Skip to main content

πŸ“ Microsoft Cloud Security Benchmark policies are disabled 🟒

  • Contextual name: πŸ“ Microsoft Cloud Security Benchmark policies are disabled 🟒
  • ID: /ce/ca/azure/microsoft-defender/microsoft-cloud-security-benchmark-policies
  • Located in: πŸ“ Microsoft Defender for Cloud

Flags​

Our Metadata​

  • Policy Type: COMPLIANCE_POLICY
  • Policy Category:
    • SECURITY

Description​

Open File

Description​

The Microsoft Cloud Security Benchmark (or "MCSB") is an Azure Policy Initiative containing many security policies to evaluate resource configuration against best practice recommendations. If a policy in the MCSB is set with effect type Disabled, it is not evaluated and may prevent administrators from being informed of valuable security recommendations.

Rationale​

A security policy defines the desired configuration of resources in your environment and helps ensure compliance with company or regulatory security requirements. The MCSB Policy Initiative a set of security recommendations based on best practices and is associated with every subscription by default. When a policy "Effect" is set to Audit, policies in the MCSB ensure that Defender for Cloud evaluates relevant resources for supported recommendations. To ensure that policies within the MCSB are not being missed when the Policy Initiative is evaluated, none of the policies should have an Effect of Disabled.

Impact​

Policies within the MCSB default to an effect of Audit and will evaluate - but not enforce - policy recommendations. Ensuring these policies are set to Audit simply ensures that the evaluation occurs to allow administrators to understand where an improvement may be possible. Administrators will need to determine if the recommendations are relevant and desirable for their environment, then manually take action to resolve the status if desired.

... see more

Remediation​

Open File

Remediation​

From Azure Portal​

  1. From Azure Home select the Portal Menu.
  2. Select Microsoft Defender for Cloud.
  3. Under Management, select Environment settings.
  4. Click on the appropriate Management Group or Subscription.
  5. Click on Security policies in the left column.
  6. Click on Microsoft cloud security benchmark
  7. Click Add Filter and select Effect
  8. Check the Disabled box to search for all disabled policies
  9. Click Apply
  10. Click the blue ellipsis ... to the right of a policy name.
  11. Click Manage effect and parameters.
  12. Under Policy effect, select the radio button next to Audit.
  13. Click Save.
  14. Click Refresh.
  15. Repeat steps 10-14 until all disabled policies are updated.
  16. Repeat steps 1-15 for each Management Group or Subscription requiring remediation.

policy.yaml​

Open File

Linked Framework Sections​

SectionSub SectionsInternal RulesPoliciesFlags
πŸ’Ό CIS Azure v2.1.0 β†’ πŸ’Ό 2.1.13 Ensure that Microsoft Cloud Security Benchmark policies are not set to 'Disabled' - Level 1 (Manual)1
πŸ’Ό CIS Azure v3.0.0 β†’ πŸ’Ό 3.1.11 Ensure that Microsoft Cloud Security Benchmark policies are not set to 'Disabled' (Manual)1
πŸ’Ό CIS Azure v4.0.0 β†’ πŸ’Ό 9.1.11 Ensure that Microsoft Cloud Security Benchmark policies are not set to 'Disabled' (Manual)1
πŸ’Ό Cloudaware Framework β†’ πŸ’Ό Microsoft Defender Configuration26