lacework-global-616
3.5 Ensure Storage Logging is Enabled for Queue Service for 'Read', 'Write', and 'Delete' requests (Manual)
note
This rule has been changed to manual, see Permanently Manual Rules for CIS Azure 1.5.0 for details.
Profile Applicability
• Level 2
Description
The Storage Queue service stores messages that may be read by any client who has access to the storage account. A queue can contain an unlimited number of messages, each of which can be up to 64KB in size using version 2011-08-18 or newer. Storage Logging happens server-side and allows details for both successful and failed requests to be recorded in the storage account. These logs allow users to see the details of read, write, and delete operations against the queues. Storage Logging log entries contain the following information about individual requests: Timing information such as start time, end-to-end latency, and server latency, authentication details, concurrency information, and the sizes of the request and response messages.
Rationale
Storage Analytics logs contain detailed information about successful and failed requests to a storage service. This information can be used to monitor individual requests and to diagnose issues with a storage service. Requests are logged on a best-effort basis.
Storage Analytics logging is not enabled by default for your storage account.
Impact
Enabling this setting can have a high impact on the cost of the log analytics service and data storage used by logging more data per each request. Do not enable this without determining your need for this level of logging, and do not forget to check in on data usage and projected cost. Some users have seen their logging costs increase from $10 per month to $10,000 per month.
Audit
From Azure Portal
- Go to
Storage Accounts
. - Select the specific Storage Account.
- Click the
Diagnostics settings (classic)
blade fromMonitoring (classic)
section. - Ensure the
Status
is set toOn
, if set toOff
. - Select
Queue properties
. - Ensure
Read
Write
Delete
options are selected under theLogging
section.
From Azure CLI
Ensure the below command's output contains properties delete
, read
and write
set to true
.
az storage logging show --services q --account-name <storageAccountName>
Remediation
From Azure Portal
- Go to
Storage Accounts
. - Select the specific Storage Account.
- Click the
Diagnostics settings (classic)
blade fromMonitoring (classic)
section. - Set the
Status
toOn
, if set toOff
. - Select
Queue properties
. - Select
Read
,Write
andDelete
options under theLogging
section to enable Storage Logging for Queue service.
From Azure CLI
Use the below command to enable the Storage Logging for Queue service.
az storage logging update --account-name <storageAccountName> --account-key <storageAccountKey> --services q --log rwd --retention 90
References
https://docs.microsoft.com/en-us/rest/api/storageservices/about-storage-analytics-logging
https://docs.microsoft.com/en-us/cli/azure/storage/logging?view=azure-cli-latest
https://docs.microsoft.com/en-us/security/benchmark/azure/security-controls-v3-logging-threat-detection#lt-4-enable-logging-for-azure-resources
https://docs.microsoft.com/en-us/azure/storage/queues/monitor-queue-storage?tabs=azure-portal
Additional Information
We cannot practically generalize detailed audit log requirements for every queue due to their nature and intent. This recommendation may be applicable to storage account queue services where the security is paramount.