that monitor SQL encryption is set to enabled in ASC
Azure - Security Center Azure Security Center (ASC) Ensure that monitor storage blob encryption is set to enabled in ASC
Azure - Security Center Azure Security Center (ASC) Ensure that in ASC standard tier is selected
Azure - Security Center Azure Security Center (ASC) Ensure that monitor system updates is set to enabled in ASC
Azure - Security Center Azure Security Center (ASC) Ensure that web application firewall is set to enabled in ASC
Azure - Security Center Azure Security Center (ASC) Ensure that vulnerability assessment is set to enabled in ASC
Azure - Security Center Azure Security Center (ASC) Ensure that monitoring of SQL managed instances without Advanced Data Security is enabled in ASC
Azure - Security Center Azure Security Center (ASC) Ensure that monitoring of permissive network access to app-services is enabled in ASC
Azure - Security Center Azure Security Center (ASC) Ensure that all Advanced Threat Protection types on SQL managed instance is enabled in ASC
Azure - Security Center Azure Security Center (ASC) Ensure that monitoring of SQL managed server without Advanced Data Security is enabled in ASC
Azure - Security Center Azure Security Center (ASC) Ensure that monitoring of access rules in Event Hub namespaces is enabled in ASC
Azure - Security Center Azure Security Center (ASC) Ensure that all Advanced Threat Protection types on SQL server is enabled in ASC
Azure - Security Center Azure Security Center (ASC) Ensure that monitoring of auditing policy Action-Groups and Actions setting is enabled in ASC
Azure - Security Center Azure Security Center (ASC) Ensure that monitoring of the use of HTTPS in API app is enable in ASC
Azure - Security Center Azure Security Center (ASC) Ensure that monitoring of using built-in RBAC rules is enabled in ASC
Azure - Security Center Azure Security Center (ASC) Ensure that the Audit monitoring of SQL Servers is enabled in ASC
Azure - Security Center Azure Security Center (ASC) Ensure that monitoring of Kubernetes Services without authorized IP ranges is enabled in ASC
Azure - Security Center Azure Security Center (ASC) Ensure that monitoring of access rules in Event Hubs is enabled in ASC
Azure - Security Center Azure Security Center (ASC) Ensure that monitoring of CORS restrictions for API App is enabled in ASC
Azure - Security Center Azure Security Center (ASC) Ensure that monitoring of Automation Account Encryption is enabled in ASC
Azure - Security Center Azure Security Center (ASC) Ensure that monitoring of CORS restrictions for Web App is enabled in ASC
Azure - Security Center Azure Security Center (ASC) Ensure that monitoring of CORS restrictions for Function App is enabled in ASC
Azure - Security Center Azure Security Center (ASC) Ensure that monitoring of diagnostics logs in selective app services is enabled in ASC
Azure - Security Center Azure Security Center (ASC) Ensure that monitoring of DDoS protection for virtual network is enabled in ASC
Azure - Security Center Azure Security Center (ASC) Ensure that endpoint protection monitoring for virtual machine scale sets is enabled in ASC
Azure - Security Center Azure Security Center (ASC) Ensure that monitoring of diagnostic logs in IoT Hubs is enabled in ASC
Azure - Security Center Azure Security Center (ASC) Ensure that monitoring of the use of HTTPS in function app is enabled in ASC
Azure - Security Center Azure Security Center (ASC) Ensure that 'Send alerts to' is set in SQL server Advanced Data Security settings is enabled in ASC
Azure - Security Center Azure Security Center (ASC) Ensure that monitoring of network just In time access is enabled in ASC
Azure - Security Center Azure Security Center (ASC) Ensure that IP Forwarding monitoring on virtual machines is disabled in ASC
Azure - Security Center Azure Security Center (ASC) Ensure that monitoring of IP restrictions for API App is enabled in ASC
Azure - Security Center Azure Security Center (ASC) Ensure that monitoring of Open Management Ports on virtual machines is enabled in ASC
Azure - Security Center Azure Security Center (ASC) Ensure that monitoring of IP restrictions for Web App is enabled in ASC
Azure - Security Center Azure Security Center (ASC) Ensure that monitoring of IP restrictions for Function App is enabled in ASC
Azure - Security Center Azure Security Center (ASC) Ensure that monitoring of web sockets for API App is enabled in ASC
Azure - Security Center Azure Security Center (ASC) Ensure that monitoring of diagnostics logs in App Services is enabled in ASC
Azure - Security Center Azure Security Center (ASC) Ensure that monitoring of web sockets for Web App is enabled in ASC
Azure - Security Center Azure Security Center (ASC) Ensure that monitoring of web sockets for Function App is enabled in ASC
Azure - Security Center Azure Security Center (ASC) Ensure that monitoring of custom domain use in API App is enabled in ASC
Azure - Security Center Azure Security Center (ASC) Ensure that monitoring of Endpoint Protection is enabled in ASC
Azure - Security Center Azure Security Center (ASC) Ensure that monitoring of custom domain use in Web App is enabled in ASC
Azure - Security Center Azure Security Center (ASC) Ensure that monitoring of custom domain use in Function App is enabled in ASC
