Description
Microsoft Defender for Resource Manager scans incoming administrative requests to change your infrastructure from both CLI and the Azure portal.
Rationaleβ
Scanning resource requests lets you be alerted every time there is suspicious activity in order to prevent a security threat from being introduced.
Impactβ
Enabling Microsoft Defender for Resource Manager requires enabling Microsoft Defender for your subscription. Both will incur additional charges.
Auditβ
From Azure Portalβ
- Go to
Microsoft Defender for Cloud
. - Under
Management
, selectEnvironment Settings
. - Click on the subscription name.
- Select the
Defender plans
blade. - Ensure
Status
is set toOn
forResource Manager
.
From Azure CLIβ
Ensure the output of the below command is Standard
:
az security pricing show -n 'Arm' --query 'PricingTier'
From Azure PowerShellβ
Get-AzSecurityPricing -Name 'Arm' | Select-Object Name,PricingTier
Ensure the output of PricingTier
is Standard
.
From Azure Policyβ
If referencing a digital copy of this Benchmark, clicking a Policy ID will open a link to the associated Policy definition in Azure.
- Policy ID: c3d20c29-b36d-48fe-808b-99a87530ad99 - Name:
Azure Defender for Resource Manager should be enabled
Default Valueβ
By default, Microsoft Defender for Resource Manager is not enabled.
Referencesβ
- https://docs.microsoft.com/en-us/azure/defender-for-cloud/enable-enhanced-security
- https://docs.microsoft.com/en-us/azure/defender-for-cloud/defender-for-resource-manager-introduction
- https://azure.microsoft.com/en-us/pricing/details/defender-for-cloud/
- https://docs.microsoft.com/en-us/azure/defender-for-cloud/alerts-overview
- https://learn.microsoft.com/en-us/security/benchmark/azure/mcsb-logging-threat-detection#lt-1-enable-threat-detection-capabilities