Skip to main content

💼 7.1 Logging and Monitoring

  • ID: /frameworks/cis-azure-v4.0.0/07/01

Description​

This section covers security recommendations to follow for logging and monitoring policies on an Azure Subscription. Scoping: A necessary exercise for effective and efficient use of Logging and Monitoring For recommendations contained in this section, it is crucial that your organization consider and settle on the scope of application for each recommendation individually. The scope of application cannot be realistically written in a generic prescriptive way within these recommendations, so a scoping exercise is strongly recommended. A scoping exercise will help you determine which resources are "in scope" and will receive partial or complete logging and monitoring treatment, and which resources are "out of scope" and will not receive any logging and monitoring treatment. Your objectives with the scoping exercise should be to: • Produce a clear classification of resources • Understand the control requirements of any relevant security or compliance frameworks • Ensure the appropriate personnel can detect and react to threats • Ensure relevant resources have a historical register for accountability and investigation • Minimize alert fatigue and cost Release Environments provide a helpful context for understanding scope from a DevOps perspective. For example:

  1. Production Environment 2. Staging Environment 3. Testing Environment 4. Development Environment While resources considered in the scope of a Production Environment might have a full set of recommendations applied for logging and monitoring, other release environments might have a limited set of recommendations applied for the sake of accountability. The names of these environments and which resources are in the scope of each environment will vary from one organization to another.

Similar​

Sub Sections​

SectionSub SectionsInternal RulesPoliciesFlagsCompliance
💼 7.1.1 Configuring Diagnostic Settings1010no data
 💼 7.1.1.1 Ensure that a 'Diagnostic Setting' exists for Subscription Activity Logs (Manual)1no data
 💼 7.1.1.2 Ensure Diagnostic Setting captures appropriate categories (Automated)1no data
 💼 7.1.1.3 Ensure the storage account containing the container with activity logs is encrypted with Customer Managed Key (CMK) (Automated)1no data
 💼 7.1.1.4 Ensure that logging for Azure Key Vault is 'Enabled' (Automated)1no data
 💼 7.1.1.5 Ensure that Network Security Group Flow logs are captured and sent to Log Analytics (Manual)1no data
 💼 7.1.1.6 Ensure that logging for Azure AppService 'HTTP logs' is enabled (Automated)1no data
 💼 7.1.1.7 Ensure that virtual network flow logs are captured and sent to Log Analytics (Manual)1no data
 💼 7.1.1.8 Ensure that a Microsoft Entra diagnostic setting exists to send Microsoft Graph activity logs to an appropriate destination (Manual)1no data
 💼 7.1.1.9 Ensure that a Microsoft Entra diagnostic setting exists to send Microsoft Entra activity logs to an appropriate destination (Manual)1no data
 💼 7.1.1.10 Ensure that Intune logs are captured and sent to Log Analytics (Manual)1no data
💼 7.1.2 Monitoring using Activity Log Alerts1111no data
 💼 7.1.2.1 Ensure that Activity Log Alert exists for Create Policy Assignment (Automated)1no data
 💼 7.1.2.2 Ensure that Activity Log Alert exists for Delete Policy Assignment (Automated)1no data
 💼 7.1.2.3 Ensure that Activity Log Alert exists for Create or Update Network Security Group (Automated)1no data
 💼 7.1.2.4 Ensure that Activity Log Alert exists for Delete Network Security Group (Automated)1no data
 💼 7.1.2.5 Ensure that Activity Log Alert exists for Create or Update Security Solution (Automated)1no data
 💼 7.1.2.6 Ensure that Activity Log Alert exists for Delete Security Solution (Automated)1no data
 💼 7.1.2.7 Ensure that Activity Log Alert exists for Create or Update SQL Server Firewall Rule (Automated)1no data
 💼 7.1.2.8 Ensure that Activity Log Alert exists for Delete SQL Server Firewall Rule (Automated)1no data
 💼 7.1.2.9 Ensure that Activity Log Alert exists for Create or Update Public IP Address rule (Automated)1no data
 💼 7.1.2.10 Ensure that Activity Log Alert exists for Delete Public IP Address rule (Automated)1no data
 💼 7.1.2.11 Ensure that an Activity Log Alert exists for Service Health (Automated)1no data
💼 7.1.3 Configuring Application Insights11no data
 💼 7.1.3.1 Ensure Application Insights are Configured (Automated)1no data
💼 7.1.4 Ensure that Azure Monitor Resource Logging is Enabled for All Services that Support it (Manual)1no data
💼 7.1.5 Ensure that SKU Basic/Consumption is not used on artifacts that need to be monitored (Particularly for Production Workloads) (Manual)1no data