Azure - Security Center Azure Security Center (ASC) Ensure that monitoring of .Net version in Web App is enabled in ASC
Azure - Security Center Azure Security Center (ASC) Ensure that monitoring of .Net version in API App is enabled in ASC
Azure - Security Center Azure Security Center (ASC) Ensure that monitoring of Java version in web app is enabled in ASC
Azure - Security Center Azure Security Center (ASC) Ensure that monitoring of Java version in API App is enabled in ASC
Azure - Security Center Azure Security Center (ASC) Ensure that monitoring of PHP version in the API App is enabled in ASC
Azure - Security Center Azure Security Center (ASC) Ensure that monitoring of Node.js version in Web App is enabled in ASC
Azure - Security Center Azure Security Center (ASC) Ensure that monitoring of Python version in API App is enabled in ASC
Azure - Security Center Azure Security Center (ASC) Ensure that monitoring of PHP version in Web App is enabled in ASC
Azure - Security Center Azure Security Center (ASC) Ensure that monitoring of Internet-facing VM for NSG traffic hardening is enabled in ASC
Azure - Security Center Azure Security Center (ASC) Ensure that monitoring of Python version in Web App is enabled in ASC
Azure - Security Center Azure Security Center (ASC) Ensure that monitoring of NSG for virtual machines is enabled in ASC
Azure - Security Center Azure Security Center (ASC) Ensure that monitoring of NSG for Subnet is enabled in ASC
Azure - Security Center Azure Security Center (ASC) Ensure that monitoring of Kubernetes Services without pod security policy is enabled in ASC
Azure - Security Center Azure Security Center (ASC) Ensure that monitoring of remote debugging for API App is enabled in ASC
Azure - Security Center Azure Security Center (ASC) Ensure that monitoring of remote debugging for Function App is enabled in ASC
Azure - Security Center Azure Security Center (ASC) Ensure that monitoring of remote debugging for Web App is enabled in ASC
Azure - Security Center Azure Security Center (ASC) Ensure that required diagnostic logs retention period in days for Batch accounts is set in ASC
Azure - Security Center Azure Security Center (ASC) Ensure that required diagnostic logs retention period in days in Azure Search service is set in ASC
Azure - Security Center Azure Security Center (ASC) Ensure that required diagnostic logs retention period in days in Data Lake Analytics is set in ASC
Azure - Security Center Azure Security Center (ASC) Ensure that required diagnostic logs retention period in days in Data Lake Store accounts is set in ASC
Azure - Security Center Azure Security Center (ASC) Ensure that required diagnostic logs retention period in days in Event Hub accounts is set in ASC
Azure - Security Center Azure Security Center (ASC) Ensure that required diagnostic logs retention period in days in IoT Hub accounts is set in ASC
Azure - Security Center Azure Security Center (ASC) Ensure that required diagnostic logs retention period in days in Key Vault vaults is set in ASC
Azure - Security Center Azure Security Center (ASC) Ensure that required diagnostic logs retention period in days in Logic Apps workflows is set in ASC
Azure - Security Center Azure Security Center (ASC) Ensure that required diagnostic logs retention period in days in Service Bus is set in ASC
Azure - Security Center Azure Security Center (ASC) Ensure that required diagnostic logs retention period in days in Stream Analytics is set in ASC
Azure - Security Center Azure Security Center (ASC) Ensure that monitoring of Kubernetes Services without RBAC is enabled in ASC
Azure - Security Center Azure Security Center (ASC) Ensure that monitoring of sensitive data is classified on SQL database is enabled in ASC
Azure - Security Center Azure Security Center (ASC) Ensure that monitoring of SQL managed instances alerts being sent to admins and subscription owners is enabled in ASC
Azure - Security Center Azure Security Center (ASC) Ensure that monitoring of classic storage accounts migration to ARM is enabled in ASC
Azure - Security Center Azure Security Center (ASC) Ensure that reporting of system updates in virtual machine scale sets is enabled in ASC
Azure - Security Center Azure Security Center (ASC) Ensure that monitoring of unencrypted SQL databases is enabled in ASC
Azure - Security Center Azure Security Center (ASC) Ensure that monitoring of classic virtual machines is enabled in ASC
Azure - Security Center Azure Security Center (ASC) Ensure that OS vulnerabilities monitoring for virtual machine scale sets is enabled in ASC
Azure - Security Center Azure Security Center (ASC) Ensure that the detection of VM vulnerabilities by a Vulnerability Assessment solution is enabled in ASC
Azure - Security Center Azure Security Center (ASC) Ensure that Vulnerability Assessment on your SQL managed instances is enabled in ASC
Azure - Security Center Azure Security Center (ASC) Ensure that Vulnerability Assessment on your SQL servers is enabled in ASC
Azure - Security Center Azure Security Center (ASC) Ensure that monitoring of the use of HTTPS in Web App is enabled in ASC
Azure - Security Center Azure Security Center (ASC) Ensure that Vulnerabilities in container security configurations should be remediated in ASC.
