This InSpec Profile was created to facilitate testing and auditing of CIS Azure Benchmark
infrastructure and applications when validating compliancy with Center for Internet Security (CIS) Benchmark
requirements.
- Profile Version: 3.0.0
- Benchmark Date: 2024-09-05
- Benchmark Version: 3.0.0
This profile was developed to reduce the time it takes to perform a security check based upon the CIS Guidance from the Center for Internet Security (CIS).
The CIS Azure Foundation CIS Profile uses the InSpec open-source compliance validation language to support automation of the required compliance, security and policy testing for Assessment and Authorization (A&A) and Authority to Operate (ATO) decisions and Continuous Authority to Operate (cATO) processes.
The Azure CIS Benchmark includes security requirements for a Azure environment.
The Center for Internet Security, Inc. (CIS®) create and maintains a set of Critical Security Controls (CIS Controls) for applications, computer systems and networks.
The original benchmark document that serves as the basis for this automated testing profile can be found at the CIS Workbench website.
Your Azure admin may need to be contacted to obtain some of these credentials. The following credentials are needed, as highlighted by the train-pwsh documentation:
- client_id (id of client)
- tenant_id (id of tenant)
- client_secret (secret key for client)
- certificate_path (path on machine where authentication certificate is stored)
- certificate_password (password for certificate)
- organization (organization domain)
- sharepoint_admin_url (sharepoint url for admin)
- pwsh_path (path on machine where the PowerShell executable is stored)
Some details to create credentials if you are a Azure admin:
- Create an application registration within your account, which will provide you with the appropriate credentials to login such as Client ID and Tenant ID. You will need to create a Client Secret/Certificate as well. The following link provides more detail on how to setup an application registration: Application_Registration_Steps
Request your Azure admin for these permissions to Azure modules or enable these permissions if you are the admin:
- Microsoft Graph
- SecurityEvents.Read.All
- User.Read
- UserAuthenticationMethod.Read.All
- AuditLog.Read.All,
- Policy.Read.All
- Office 365 Exchange Online
- Exchange.ManageAsApp
- SharePoint
- Sites.FullControl.All
Inspec, train-pwsh, inspec-pwsh are already included as gems in this profile and should not need separate downloads. The profile just needs to be ran with bundle exec to ensure the gems are loaded.
It is also important to follow/understand the documentation for train-pwsh and inspec-pwsh that is linked above for this profile to run correctly. For context, the train-pwsh is the transport that is used to maintain a persistent connection with various PowerShell sessions. Meanwhile, inspec-pwsh is a resource pack that is used to connect controls using different modules to its corresponding session group (e.g. session for exchange, teams, exchange/graph, etc.). The documentation for inspec-pwsh has more detail about the resource pack.
Additionally, for train-pwsh, the organization field will also need to be defined as a environment variable named ORGANIZATION
as it is used in a profile. The train-pwsh documentation has more detail on how to create this environment variable. Additionally, it is important to note that train-pwsh is not being invoked using code in this profile, so the config.json file approach needs to be followed for train to run correctly. The documentation for train-pwsh goes into more detail on how to create the config.json and populate its contents with your Azure credentials that are used by this profile.
Ensure access and install the following PowerShell modules. The controls also have the module installation code when running the PowerShell queries for redundancy purposes:
Upon obtaining the right permissions/credentials and downloading the correct modules/software, test that these permissions work by running the o365_example_baseline profile available at the following link: O365 Profile. If the o365 profile runs correctly, then this profile should be able to ran correctly. The o365_example_baseline profile contains a subset of controls from this profile, and also leverages train-pwsh
and inspec-pwsh
. It should serve as a good test to ensure that train-pwsh
and inspec-pwsh
are working properly.
More details on how to use train-pwsh
and inspec-pwsh
are detailed below:
For maximum flexibility/accessibility, CINC Auditor (cinc-auditor
) is the executable program that should be used to run this testing profile.
CINC Auditor is the open-source packaged binary version of Chef InSpec, compiled by the CINC (CINC Is Not Chef) project in coordination with Chef using Chef's always-open-source InSpec source code. CINC Auditor and InSpec are built from the same source code and function identically, but CINC Auditor requires no license to use (which means it also does not come with any expectation of support from Chef).
