Policy Templates for Azure
For instructions on how to find Policy templates that are new or updated due to changed recommendations, see Find New and Updated Policy Templates.
For a list of Policy Templates that have been deprecated, see Policy Templates for Azure - DEPRECATED.
To find the Policy Templates for Azure CIS version v1.0.0 to v1.5.0, see Policy Templates for Azure- CIS Version v1.0.0 to v1.5.0.
Azure CIS version v2.0.0 onwards
This table lists the Policy Templates provided for use with Azure CIS version v2.0.0 onwards. SSE 6.3.1 supports the following Azure CIS version.
Policy Name | Resource/Entity Type | CISv2.0.0 Level 1 | CISv2.0.0 Level 2 | Policy Description |
---|---|---|---|---|
Soft delete and purge protection should be enabled on Key vaults | Key Vaults | 8.5 |
It is recommended that the Key Vault be made recoverable by enabling the "Do Not Purge" and "Soft Delete" functions. This is to prevent the loss of encrypted data, including storage accounts, SQL databases, and/or dependent services provided by Key Vault objects (Keys, Secrets, Certificates) and more. This may happen due to accidental deletion by a user or disruptive activity by a malicious user. |
|
PostgreSQL Database Server should enable Log checkpoints |
PostgreSQL Database Server |
4.3.1 |
Enabling log_checkpoints helps the PostgreSQL database log each checkpoint, which generates query and error logs. However, access to transaction logs is not supported. Query and error logs can be used to identify, troubleshoot, and repair configuration errors and sub-optimal performance. |
|
Web app should use latest version of TLS encryption | AppService | 9.3 |
The TLS (Transport Layer Security) protocol secures data transmission over the internet using standard encryption technology. Encryption should be set to the latest TLS version. App service allows TLS 1.2 by default, which is the recommended TLS level by industry standards such as PCI DSS. |
|
Web app should enable client certificates | AppService | 9.4 |
Client certificates (Incoming client certificates) allow the app to request a certificate for incoming requests. Only clients with valid certificates can access the app. |
|
Web app should use latest HTTP version | AppService | 9.9 |
Periodically, newer versions are released for HTTP either due to security flaws or additional functionality. Use the latest HTTP version for web apps to benefit from security fixes, if any, and/or new functionalities in the newer version. |
|
PostgreSQL Database Flexible Server should enable Log checkpoints | PostgreSQL Database Flexible Server | 4.3.1 |
Enabling log_checkpoints helps the PostgreSQL database log each checkpoint, which generates query and error logs. However, access to transaction logs is not supported. Query and error logs can be used to identify, troubleshoot, and repair configuration errors and sub-optimal performance. |
|
PostgreSQL Database Server should enable log connections | PostgreSQL Database Server | 4.3.3 |
Enabling log_connections helps PostgreSQL Database log attempted connections to the server, as well as the successful completion of client authentication. Log data can be used to identify, troubleshoot, and repair configuration errors and suboptimal performance. |
|
PostgreSQL Database Server should enable log disconnections | PostgreSQL Database Server | 4.3.4 |
Enabling log_disconnections helps PostgreSQL Database to log the end of a session, including duration, which generates query and error logs. Query and error logs can be used to identify, troubleshoot, and repair configuration errors and sub-optimal performance. |
|
PostgreSQL Database Server should enable throttling connection | PostgreSQL Database Server | 4.3.5 |
Enabling connection_throttling helps the PostgreSQL Database to set the verbosity of logged messages. This generates query and error logs with respect to concurrent connections that could lead to a successful Denial of Service (DoS) attack by exhausting connection resources. A system can also fail or be degraded by an overload of legitimate users. Query and error logs can be used to identify, troubleshoot, and repair configuration errors and sub-optimal performance. |
|
PostgreSQL Database Server should have greater than 3 log retention days | PostgreSQL Database Server | 4.3.6 |
Configuring log_retention_days determines the duration in days Azure Database for PostgreSQL retains log files. Query and error logs can be used to identify, troubleshoot, and repair configuration errors and sub-optimal performance. |
|
PostgreSQL Database Server should enable Enforce SSL connection | PostgreSQL Database Server | 4.3.1 |
SSL connectivity provides a new layer of security by connecting database servers to client applications using the Secure Sockets Layer (SSL). Enforcing SSL connections between the database server and client applications protects against "man in the middle" attacks by encrypting the data stream between the server and the application. |
|
Function app should use latest version of TLS encryption | AppService | 9.3 |
The TLS (Transport Layer Security) protocol secures data transmission over the internet using standard encryption technology. Encryption should be set to the latest TLS version. App service allows TLS 1.2 by default, which is the recommended TLS level by industry standards such as PCI DSS. |
|
Function app should enable client certificates | AppService | 9.4 |
Client certificates (Incoming client certificates) allow the app to request a certificate for incoming requests. Only clients with valid certificates can access the app. |
|
Function app should use latest HTTP version | AppService | 9.9 |
Periodically, newer versions are released for HTTP either due to security flaws or to include additional functionality. Use the latest HTTP version for web apps to benefit from security fixes, if any, and/or new functionalities in the newer version. |