Azure - Security Center Azure Security Center (ASC) Ensure that Kubernetes Services should be upgraded to a non-vulnerable Kubernetes version in ASC.
Azure - Storage and Databases Storage Account Ensure that encryption is enabled for Azure Storage Service
Azure - Storage and Databases SQL Database Ensure that 'Data encryption' is set to 'On' for SQL Databases
Azure - Storage and Databases SQL Database Ensure that 'Auditing' is set to 'On' for SQL Databases
Azure - Storage and Databases SQl Server Ensure that 'Auditing' is set to 'On' for SQL Server
Azure - Storage and Databases Storage Account Ensure that 'Secure transfer required' is 'Enabled' for Storage Account
Azure - Storage and Databases SQl Server Ensure that 'Threat Detection types' is set to 'All' for SQL Server
Azure - Storage and Databases Storage Account Ensure that 'Storage service encryption' is set to Enabled for File Service
Azure - Storage and Databases Storage Account Ensure that 'Storage service encryption' is set to Enabled for Blob Service
Azure - Storage and Databases Storage Account Ensure that 'Geo-redundant' is enabled for Azure Storage
Azure - Storage and Databases Storage Account Ensure that 'Public access level' is set to Private for Blob Containers
Azure - Storage and Databases SQL Server Ensure that firewall rules are set as appropriate for SQL Servers
Azure - Storage and Databases SQL Database Ensure that 'Threat Detection types' is set to 'All' for SQL Databases
Azure - Storage and Databases SQL Server Ensure that 'Threat Detection' Retention is 'greater than 90 days' for SQL Server
Azure - Storage and Databases SQL Server Ensure that 'Auditing' Retention is 'greater than 90 days' for SQL Servers
Azure - Storage and Databases SQL Server Ensure that Azure Active Directory Admin is configured for SQL Server
Azure - Storage and Databases SQL Server Ensure that 'Advanced Data Security' on a SQL server is set to 'On'
Azure - Storage and Databases SQL Database Ensure that 'Threat' Retention is 'greater than 90 days' for SQL Databases
Azure - Storage and Databases SQL Database Ensure that 'Geo replication' is enabled for SQL Databases
Azure - Storage and Databases SQL Database Ensure that 'Data Masking' is enabled for SQL Databases
Azure - Storage and Databases SQL Database Ensure that DataProfile tag has been applied for SQL Databases
Azure - Storage and Databases SQL Database Ensure that Diagnostics is enabled for SQL Databases
Azure - Storage and Databases Storage Account Ensure that DataProfile tag has been applied for Azure Storage
Azure - Storage and Databases SQL Server Ensure that DataProfile tag has been applied for SQL DB Servers
Azure - Storage and Databases Azure Synapse Analytics Ensure that threat detection is enabled for SQL Data Warehouse
Azure - Storage and Databases Azure Synapse Analytics Ensure that firewall is enabled for SQL Data Warehouse
Azure - Storage and Databases Azure Synapse Analytics Ensure that encryption is enabled for SQL Data Warehouse
Azure - Storage and Databases Azure Synapse Analytics Ensure that auditing is enabled for SQL Data Warehouse
Azure - Storage and Databases Cosmos DB Ensure that failover is enabled for Cosmos DB
Azure - Storage and Databases Cosmos DB Ensure that firewall is enabled for Cosmos DB
Azure - Storage and Databases Azure Database for PostgreSQL server Ensure server parameter 'log_retention_days' is greater than 3 days for PostgreSQL Database Server
Azure - Storage and Databases Storage Account Ensure default network access rule for Storage Accounts is set to deny
Azure - Storage and Databases Azure Database for PostgreSQL server Ensure server parameter 'log_duration' is set to 'ON' for PostgreSQL Database Server
Azure - Storage and Databases Azure Database for PostgreSQL server Ensure server parameter 'connection_throttling' is set to 'ON' for PostgreSQL Database Server