For more information see CINC Home
It is intended and recommended that CINC Auditor and this profile executed from a "runner" host (such as a DevOps orchestration server, an administrative management system, or a developer's workstation/laptop) against the target. This can be any Unix/Linux/MacOS or Windows runner host, with access to the Internet.
Tip
For the best security of the runner, always install on the runner the latest version of CINC Auditor and any other supporting language components.
To install CINC Auditor on a UNIX/Linux/MacOS platform use the following command:
curl -L https://omnitruck.cinc.sh/install.sh | sudo bash -s -- -P cinc-auditor
To install CINC Auditor on a Windows platform (PowerShell) use the following command:
. { iwr -useb https://omnitruck.cinc.sh/install.ps1 } | iex; install -project cinc-auditor
To confirm successful install of CINC Auditor:
cinc-auditor -v
Latest versions and other installation options are available at CINC Auditor's website.
-
The latest
released
version of the profile is intended for use in A&A testing, as well as providing formal results to Authorizing Officials and Identity and Access Management (IAM)s. Please use thereleased
versions of the profile in these types of workflows. -
The
main
branch is a development branch that will become the next release of the profile. Themain
branch is intended for use in developing and testing merge requests for the next release of the profile, and is not intended be used for formal and ongoing testing on systems.
This profile uses InSpec Inputs to provide flexibility during testing. Inputs allow for customizing the behavior of Chef InSpec profiles.
InSpec Inputs are defined in the inspec.yml
file. The inputs
configured in this
file are profile definitions and defaults for the profile extracted from the profile
guidances and contain metadata that describe the profile, and shouldn't be modified.
InSpec provides several methods for customizing profile behaviors at run-time that does not require
modifying the inspec.yml
file itself (see Using Customized Inputs).
The following inputs are permitted to be configured in an inputs .yml
file (often named inputs.yml)
for the profile to run correctly on a specific environment, while still complying with the security
guidance document intent. This is important to prevent confusion when test results are passed downstream
to different stakeholders under the security guidance name used by this profile repository
For changes beyond the inputs cited in this section, users can create an organizationally-named overlay repository. For more information on developing overlays, reference the MITRE SAF Training
Example of tailoring Inputs While Still Complying with the security guidance document for the profile
Note
Inputs are variables that are referenced by control(s) in the profile that implement them.
They are declared (defined) and given a default value in the inspec.yml
file.
Customized inputs may be used at the CLI by providing an input file or a flag at execution time.
-
Using the
--input
flagExample:
[inspec or cinc-auditor] exec <my-profile.tar.gz> --input disable_slow_controls=true
-
Using the
--input-file
flag.Example:
[inspec or cinc-auditor] exec <my-profile.tar.gz> --input-file=<my_inputs_file.yml>
Tip
For additional information about input
file examples reference the MITRE SAF Training
Chef InSpec Resources:
The Gemfile provided contains all the necessary ruby dependencies for checking the profile controls.
All action are conducted using ruby
(gemstone/programming language). Currently inspec
commands have been tested with ruby version 3.1.2. A higher version of ruby is not guaranteed to
provide the expected results. Any modern distribution of Ruby comes with Bundler preinstalled by default.
Install ruby based on the OS being used, see Installing Ruby
After installing ruby
install the necessary dependencies by invoking the bundler command
(must be in the same directory where the Gemfile is located):
bundle install
Linting and validating controls:
bundle exec rake [inspec or cinc-auditor]:check # Validate the InSpec Profile
bundle exec rake lint # Run RuboCop Linter
bundle exec rake lint:auto_correct # Autocorrect RuboCop offenses (only when it's safe)
bundle exec rake pre_commit_checks # Pre-commit checks
Ensure the controls are ready to be committed into the repo:
bundle exec rake pre_commit_checks
Note: Replace the profile's directory name - e.g. - <Profile>
with .
if currently in the profile's root directory.
