Skip to main content

CIS Azure 1.5.0 Benchmark Report

This report co-exists with the older CIS benchmark reports for Microsoft Azure. The older CIS benchmark reports are deprecated and will eventually be removed. You should migrate to the latest report soon.

info

For information about compliance assessment differences between CIS Azure 1.3.1 and 1.5.0, see CIS Azure 1.3.1 to 1.5.0.

Changes to Benchmark Reports in the Lacework Console

Due to changes in the Lacework Console, visibility of and interaction with the CIS Azure 1.5.0 benchmark is different from previous CIS reports.

The notable changes are outlined below:

  • All CIS 1.5.0 benchmark policies are enabled or disabled through the Policies page (see Enable the CIS Azure 1.5.0 Benchmark).
  • The Compliance > Azure > Reports page does not list this report, but will continue to list and display results for the older CIS Azure benchmark reports.
  • The Cloud Compliance Dashboard provides details for each assessment, including the CIS Azure 1.5.0 report.
  • The Reports page lists all reports that have been run in your environment, including a 90-day history for each report type on all your integrated accounts. The summary for each report can be viewed in the Console, and downloaded in PDF format. See Reports for information.
tip

See Reports and Use Cases for Cloud Compliance Dashboard for guidance on viewing similar sections and data.

Prerequisites

The following articles describe how to integrate your Azure environment with the Lacework Compliance platform. Completing these will prepare your environment for the CIS Azure 1.5.0 benchmark.

  1. Prepare for Azure Integration

    1. Determine your Azure Integration Type
      • The setup for the Configuration integration type must be completed in order to use the Lacework Compliance platform.
    2. Create an Azure App for Integration
    3. Gather Azure Client ID, Tenant ID, and Client Secret
  2. Choose one of the following options:

Previous Integrations using Terraform

If you have previously integrated Azure with Lacework using Terraform, re-run terraform init -upgrade, followed by terraform apply to upgrade modules.

Enable the CIS Azure 1.5.0 Benchmark

All policies in the CIS AWS 1.4.0 benchmark are enabled by default. You can disable or enable them as follows.

Enable or Disable Policies through the Lacework Console

On the Policies page, use the framework:cis-azure-1-5-0 tag to filter for CIS Azure 1.5.0 policies only.

You can enable or disable individual policies using its status toggle: policy-status-toggle.png

Alternatively, see Batch Update Policies to enable or disable multiple policies at once.

note

Manual policies do not have a status toggle as there is no functional check to enable.

Bulk Enable or Disable Policies through the Lacework CLI

Enable or disable all the CIS Azure 1.5.0 policies by using the following commands in the Lacework CLI:

Enable all policies
lacework policy enable --tag framework:cis-azure-1-5-0
Disable all policies
lacework policy disable --tag framework:cis-azure-1-5-0
tip

If you have not set up the CLI before, see the Lacework CLI guide to get started.

Automated vs Manual Rules

Lacework uses the CIS Workbench Benchmarks to automate your Compliance rules where it is possible to do so. 'Manual' rule types cannot be assessed end-to-end by Lacework platform, and must be left for you to follow the auditing procedure.

For some benchmark rules, it is not possible to automate the checks in an Azure environment. As such, manual auditing of these rules in your Azure environment is required.

Manual Rules (that were deemed automated)

The following table outlines a number of CIS Azure 1.5.0 rules that cannot yet be automated (they were deemed as "automated" by CIS). As such, manual auditing of these rules in your Azure environment is required.

info

Lacework intends to automate these rules in a future release.

CIS Azure 1.5.0 Control IDLacework Policy IDTitle
4.1.1lacework-global-537Ensure that 'Auditing' is set to 'On'.
4.1.6lacework-global-541Ensure that 'Auditing' Retention is 'greater than 90 days'.

Permanently Manual Rules (that were deemed automated)

The following table outlines rules that were deemed automated by CIS, but will remain manual:

note

For sections 2.2 and 2.3, see 2 - Microsoft Defender for Cloud for additional details.

