π Network Security Group Flow Logs are not captured and sent to Log Analytics Workspace π’
- Contextual name: π Network Security Group Flow Logs are not captured and sent to Log Analytics Workspace π’
- ID:
/ce/ca/azure/network-watcher/network-security-group-flow-logs
- Located in: π Azure Network Watcher
Flagsβ
- π’ Impossible policy
- π’ Policy with categories
- π’ Policy with type
Our Metadataβ
- Policy Type:
COMPLIANCE_POLICY
- Policy Category:
SECURITY
RELIABILITY
PERFORMANCE
Descriptionβ
Descriptionβ
Ensure that network flow logs are captured and fed into a central log analytics workspace.
Rationaleβ
Network Flow Logs provide valuable insight into the flow of traffic around your network and feed into both Azure Monitor and Azure Sentinel (if in use), permitting the generation of visual flow diagrams to aid with analyzing for lateral movement, etc.
Impactβ
The impact of configuring NSG Flow logs is primarily one of cost and configuration. If deployed, it will create storage accounts that hold minimal amounts of data on a 5-day lifecycle before feeding to Log Analytics Workspace. This will increase the amount of data stored and used by Azure Monitor.
Auditβ
From Azure Portalβ
- Navigate to
Network Watcher
.- Under
Logs
, selectFlow logs
.- Click
Add filter
.- From the
Filter
drop-down, selectFlow log type
.- From the
Value
drop-down, checkNetwork security group
only.- Click
Apply
.- Ensure that at least one network security group flow log is listed and is configured to send logs to a
Log Analytics Workspace
.... see more
Remediationβ
Remediationβ
From Azure Portalβ
- Navigate to
Network Watcher
.- Under
Logs
, selectFlow logs
.- Select
+ Create
.- Select the desired Subscription.
- For
Flow log type
, selectNetwork security group
.- Select
+ Select target resource
.- Select
Network security group
.- Select a network security group.
- Click
Confirm selection
.- Select or create a new Storage Account.
- If using a v2 storage account, input the retention in days to retain the log.
- Click
Next
.- Under
Analytics
, forFlow log version
, selectVersion 2
.- Check the box next to
Enable traffic analytics
.- Select a processing interval.
- Select a
Log Analytics Workspace
.- Select
Next
.- Optionally add Tags.
- Select
Review + create
.- Select
Create
.Warningβ
The remediation policy creates remediation deployment and names them by concatenating the subscription name and the resource group name. The MAXIMUM permitted length of a deployment name is 64 characters. Exceeding this will cause the remediation task to fail.
policy.yamlβ
Linked Framework Sectionsβ
Section | Sub Sections | Internal Rules | Policies | Flags |
---|---|---|---|---|
πΌ CIS Azure v2.1.0 β πΌ 5.1.5 Ensure that Network Security Group Flow logs are captured and sent to Log Analytics - Level 2 (Manual) | 1 | |||
πΌ CIS Azure v3.0.0 β πΌ 6.1.5 Ensure that Network Security Group Flow logs are captured and sent to Log Analytics (Manual) | 1 | |||
πΌ Cloudaware Framework β πΌ Logging and Monitoring Configuration | 49 |