Note 2: The <Name of Dictionary Storing Pwsh Options>
will be pwsh-options
if exactly following train-pwsh documentation.
bundle exec cinc-auditor exec <Profile> -t pwsh://<Name of Dictionary Storing Pwsh Options> --controls=<control_id> --enhanced-outcomes --input-file=inputs.yml
bundle exec cinc-auditor exec <Profile> -t pwsh://<Name of Dictionary Storing Pwsh Options>> --controls=<control_id> --enhanced-outcomes --input-file=inputs.yml --reporter json:results.json
bundle exec cinc-auditor exec <Profile> -t pwsh://<Name of Dictionary Storing Pwsh Options>> --enhanced-outcomes --input-file=inputs.yml
bundle exec cinc-auditor exec <Profile> -t pwsh://<Name of Dictionary Storing Pwsh Options>> --enhanced-outcomes --input-file=inputs.yml --reporter json:results.json
The JSON results output file can be loaded into Heimdall-Lite or Heimdall-Server for a user-interactive, graphical view of the profile scan results.
Heimdall-Lite is a browser only
viewer that allows you to easily view your results directly and locally rendered in your browser.
Heimdall-Server is configured with a data-services backend
allowing for data persistency to a database (PostgreSQL).
For more detail on feature capabilities see Heimdall Features
Heimdall can export your results into a DISA Checklist (CKL) file for easily uploading into eMass using the Heimdall Export
function.
Depending on your environment restrictions, the SAF CLI can be used to run a local docker instance
of Heimdall-Lite via the saf view:heimdall
command.
Additionally both Heimdall applications can be deployed via docker, kubernetes, or the installation packages.
This profile evaluates the Azure CIS Benchmark compliance of the following Azure administrative centers by evaluating their setting configurations:
- Azure Admin Center
- Azure Defender
- Microsoft Purview
- Microsoft Entra Admin Center
- Microsoft Exchange Admin Center
- Microsoft SharePoint Admin Center
- Microsoft Fabric
Not all controls in the CIS Benchmark are capable of automated assessment. The table below marks which controls are automated and which ones are manual.
Number | Description | Automatable | Implementation |
---|---|---|---|
2 | Identity | - | - |
2.1 | Security Defaults (Per-User MFA) | - | - |
2.1.1 | Ensure Security Defaults is enabled on Microsoft Entra ID (Manual) | No | - |
2.1.2 | Ensure that Multi-Factor Auth Status is Enabled for all Privileged Users (Manual) | Half | REST API to audit |
2.1.3 | Ensure that Multi-Factor Auth Status is Enabled for all Non-Privileged Users (Manual) | Half | REST API to audit |
2.1.4 | Ensure that Allow users to remember multi-factor authentication on devices they trust is Disabled (Manual) | No | - |
- | - | - | - |
2.2 | Conditional Access | - | - |
2.2.1 | Ensure Trusted Locations Are Defined (Manual) | Yes | Powershell |
2.2.2 | Ensure that an exclusionary Geographic Access Policy is considered (Manual) | Yes | Powershell |
2.2.3 | Ensure that an exclusionary Device code flow policy is considered (Manual) | No | - |
2.2.4 | Ensure that A Multi-factor Authentication Policy Exists for Administrative Groups (Manual) | No | - |
2.2.5 | Ensure that A Multi-factor Authentication Policy Exists for All Users (Manual) | No | - |
2.2.6 | Ensure Multi-factor Authentication is Required for Risky Sign-ins (Manual) | No | - |
2.2.7 | Ensure Multi-factor Authentication is Required for Windows Azure Service Management API (Manual) | No | - |
2.2.8 | Ensure Multi-factor Authentication is Required to access Microsoft Admin Portals (Manual) | No | - |
- | - | - | - |
2.3 | Ensure that Restrict non-admin users from creating tenants is set to Yes (Automated) | Yes | Powershell |
2.4 | Ensure Guest Users Are Reviewed on a Regular Basis (Manual) | Yes | Azure CLI or Powershell |
