Skip to main content

๐Ÿ’ผ 7.1 Logging and Monitoring

Descriptionโ€‹

This section covers security recommendations to follow for logging and monitoring policies on an Azure Subscription. Scoping: A necessary exercise for effective and efficient use of Logging and Monitoring For recommendations contained in this section, it is crucial that your organization consider and settle on the scope of application for each recommendation individually. The scope of application cannot be realistically written in a generic prescriptive way within these recommendations, so a scoping exercise is strongly recommended. A scoping exercise will help you determine which resources are "in scope" and will receive partial or complete logging and monitoring treatment, and which resources are "out of scope" and will not receive any logging and monitoring treatment. Your objectives with the scoping exercise should be to: โ€ข Produce a clear classification of resources โ€ข Understand the control requirements of any relevant security or compliance frameworks โ€ข Ensure the appropriate personnel can detect and react to threats โ€ข Ensure relevant resources have a historical register for accountability and investigation โ€ข Minimize alert fatigue and cost Release Environments provide a helpful context for understanding scope from a DevOps perspective. For example:

  1. Production Environment 2. Staging Environment 3. Testing Environment 4. Development Environment While resources considered in the scope of a Production Environment might have a full set of recommendations applied for logging and monitoring, other release environments might have a limited set of recommendations applied for the sake of accountability. The names of these environments and which resources are in the scope of each environment will vary from one organization to another.

Similarโ€‹

Sub Sectionsโ€‹

SectionSub SectionsInternal RulesPoliciesFlags
๐Ÿ’ผ 7.1.1 Configuring Diagnostic Settings10
ย ย ย ย ๐Ÿ’ผ 7.1.1.1 Ensure that a 'Diagnostic Setting' exists for Subscription Activity Logs (Manual)1
ย ย ย ย ๐Ÿ’ผ 7.1.1.2 Ensure Diagnostic Setting captures appropriate categories (Automated)1
ย ย ย ย ๐Ÿ’ผ 7.1.1.3 Ensure the storage account containing the container with activity logs is encrypted with Customer Managed Key (CMK) (Automated)1
ย ย ย ย ๐Ÿ’ผ 7.1.1.4 Ensure that logging for Azure Key Vault is 'Enabled' (Automated)1
ย ย ย ย ๐Ÿ’ผ 7.1.1.5 Ensure that Network Security Group Flow logs are captured and sent to Log Analytics (Manual)1
ย ย ย ย ๐Ÿ’ผ 7.1.1.6 Ensure that logging for Azure AppService 'HTTP logs' is enabled (Automated)1
ย ย ย ย ๐Ÿ’ผ 7.1.1.7 Ensure that virtual network flow logs are captured and sent to Log Analytics (Manual)1
ย ย ย ย ๐Ÿ’ผ 7.1.1.8 Ensure that a Microsoft Entra diagnostic setting exists to send Microsoft Graph activity logs to an appropriate destination (Manual)1
ย ย ย ย ๐Ÿ’ผ 7.1.1.9 Ensure that a Microsoft Entra diagnostic setting exists to send Microsoft Entra activity logs to an appropriate destination (Manual)1
ย ย ย ย ๐Ÿ’ผ 7.1.1.10 Ensure that Intune logs are captured and sent to Log Analytics (Manual)1
๐Ÿ’ผ 7.1.2 Monitoring using Activity Log Alerts11
ย ย ย ย ๐Ÿ’ผ 7.1.2.1 Ensure that Activity Log Alert exists for Create Policy Assignment (Automated)1
ย ย ย ย ๐Ÿ’ผ 7.1.2.2 Ensure that Activity Log Alert exists for Delete Policy Assignment (Automated)1
ย ย ย ย ๐Ÿ’ผ 7.1.2.3 Ensure that Activity Log Alert exists for Create or Update Network Security Group (Automated)1
ย ย ย ย ๐Ÿ’ผ 7.1.2.4 Ensure that Activity Log Alert exists for Delete Network Security Group (Automated)1
ย ย ย ย ๐Ÿ’ผ 7.1.2.5 Ensure that Activity Log Alert exists for Create or Update Security Solution (Automated)1
ย ย ย ย ๐Ÿ’ผ 7.1.2.6 Ensure that Activity Log Alert exists for Delete Security Solution (Automated)1
ย ย ย ย ๐Ÿ’ผ 7.1.2.7 Ensure that Activity Log Alert exists for Create or Update SQL Server Firewall Rule (Automated)1
ย ย ย ย ๐Ÿ’ผ 7.1.2.8 Ensure that Activity Log Alert exists for Delete SQL Server Firewall Rule (Automated)1
ย ย ย ย ๐Ÿ’ผ 7.1.2.9 Ensure that Activity Log Alert exists for Create or Update Public IP Address rule (Automated)1
ย ย ย ย ๐Ÿ’ผ 7.1.2.10 Ensure that Activity Log Alert exists for Delete Public IP Address rule (Automated)1
ย ย ย ย ๐Ÿ’ผ 7.1.2.11 Ensure that an Activity Log Alert exists for Service Health (Automated)1
๐Ÿ’ผ 7.1.3 Configuring Application Insights1
ย ย ย ย ๐Ÿ’ผ 7.1.3.1 Ensure Application Insights are Configured (Automated)1
๐Ÿ’ผ 7.1.4 Ensure that Azure Monitor Resource Logging is Enabled for All Services that Support it (Manual)1
๐Ÿ’ผ 7.1.5 Ensure that SKU Basic/Consumption is not used on artifacts that need to be monitored (Particularly for Production Workloads) (Manual)1