π Microsoft Cloud Security Benchmark policies are disabled π’
- Contextual name: π Microsoft Cloud Security Benchmark policies are disabled π’
- ID:
/ce/ca/azure/microsoft-defender/microsoft-cloud-security-benchmark-policies
- Located in: π Microsoft Defender for Cloud
Flagsβ
- π’ Impossible policy
- π’ Policy with categories
- π’ Policy with type
Our Metadataβ
- Policy Type:
COMPLIANCE_POLICY
- Policy Category:
SECURITY
Descriptionβ
Descriptionβ
The Microsoft Cloud Security Benchmark (or "MCSB") is an Azure Policy Initiative containing many security policies to evaluate resource configuration against best practice recommendations. If a policy in the MCSB is set with effect type
Disabled
, it is not evaluated and may prevent administrators from being informed of valuable security recommendations.Rationaleβ
A security policy defines the desired configuration of resources in your environment and helps ensure compliance with company or regulatory security requirements. The MCSB Policy Initiative a set of security recommendations based on best practices and is associated with every subscription by default. When a policy "Effect" is set to
Audit
, policies in the MCSB ensure that Defender for Cloud evaluates relevant resources for supported recommendations. To ensure that policies within the MCSB are not being missed when the Policy Initiative is evaluated, none of the policies should have an Effect ofDisabled
.Impactβ
Policies within the MCSB default to an effect of
Audit
and will evaluate - but not enforce - policy recommendations. Ensuring these policies are set toAudit
simply ensures that the evaluation occurs to allow administrators to understand where an improvement may be possible. Administrators will need to determine if the recommendations are relevant and desirable for their environment, then manually take action to resolve the status if desired.... see more
Remediationβ
Remediationβ
From Azure Portalβ
Part A - List all disabled policiesβ
- From Azure Home select the Portal Menu.
- Select
Microsoft Defender for Cloud
.- Under
Management
, selectEnvironment Settings
.- Select the appropriate Subscription.
- Click on
Security policies
in the left column.- Click on
Microsoft cloud security benchmark
.- Click
Add Filter
and selectEffect
.- Check the
Disabled
box to search for all disabled policies.- Click
Apply
.Part B - Remediate Policy Effectβ
For each policy that remains in the list:
- Click the blue ellipses to the right of the policy name.
- Click
Manage effect and parameters
.- Under Policy Effect, select the
Audit
radio button.- Click
Save
.- Click
Refresh
.Repeat "Part B - Remediate Policy Effect" until no more policies are listed.
policy.yamlβ
Linked Framework Sectionsβ
Section | Sub Sections | Internal Rules | Policies | Flags |
---|---|---|---|---|
πΌ CIS Azure v2.1.0 β πΌ 2.1.13 Ensure that Microsoft Cloud Security Benchmark policies are not set to 'Disabled' - Level 1 (Manual) | 1 | |||
πΌ CIS Azure v3.0.0 β πΌ 3.1.11 Ensure that Microsoft Cloud Security Benchmark policies are not set to 'Disabled' (Manual) | 1 | |||
πΌ Cloudaware Framework β πΌ Microsoft Defender Configuration | 25 |