Azure - Storage and Databases Azure Database for PostgreSQL server Ensure server parameter 'log_connections' is set to 'ON' for PostgreSQL Database Server
Azure - Storage and Databases Azure Database for PostgreSQL server Ensure server parameter 'log_disconnections' is set to 'ON' for PostgreSQL Database Server
Azure - Storage and Databases Azure Database for PostgreSQL server Ensure server parameter 'log_checkpoints' is set to 'ON' for PostgreSQL Database Server
Azure - Storage and Databases Azure Database for PostgreSQL server Ensure 'Enforce SSL connection' is set to 'ENABLED' for PostgreSQL Database Server
Azure - Storage and Databases SQL Server Ensure SQL server's TDE protector is encrypted with BYOK
Azure - Storage and Databases Storage Account Ensure 'Trusted Microsoft Services' is enabled for Storage Account access
Azure - Storage and Databases Azure Database for MySQL server Ensure 'Enforce SSL connection' is set to 'ENABLED' for MySQL Database Server
Azure - Storage and Databases SQL Server Ensure that 'AuditActionGroups' in 'auditing' policy for a SQL server is set properly
Azure - Storage and Databases SQL Server Ensure the 'Allow access to Azure services' flag is disabled for SQL Server
Azure - Storage and Databases SQL Database Ensure that 'Auditing' Retention is 'greater than 90 days' for SQL Database
Azure - Storage and Databases Storage Account Ensure Advanced Threat Protection is enabled for Storage Accounts
Azure - Storage and Databases Cosmos DB Ensure that 'Eventual' consistency is disabled for Cosmos DB
Azure - Storage and Databases Azure Data Lake Storage Gen 1 Ensure that firewall is enabled for Azure Data Lake Storage Gen1
Azure - Storage and Databases Azure Data Lake Storage Gen 1 Ensure that diagnostics log is enabled for Azure Data Lake Storage Gen1
Azure - Storage and Databases Azure Data Lake Storage Gen 1 Ensure that encryption of sensitive data is enabled for Azure Data Lake Storage Gen1
Azure - Storage and Databases SQL Database Ensure that 'Send scan reports to' is set for SQL database
Azure - Storage and Databases SQL Database Ensure that periodic recurring scans is enabled for SQL database
Azure - Storage and Databases Storage Account Ensure that shared access signature tokens are allowed only over https
Azure - Storage and Databases SQL Database Ensure that 'Also send email notification to admin and subscription owners' in Periodic recurring scan is enabled for SQL database
Azure - Storage and Databases Storage Account Ensure that shared access signature tokens expire within an hour
Azure - Storage and Databases Storage Account Ensure Storage logging is enabled for Queue service for read, write, and delete requests
Azure - Storage and Databases Storage Account Ensure that storage account access keys are periodically regenerated
Azure - Storage and Databases Azure Databricks Ensure that secrets and keys must not be in plain text in notebooks and jobs
Azure - Storage and Databases Azure Databricks Ensure that use Azure Key Vault backed secret scope to hold secrets
Azure - Storage and Databases Azure Databricks Ensure that all users/identities must be granted minimum required permissions using Role Based Access Control (RBAC)
Azure - Storage and Databases Azure Databricks Ensure that Minimize the number of workspace admins
Azure - Storage and Databases Azure Databricks Ensure that All users must be granted minimum required permissions on clusters
Azure - Storage and Databases Cosmos DB Ensure that the parameterized SQL queries used to access the database
Azure - Storage and Databases Cosmos DB Ensure that CosmosDb Account keys are rotated periodically
Azure - Storage and Databases Cosmos DB Ensure that resource tokens are generated with least privileges and expiry needed by clients
Azure - Storage and Databases Cosmos DB Do not send resource token with read write (RW) permission to untrusted clients