Reviewing the Azure benchmarks and frameworks will give you a clearer picture of your Azure security posture. I urge you to look these over even if you are not in a regulated industry. These best practices can go a long way to keeping you secure.
To start reviewing the benchmarks, download the Excel spreadsheet that shows the mapping to the NIST controls. Azure Security Center has v1 version of the benchmark is the default in its regulatory compliance dashboard. Soon the new v2 benchmark will be default.
Today, I am going to provision a test Windows Virtual Machine with some known misconfigurations, and run the CIS report and see how I can improve! I am also going to provision an Azure Web App in Visual Studio Code with some misconfigurations, and see how that stacks up against the CIS benchmark tests. The Cloud One Conformity Bot should show how I can improve and remediate. Enjoy!
Using CIS Benchmark as a guide is a great way to remediate common misconfigurations in your Azure Subscription. Today, we were specifically able to show how that applies to both Azure Virtual Machine misconfigurations and Azure Web App and Azure App Service Plan misconfigurations. These are two popular services that most folks in Azure use on a daily basis. I hope you enjoyed stopping by! I certainly enjoyed experimenting with the new CIS benchmarks. I encourage you to try it out and do the same! Trend Micro Cloud Conformity is a great tool to help you fix common misconfigurations, help you establish a Well Architected Framework, and now we have the bonus of additional CIS benchmark tests!
In this script, we first declare our Azure provider with provider "azurerm" statement, and we retrieve our Azure subscription details using data "azurerm_subscription" "primary" .Next, we retrieve the built-in Azure policy set definitions using data "azurerm_builtin_policy_set_definition" "security_benchmark". We specifically retrieve the 'Azure Security Benchmark' initiative using its ID.Then, we assign this initiative to our Azure subscription scope with resource "azurerm_policy_assignment" "security_benchmark" . We also enable a Managed Identity for our assignment with the identity block, which is required to assess some of the rules in the 'Azure Security Benchmark'. We reprovision this Managed Identity in the "westus2" region.Finally, we export the ID of the policy assignment, which can be used in subsequent scripts or Terraform modules.
Microsoft has torn the wraps off its multi-cloud security benchmark (MCSB), which replaces the four-year-old Azure Security Benchmark. Crucially, as the name suggests, it now has usage and configuration guidance that reaches into rival environments.
Google Cloud is next in line, with Microsoft extending the MCSB scope to include the platform later this year. Once that is done, Microsoft's cloud security benchmark will have covered the three largest public cloud providers, which account for 66 percent of the market, according to Synergy Research Group.
Along with adding Google Cloud to the lists of cloud environment covered by the benchmark, Microsoft will continue adding monitoring checks to Defender for Cloud that will cover Azure and other clouds and more compliance management and evidence-gathering capabilities in the Defender for Cloud portal, according to Cheng.
Security is tough. There are many different settings in many different places I know, however my suggestion is that you should start, and continue to use, Microsoft Secure Score as your security benchmark when it comes to the protection of your environment will make things much easier and provide a simple starting point.
The Azure Security Benchmark is a set of high-impact securityrecommendations created to keep most services in Azure safe. Thebenchmark is incredibly helpful in interpreting how the controls areadapted to Azure services.
Azure Foundations Benchmark is a set of controls that provides prescriptive guidance to establish a secure baseline configuration for Microsoft Azure. Primarily, this benchmark focuses on the foundation level of security for anyone adopting Microsoft Azure.
35fe9a5643