2.5 | Ensure That Number of methods required to reset is set to 2 (Manual) | No | - |
2.6 | Ensure that account Lockout Threshold is less than or equal to 10 (Manual) | No | - |
2.7 | Ensure that account Lockout duration in seconds is greater than or equal to 60 (Manual) | No | - |
2.8 | Ensure that a Custom Bad Password List is set to Enforce for your Organization (Manual) | No | - |
2.9 | Ensure that Number of days before users are asked to re-confirm their authentication information is not set to 0 (Manual) | No | - |
2.10 | Ensure that Notify users on password resets? is set to Yes (Manual) | No | - |
2.11 | Ensure That Notify all admins when other admins reset their password? is set to Yes (Manual) | No | - |
2.12 | Ensure User consent for applications is set to Do not allow user consent (Manual) | Half | Powershell to audit |
2.13 | Ensure User consent for applications Is Set To Allow for Verified Publishers (Manual) | Half | Powershell to audit |
2.14 | Ensure That Users Can Register Applications Is Set to No (Automated) | Yes | Powershell |
2.15 | Ensure That Guest users access restrictions is set to Guest user access is restricted to properties and memberships of their own directory objects (Automated) | Yes | Powershell |
2.16 | Ensure that Guest invite restrictions is set to Only users assigned to specific admin roles can invite guest users (Automated) | Yes | Powershell |
2.17 | Ensure That Restrict access to Microsoft Entra admin center is Set to Yes (Manual) | No | - |
2.18 | Ensure that Restrict user ability to access groups features in the Access Pane is Set to Yes (Manual) | No | - |
2.19 | Ensure that Users can create security groups in Azure portals, API or PowerShell is set to No (Manual) | No | - |
2.20 | Ensure that Owners can manage group membership requests in My Groups is set to No (Manual) | No | - |
2.21 | Ensure that Users can create Microsoft 365 groups in Azure portals, API or PowerShell is set to No (Manual) | No | - |
2.22 | Ensure that Require Multifactor Authentication to register or join devices with Microsoft Entra is set to Yes (Manual) | No | - |
2.23 | Ensure That No Custom Subscription Administrator Roles Exist (Automated) | Yes | Azure CLI or Powershell |
2.24 | Ensure a Custom Role is Assigned Permissions for Administering Resource Locks (Manual) | Half | Powershell to remediate |
2.25 | Ensure That Subscription leaving Microsoft Entra tenant and Subscription entering Microsoft Entra tenant Is Set To Permit no one (Manual) | No | - |
2.26 | Ensure fewer than 5 users have global administrator assignment (Manual) | No | - |
- | - | - | - |
3 | Security | - | - |
3.1 | Microsoft Defender for Cloud | - | - |
3.1.1 | Microsoft Cloud Security Posture Management (CSPM) | - | - |
3.1.1.1 | Ensure that Auto provisioning of Log Analytics agent for Azure VMs is Set to On (Automated) | Yes | Azure CLI or Powershell |
3.1.1.2 | Ensure that Microsoft Defender for Cloud Apps integration with Microsoft Defender for Cloud is Selected (Automated) | Yes | Azure CLI or Powershell |
3.1.2 | Defender Plan: APIs | - | - |
3.1.3 | Defender Plan: Servers | - | - |
3.1.3.1 | Ensure That Microsoft Defender for Servers Is Set to On (Automated) | Yes | Azure CLI or Powershell |
3.1.3.2 | Ensure that Vulnerability assessment for machines component status is set to On (Manual) | No | - |
3.1.3.3 | Ensure that Endpoint protection component status is set to On (Manual) | Yes | Azure CLI or Powershell |
3.1.3.4 | Ensure that Agentless scanning for machines component status is set to On (Manual) | No | - |
3.1.3.5 | Ensure that File Integrity Monitoring component status is set to On (Manual) | No | - |
3.1.4 | Defender Plan: Containers | - | - |
3.1.4.1 | Ensure That Microsoft Defender for Containers Is Set To On (Automated) | Yes | Azure CLI or Powershell |