CIS Azure 1.5.0 Control IDLacework Policy IDTitle
2.2.1lacework-global-524Ensure that Auto provisioning of 'Log Analytics agent for Azure VMs' is Set to 'On'.
2.2.2lacework-global-611Ensure that Auto provisioning of 'Vulnerability assessment for machines' is Set to 'On'.
2.2.3lacework-global-612Ensure that Auto provisioning of 'Microsoft Defender for Containers components' is Set to 'On'.
2.3.1lacework-global-525Ensure That 'All users with the following roles' is set to 'Owner'.
2.3.2lacework-global-526Ensure 'Additional email addresses' is Configured with a Security Contact Email.
2.3.3lacework-global-527Ensure That 'Notify about alerts with the following severity' is Set to 'High'.
3.5lacework-global-616Ensure Storage Logging is Enabled for Queue Service for 'Read', 'Write', and 'Delete' requests.
3.11lacework-global-535Ensure Soft Delete is Enabled for Azure Containers and Blob Storage.
3.13lacework-global-619Ensure Storage logging is Enabled for Blob Service for 'Read', 'Write', and 'Delete' requests.
3.14lacework-global-620Ensure Storage Logging is Enabled for Table Service for 'Read', 'Write', and 'Delete' Requests.
5.1.3lacework-global-556Ensure the Storage Container Storing the Activity Logs is not Publicly Accessible.
5.1.4lacework-global-630Ensure the storage account containing the container with activity logs is encrypted with Customer Managed Key.

Automated Rules (that were deemed manual)

In some cases, Lacework is able to automate certain CIS Azure 1.5.0 benchmark rules that were deemed as manual by CIS. The following table outlines these rules:

CIS Azure 1.5.0 Control IDLacework Policy IDTitle
3.2lacework-global-615Ensure that ‘Enable Infrastructure Encryption’ for Each Storage Account in Azure Storage is Set to ‘enabled’.
3.10lacework-global-534Ensure Private Endpoints are used to access Storage Accounts.
4.3.7lacework-global-549Ensure 'Allow access to Azure services' for PostgreSQL Database Server is disabled.
4.5.1lacework-global-628Ensure That 'Firewalls & Networks' Is Limited to Use Selected Networks Instead of All Networks.
4.5.2lacework-global-629Ensure That Private Endpoints Are Used Where Possible.
6.6lacework-global-634Ensure that Network Watcher is 'Enabled'.
7.1lacework-global-573Ensure Virtual Machines are utilizing Managed Disks.
8.6lacework-global-639Enable Role Based Access Control for Azure Key Vault.
8.7lacework-global-640Ensure that Private Endpoints are Used for Azure Key Vault.

Rules that are pending automation

Lacework intends to automate the policies listed below in a future release. All of these were deemed as manual by CIS.

CIS Azure 1.5.0 Control IDLacework Policy IDTitle
5.1.6lacework-global-631Ensure that Network Security Group Flow logs are captured and sent to Log Analytics.
8.8lacework-global-641Ensure Automatic Key Rotation is Enabled Within Azure Key Vault for the Supported Services.

Unimplemented Policies

The following policies are not yet implemented into our Compliance platform. Lacework will be adding these policies soon.

All policies listed in the table below are intended to be automated once released:

CIS Azure 1.5.0 Control IDLacework Policy IDTitle
8.1lacework-global-575Ensure that the Expiration Date is set for all Keys in RBAC Key Vaults.
8.2lacework-global-576Ensure that the Expiration Date is set for all Keys in Non-RBAC Key Vaults.
8.3lacework-global-577Ensure that the Expiration Date is set for all Secrets in RBAC Key Vaults.
8.4lacework-global-578Ensure that the Expiration Date is set for all Secrets in Non-RBAC Key Vaults.

Policy Mapping for CIS Azure 1.5.0

The CIS Azure 1.5.0 rules are mapped to Lacework global policies. See the following sections for the mappings used.

1 - Identity and Access Management (IAM)

CIS Azure 1.5.0 Control IDLacework Policy ID
1.3lacework-global-588
1.4lacework-global-499
1.5lacework-global-500
1.6lacework-global-501
1.7lacework-global-502
1.8lacework-global-503
1.9lacework-global-504
1.10lacework-global-505
1.11lacework-global-589
1.12lacework-global-506
1.13lacework-global-507
1.14lacework-global-508
1.15lacework-global-509
1.16lacework-global-590
1.17lacework-global-510
1.18lacework-global-591
1.19lacework-global-592
1.20lacework-global-593
1.21lacework-global-594
1.22lacework-global-511
1.23lacework-global-512
1.24lacework-global-595
1.25lacework-global-596

1.1 - Security Defaults

CIS Azure 1.5.0 Control IDLacework Policy ID
1.1.1lacework-global-513
1.1.2lacework-global-514
1.1.3lacework-global-597
1.1.4lacework-global-515

1.2 - Conditional Access

CIS Azure 1.5.0 Control IDLacework Policy ID
1.2.1lacework-global-516
1.2.2lacework-global-517
1.2.3lacework-global-518
1.2.4lacework-global-519
1.2.5lacework-global-520
1.2.6lacework-global-521

2 - Microsoft Defender for Cloud

Permanently Manual Rules

As of 16th February 2023, the following sections will remain manual:

The CIS Azure 1.5.0 benchmark recommends that if you have existing products (such as Lacework) that provide the same utility as some Microsoft Defender for Cloud products, you can ignore the recommendations in Section 2. Lacework has included all rules for 2 - Microsoft Defender for Cloud as manual Lacework policies so that you can read and understand the scope of CIS recommendations.