3.1.4.2 | Ensure that Agentless discovery for Kubernetes component status is On (Automated) | No | - |
3.1.4.3 | Ensure that Agentless container vulnerability assessment component status is On (Automated) | No | - |
3.1.5 | Defender Plan: Storage | - | - |
3.1.5.1 | Ensure That Microsoft Defender for Storage Is Set To On (Automated) | Yes | Azure CLI or Powershell |
3.1.6 | Defender Plan: App Service | - | - |
3.1.6.1 | Ensure That Microsoft Defender for App Services Is Set To On (Automated) | Yes | Azure CLI or Powershell |
3.1.7 | Defender Plan: Databases | - | - |
3.1.7.1 | Ensure That Microsoft Defender for Azure Cosmos DB Is Set To On (Automated) | Yes | Azure CLI or Powershell |
3.1.7.2 | Ensure That Microsoft Defender for Open-Source Relational Databases Is Set To On (Automated) | Yes | Azure CLI or Powershell |
3.1.7.3 | Ensure That Microsoft Defender for (Managed Instance) Azure SQL Databases Is Set To On (Automated) | Yes | Azure CLI or Powershell |
3.1.7.4 | Ensure That Microsoft Defender for SQL Servers on Machines Is Set To On (Automated) | Yes | Azure CLI or Powershell |
3.1.8 | Defender Plan: Key Vault | - | - |
3.1.8.1 | Ensure That Microsoft Defender for Key Vault Is Set To On (Automated) | Yes | Azure CLI or Powershell |
3.1.9 | Defender Plan: Resource Manager | - | - |
3.1.9.1 | Ensure That Microsoft Defender for Resource Manager Is Set To On (Automated) | Yes | Azure CLI or Powershell |
3.1.10 | Ensure that Microsoft Defender Recommendation for Apply system updates status is Completed (Automated) | No | - |
3.1.11 | Ensure that Microsoft Cloud Security Benchmark policies are not set to Disabled (Manual) | No | - |
3.1.12 | Ensure That All users with the following roles is set to Owner (Automated) | Yes | Azure CLI |
3.1.13 | Ensure Additional email addresses is Configured with a Security Contact Email (Automated) | Yes | Azure CLI |
3.1.14 | Ensure That Notify about alerts with the following severity is Set to High (Automated) | Yes | Azure CLI |
3.1.15 | Ensure that Microsoft Defender External Attack Surface Monitoring (EASM) is enabled (Manual) | No | - |
3.1.16 | [LEGACY] Ensure That Microsoft Defender for DNS Is Set To On (Automated) | Yes | Azure CLI or Powershell |
- | - | - | - |
3.2 | Microsoft Defender for IoT | - | - |
3.2.1 | Ensure That Microsoft Defender for IoT Hub Is Set To On (Manual) | No | - |
- | - | - | - |
3.3 | Key Vault | - | - |
3.3.1 | Ensure that the Expiration Date is set for all Keys in RBAC Key Vaults (Automated) | Yes | Azure CLI or Powershell |
3.3.2 | Ensure that the Expiration Date is set for all Keys in Non-RBAC Key Vaults (Automated) | Yes | Azure CLI or Powershell |
3.3.3 | Ensure that the Expiration Date is set for all Secrets in RBAC Key Vaults (Automated) | Yes | Azure CLI or Powershell |
3.3.4 | Ensure that the Expiration Date is set for all Secrets in Non-RBAC Key Vaults (Automated) | Yes | Azure CLI or Powershell |
3.3.5 | Ensure the Key Vault is Recoverable (Automated) | Yes | Azure CLI or Powershell |
3.3.6 | Enable Role Based Access Control for Azure Key Vault (Automated) | Yes | Azure CLI or Powershell |
3.3.7 | Ensure that Private Endpoints are Used for Azure Key Vault (Automated) | Yes | Azure CLI or Powershell |
3.3.8 | Ensure Automatic Key Rotation is Enabled Within Azure Key Vault for the Supported Services (Automated) | Yes | Azure CLI or Powershell |
- | - | - | - |
4 | Storage Accounts | - | - |
4.1 | Ensure that Secure transfer required is set to Enabled (Automated) | Yes | Azure CLI |
4.2 | Ensure that Enable Infrastructure Encryption for Each Storage Account in Azure Storage is Set to Enabled (Automated) | Yes | Azure CLI or Powershell |
4.3 | Ensure that Enable key rotation reminders is enabled for each Storage Account (Manual) | Yes | Azure CLI and Powershell |