Lacework recommends that you analyze the scope of all the policies in subsection 2.1 and make a decision that is suitable for the needs of your environment. Note that enabling Microsoft Defender will incur extra costs to provide functionality already covered by the Lacework platform.

In a future release, the LQL datasource for Microsoft Defender settings will be made available. This will allow you to write your own custom LQL-based policies against Microsoft Defender settings, to match your own security posture program needs.

CIS Azure 1.5.0 Control IDLacework Policy ID
2.5lacework-global-522
2.6lacework-global-523

2.1 - Defender Plans

CIS Azure 1.5.0 Control IDLacework Policy ID
2.1.1lacework-global-598
2.1.2lacework-global-599
2.1.3lacework-global-600
2.1.4lacework-global-601
2.1.5lacework-global-602
2.1.6lacework-global-603
2.1.7lacework-global-604
2.1.8lacework-global-605
2.1.9lacework-global-606
2.1.10lacework-global-607
2.1.11lacework-global-608
2.1.12lacework-global-609
2.1.13lacework-global-610

2.2 - Auto Provisioning

CIS Azure 1.5.0 Control IDLacework Policy ID
2.2.1lacework-global-524
2.2.2lacework-global-611
2.2.3lacework-global-612

2.3 - Email Notifications

CIS Azure 1.5.0 Control IDLacework Policy ID
2.3.1lacework-global-525
2.3.2lacework-global-526
2.3.3lacework-global-527

2.4 - Integrations

CIS Azure 1.5.0 Control IDLacework Policy ID
2.4.1lacework-global-613
2.4.2lacework-global-614

3 - Storage Accounts

CIS Azure 1.5.0 Control IDLacework Policy ID
3.1lacework-global-528
3.2lacework-global-615
3.3lacework-global-529
3.4lacework-global-530
3.5lacework-global-616
3.6lacework-global-531
3.7lacework-global-532
3.8lacework-global-533
3.9lacework-global-617
3.10lacework-global-534
3.11lacework-global-535
3.12lacework-global-618
3.13lacework-global-619
3.14lacework-global-620
3.15lacework-global-536

4 - Database Services

4.1 - SQL Server - Auditing

CIS Azure 1.5.0 Control IDLacework Policy ID
4.1.1lacework-global-537
4.1.2lacework-global-538
4.1.3lacework-global-621
4.1.4lacework-global-539
4.1.5lacework-global-540
4.1.6lacework-global-541

4.2 - SQL Server - Microsoft Defender for SQL

CIS Azure 1.5.0 Control IDLacework Policy ID
4.2.1lacework-global-622
4.2.2lacework-global-623
4.2.3lacework-global-624
4.2.4lacework-global-625
4.2.5lacework-global-542

4.3 - PostgreSQL Database Server

CIS Azure 1.5.0 Control IDLacework Policy ID
4.3.1lacework-global-543
4.3.2lacework-global-544
4.3.3lacework-global-545
4.3.4lacework-global-546
4.3.5lacework-global-547
4.3.6lacework-global-548
4.3.7lacework-global-549
4.3.8lacework-global-550

4.4 - MySQL Database

CIS Azure 1.5.0 Control IDLacework Policy ID
4.4.1lacework-global-551
4.4.2lacework-global-552
4.4.3lacework-global-626
4.4.4lacework-global-627

4.5 - Cosmos DB

CIS Azure 1.5.0 Control IDLacework Policy ID
4.5.1lacework-global-628
4.5.2lacework-global-629

5 - Logging and Monitoring

CIS Azure 1.5.0 Control IDLacework Policy ID
5.3lacework-global-553

5.1 - Configuring Diagnostic Settings

CIS Azure 1.5.0 Control IDLacework Policy ID
5.1.1lacework-global-554
5.1.2lacework-global-555
5.1.3lacework-global-556
5.1.4lacework-global-630
5.1.5lacework-global-557
5.1.6lacework-global-631
5.1.7lacework-global-632

5.2 - Monitoring using Activity Log Alerts

CIS Azure 1.5.0 Control IDLacework Policy ID
5.2.1lacework-global-558
5.2.2lacework-global-559
5.2.3lacework-global-560
5.2.4lacework-global-561
5.2.5lacework-global-562
5.2.6lacework-global-563
5.2.7lacework-global-564
5.2.8lacework-global-565
5.2.9lacework-global-566
5.2.10lacework-global-567

6 - Networking

CIS Azure 1.5.0 Control IDLacework Policy ID
6.1lacework-global-568
6.2lacework-global-569
6.3lacework-global-570
6.4lacework-global-571
6.5lacework-global-633
6.6lacework-global-634
6.7lacework-global-572

7 - Virtual Machines

CIS Azure 1.5.0 Control IDLacework Policy ID
7.1lacework-global-573
7.2lacework-global-635
7.3lacework-global-636
7.4lacework-global-574
7.5lacework-global-637
7.6lacework-global-638

8 - Key Vault

CIS Azure 1.5.0 Control IDLacework Policy ID
8.1lacework-global-575
8.2lacework-global-576
8.3lacework-global-577
8.4lacework-global-578
8.5lacework-global-579
8.6lacework-global-639
8.7lacework-global-640
8.8lacework-global-641

9 - AppService

CIS Azure 1.5.0 Control IDLacework Policy ID
9.1lacework-global-642
9.2lacework-global-580
9.3lacework-global-581
9.4lacework-global-643
9.5lacework-global-582
9.6lacework-global-583
9.7lacework-global-584
9.8lacework-global-585
9.9lacework-global-586
9.10lacework-global-587
9.11lacework-global-644

10 - Miscellaneous

CIS Azure 1.5.0 Control IDLacework Policy ID
10.1lacework-global-645

FAQs

Why are there so many manual policies in CIS Azure 1.5.0?

  • The Azure v1.5.0 benchmark (published by CIS) has 147 policies: 69 automated and 78 manual.
  • In comparison, the Azure v1.3.1 benchmark had 111 policies: 61 automated and 50 manual.

Due to the policies yet to be implemented, and those temporarily released as manual, Lacework’s v1.5.0 benchmark may appear to have an imbalance of manual policies. As noted though, more than 50% of the CIS Azure 1.5.0 policies are manual.

Why were some policies in v1.3.1 automated but now moved to manual in v1.5.0?

There were a set of five policies in v1.3.1 that were automated, and are still marked as automated by CIS in v1.5.0. Lacework has temporarily released these five policies as manual, with a plan to automate them in the future. See Manual Rules (that were deemed automated).

A further set of six policies in v1.3.1 were automated, and have been marked as automated by CIS in v1.5.0. Lacework has delivered manual policies for these in v1.5.0. See Permanently Manual Rules (that were deemed automated).

For a full policy comparison between v1.3.1 and v1.5.0, see CIS Azure 1.3.1 to 1.5.0.

Why were some policies in v1.3.1 manual but now moved to automated in v1.5.0?

Lacework is sometimes able to monitor the required resources for a given policy (even when deemed as manual by CIS). These policies are then automated in the Lacework Compliance Platform.

Three policies that were manual in v1.3.1 have been automated by Lacework for v1.5.0:

  1. Azure_CIS_131_6_5
  2. Azure_CIS_131_7_1
  3. Azure_CIS_131_9_9

See CIS Azure 1.3.1 to 1.5.0 Mapping for further details.

Also, an additional four policies that are new in v1.5.0 have been automated (where CIS specified them as manual). See New Policies in CIS Azure 1.5.0 for details.

Do I have improved coverage with v1.5.0 versus what I had with v1.3.1?

When Lacework delivers on remaining unimplemented policies and planned automation for manual policies (including rules that are pending automation), coverage for v1.5.0 will be an improvement over v1.3.1.

Which policies are yet to be updated/released within the v1.5.0 benchmark?

As of 1st March 2023, there are 4 unimplemented policies. Work is in progress to complete automation of these policies.

There are also 4 policies that have been marked as manual by CIS for v1.5.0, but Lacework intends to automate these policies in a future release. See Rules that are pending automation.

Why do control IDs 8.6 and 8.7 show as "Could Not Assess" in policy assessments and reports?

Policy assessments and reports for control ID 8.6 and 8.7 may show "Could Not Assess" if you do have the Key Vault Reader role assigned to the Lacework application used for the integration.

This applies to Azure Key Vaults in your subscription/tenant that do not have RBAC enabled.

See Assign Azure Key Vault permissions in the Azure integration prerequisites for help in assigning this role.