4.4 | Ensure that Storage Account Access Keys are Periodically Regenerated (Manual) | Half | Azure CLI |
4.5 | Ensure that Shared Access Signature Tokens Expire Within an Hour (Manual) | No | - |
4.6 | Ensure that Public Network Access is Disabled for storage accounts (Automated) | Yes | Azure CLI and Powershell |
4.7 | Ensure Default Network Access Rule for Storage Accounts is Set to Deny (Automated) | Yes | Azure CLI |
4.8 | Ensure Allow Azure services on the trusted services list to access this storage account is Enabled for Storage Account Access (Automated) | Yes | Azure CLI and Powershell |
4.9 | Ensure Private Endpoints are used to access Storage Accounts (Automated) | Yes | Azure CLI or Powershell |
4.10 | Ensure Soft Delete is Enabled for Azure Containers and Blob Storage (Automated) | Yes | Azure CLI |
4.11 | Ensure Storage for Critical Data are Encrypted with Customer Managed Keys (CMK) (Manual) | Half | Powershell |
4.12 | Ensure Storage Logging is Enabled for Queue Service for Read, Write, and Delete requests (Automated) | Yes | Azure CLI |
4.13 | Ensure Storage logging is Enabled for Blob Service for Read, Write, and Delete requests (Automated) | Yes | Azure CLI |
4.14 | Ensure Storage Logging is Enabled for Table Service for Read, Write, and Delete Requests (Automated) | Yes | Azure CLI |
4.15 | Ensure the Minimum TLS version for storage accounts is set to Version 1.2 (Automated) | Yes | Azure CLI or Powershell |
4.16 | Ensure Cross Tenant Replication is not enabled (Automated) | Yes | Azure CLI |
4.17 | Ensure that Allow Blob Anonymous Access is set to Disabled (Automated) | Yes | Azure CLI and Powershell |
- | - | - | - |
5 | Database Services | - | - |
5.1 | Azure SQL Database | - | - |
5.1.1 | Ensure that 'Auditing' is set to 'On' | Yes | Powershell |
5.1.2 | Ensure no Azure SQL Databases allow ingress from 0.0.0.0/0 (ANY IP) | Yes | Azure CLI or Powershell |
5.1.3 | Ensure SQL server's Transparent Data Encryption (TDE) protector is encrypted with Customer-managed key | Yes | Azure CLI or Powershell |
5.1.4 | Ensure that Microsoft Entra authentication is Configured for SQL Servers | Yes | Azure CLI or Powershell |
5.1.5 | Ensure that 'Data encryption' is set to 'On' on a SQL Database | Yes | Azure CLI or Powershell |
5.1.6 | Ensure that 'Auditing' Retention is 'greater than 90 days' | Yes | Powershell |
5.1.7 | Ensure Public Network Access is Disabled | No | - |
- | - | - | - |
5.2 | Azure Database for PostgreSQL | - | - |
5.2.1 | Ensure server parameter 'require_secure_transport' is set to 'ON' for PostgreSQL flexible server | Yes | Azure CLI or Powershell |
5.2.2 | Ensure server parameter 'log_checkpoints' is set to 'ON' for PostgreSQL flexible server | Yes | Azure CLI or Powershell |
5.2.3 | Ensure server parameter 'connection_throttle.enable' is set to 'ON' for PostgreSQL flexible server | Yes | Azure CLI or Powershell |
5.2.4 | Ensure server parameter 'logfiles.retention_days' is greater than 3 days for PostgreSQL flexible server | Yes | Azure CLI or Powershell |
5.2.5 | Ensure 'Allow public access from any Azure service within Azure to this server' for PostgreSQL flexible server is disabled | Yes | Azure CLI or Powershell |
5.2.6 | [LEGACY] Ensure server parameter 'log_connections' is set to 'ON' for PostgreSQL single server | Yes | Azure CLI or Powershell |
5.2.7 | [LEGACY] Ensure server parameter 'log_disconnections' is set to 'ON' for PostgreSQL single server | Yes | Azure CLI or Powershell |
5.2.8 | [LEGACY] Ensure 'Infrastructure double encryption' for PostgreSQL single server is 'Enabled' | Yes | Azure CLI |
- | - | - | - |
5.3 | Azure Database for MySQL | - | - |
5.3.1 | Ensure server parameter 'require_secure_transport' is set to 'ON' for MySQL flexible server | Yes | Azure CLI or Powershell |
5.3.2 | Ensure server parameter 'tls_version' is set to 'TLSv1.2' (or higher) for MySQL flexible server | Yes | Azure CLI or Powershell |
5.3.3 | Ensure server parameter 'audit_log_enabled' is set to 'ON' for MySQL flexible server | Yes | Azure CLI or Powershell |
5.3.4 | Ensure server parameter 'audit_log_events' has 'CONNECTION' set for MySQL flexible server | Yes | Azure CLI or Powershell |
- | - | - | - |
5.4 | Azure Cosmos DB | - | - |
5.4.1 | Ensure That 'Firewalls & Networks' Is Limited to Use Selected Networks Instead of All Networks | Yes | Azure CLI |
5.4.2 | Ensure That Private Endpoints Are Used Where Possible | No | - |
5.4.3 | Use Entra ID Client Authentication and Azure RBAC where possible | Yes | Powershell |
- | - | - | - |
6 | Logging and Monitoring | - | - |
6.1.1 | Ensure that a 'Diagnostic Setting' exists for Subscription Activity Logs | Yes | Azure CLI or Powershell |
6.1.2 | Ensure Diagnostic Setting captures appropriate categories | Yes | Azure CLI or Powershell |
6.1.3 | Ensure the storage account containing the container with activity logs is encrypted with Customer Managed Key (CMK) | Yes | Azure CLI or Powershell |
6.1.4 | Ensure that logging for Azure Key Vault is 'Enabled' | Yes | Azure CLI or Powershell |
6.1.5 | Ensure that Network Security Group Flow logs are captured and sent to Log Analytics | No | - |
6.1.6 | Ensure that logging for Azure AppService 'HTTP logs' is enabled | No | - |
- | - | - | - |
6.2 | Monitoring using Activity Log Alerts | - | - |
6.2.1 | Ensure that Activity Log Alert exists for Create Policy Assignment | Yes | Azure CLI or Powershell |
6.2.2 | Ensure that Activity Log Alert exists for Delete Policy Assignment | Yes | Azure CLI or Powershell |
6.2.3 | Ensure that Activity Log Alert exists for Create or Update Network Security Group | Yes | Azure CLI or Powershell |
6.2.4 | Ensure that Activity Log Alert exists for Delete Network Security Group | Yes | Azure CLI or Powershell |
6.2.5 | Ensure that Activity Log Alert exists for Create or Update Security Solution | Yes | Azure CLI or Powershell |
6.2.6 | Ensure that Activity Log Alert exists for Delete Security Solution | Yes | Azure CLI or Powershell |
6.2.7 | Ensure that Activity Log Alert exists for Create or Update SQL Server Firewall Rule | Yes | Azure CLI or Powershell |
6.2.8 | Ensure that Activity Log Alert exists for Delete SQL Server Firewall Rule | Yes | Azure CLI or Powershell |
6.2.9 | Ensure that Activity Log Alert exists for Create or Update Public IP Address rule | Yes | Azure CLI or Powershell |
6.2.10 | Ensure that Activity Log Alert exists for Delete Public IP Address rule | Yes | Azure CLI or Powershell |
- | - | - | - |
6.3 | Configuring Application Insights | - | - |
6.3.1 | Ensure Application Insights are Configured | Yes | Azure CLI or Powershell |
6.4 | Ensure that Azure Monitor Resource Logging is Enabled for All Services that Support it | Yes | Azure CLI or Powershell |
6.5 | Ensure that SKU Basic/Consumption is not used on artifacts that need to be monitored (Particularly for Production Workloads) | Yes | Azure CLI or Powershell |
- | - | - | - |
7 | Networking | - | - |
7.1 | Ensure that RDP access from the Internet is evaluated and restricted | Yes | Azure CLI |
7.2 | Ensure that SSH access from the Internet is evaluated and restricted | Yes | Azure CLI |
7.3 | Ensure that UDP access from the Internet is evaluated and restricted | Yes | Azure CLI |
7.4 | Ensure that HTTP(S) access from the Internet is evaluated and restricted | Yes | Azure CLI |
7.5 | Ensure that Network Security Group Flow Log retention period is 'greater than 90 days' | Yes | Azure CLI |
7.6 | Ensure that Network Watcher is 'Enabled' for Azure Regions that are in use | Yes | Azure CLI |
7.7 | Ensure that Public IP addresses are Evaluated on a Periodic Basis | Yes | Azure CLI |
- | - | - | - |
8 | Virtual Machines | - | - |
8.1 | Ensure an Azure Bastion Host Exists | Yes | Azure CLI or Powershell |
8.2 | Ensure Virtual Machines are utilizing Managed Disks | Yes | Powershell |
8.3 | Ensure that 'OS and Data' disks are encrypted with Customer Managed Key (CMK) | Yes | Powershell |
8.4 | Ensure that 'Unattached disks' are encrypted with 'Customer Managed Key' (CMK) | Yes | Azure CLI |
8.5 | Ensure that 'Disk Network Access' is NOT set to 'Enable public access from all networks' | Yes | Azure CLI or Powershell |
8.6 | Ensure that 'Enable Data Access Authentication Mode' is 'Checked' | Yes | Azure CLI or Powershell |
8.7 | Ensure that Only Approved Extensions Are Installed | Yes | Azure CLI or Powershell |
8.8 | Ensure that Endpoint Protection for all Virtual Machines is installed | Yes | Azure CLI or Powershell |
8.9 | [Legacy] Ensure that VHDs are Encrypted | Yes | Azure CLI or Powershell |
8.10 | Ensure only MFA enabled identities can access privileged Virtual Machine | No | - |
8.11 | Ensure Trusted Launch is enabled on Virtual Machines | No | - |
- | - | - | - |
9 | AppService | - | - |
9.1 | Ensure 'HTTPS Only' is set to 'On' | Yes | Azure CLI or Powershell |
9.2 | Ensure App Service Authentication is set up for apps in Azure App Service | Yes | Azure CLI |
9.3 | Ensure 'FTP State' is set to 'FTPS Only' or 'Disabled' | Yes | Azure CLI or Powershell |
9.4 | Ensure Web App is using the latest version of TLS encryption | Yes | Azure CLI or Powershell |
9.5 | Ensure that Register with Entra ID is enabled on App Service | Yes | Azure CLI or Powershell |
9.6 | Ensure that 'Basic Authentication' is 'Disabled' | No | - |
9.7 | Ensure that 'PHP version' is currently supported (if in use) | Yes | Azure CLI or Powershell |
9.8 | Ensure that 'Python version' is currently supported (if in use) | Yes | Azure CLI or Powershell |
9.9 | Ensure that 'Java version' is currently supported (if in use) | Yes | Azure CLI or Powershell |
9.10 | Ensure that 'HTTP20enabled' is set to 'true' (if in use) | Yes | Azure CLI or Powershell |
9.11 | Ensure Azure Key Vaults are Used to Store Secrets | Yes | Azure CLI or Powershell |
9.12 | Ensure that 'Remote debugging' is set to 'Off' | Yes | Azure CLI or Powershell |
- | - | - | - |
10 | Miscellaneous | - | - |
10.1 | Ensure that Resource Locks are set for Mission-Critical Azure Resources (Manual) | Yes | Azure CLI or Powershell |
- | - | - | - |
- | - | Number of Automatable | 70 |
- | - | Number of Half-Automatable | 7 |
- | - | Number of Non-automatable | 40 |
- | - | - | - |
- | - | Total Number of Controls | 117 |
For any controls marked as 'Manual', please refer to the following following at SAF-CLI on how to apply manual attestations to the output of an automated assessment. The following link that references the SAF-CLI is also useful.
Center for Internet Security (CIS)
MITRE Security Automation Framework Team
© 2018-2025 The MITRE Corporation.
Approved for Public Release; Distribution Unlimited. Case Number 18-3678.
MITRE hereby grants express written permission to use, reproduce, distribute, modify, and otherwise leverage this software to the extent permitted by the licensed terms provided in the LICENSE.md file included with this project.
This software was produced for the U. S. Government under Contract Number HHSM-500-2012-00008I, and is subject to Federal Acquisition Regulation Clause 52.227-14, Rights in Data-General.
No other use other than that granted to the U. S. Government, or to those acting on behalf of the U. S. Government under that Clause is authorized without the express written permission of The MITRE Corporation.
For further information, please contact The MITRE Corporation, Contracts Management Office, 7515 Colshire Drive, McLean, VA 22102-7539, (703) 983-6000.
CIS Benchmarks are published by Center for Internet Security