CIS Microsoft Azure Foundations v4.0.0 L1

Audit Details

Name: CIS Microsoft Azure Foundations v4.0.0 L1

Updated: 6/24/2025

Authority: CIS

Plugin: microsoft_azure

Revision: 1.0

Estimated Item Count: 78

File Details

Filename: CIS_Microsoft_Azure_Foundations_v4.0.0_L1.audit

Size: 271 kB

MD5: de5a2e1610b85a248e12508f3e209c87
SHA256: 29d30b06dd8db3cd8a8fc4abbb40594d18078b5f9d337ac9f0814660fec3e09f

Audit Items

DescriptionCategories
2.1.1.1.1 Ensure Critical Data is Encrypted with Microsoft Managed Keys (MMK)

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

2.2.1.1 Ensure public network access is Disabled

ACCESS CONTROL, MEDIA PROTECTION

2.2.1.2 Ensure Network Access Rules are set to Deny-by-default

CONFIGURATION MANAGEMENT, CONTINGENCY PLANNING, PLANNING, PROGRAM MANAGEMENT, SYSTEM AND SERVICES ACQUISITION, SYSTEM AND COMMUNICATIONS PROTECTION

3.1.1 Ensure that Azure Databricks is deployed in a customer-managed virtual network (VNet)

CONFIGURATION MANAGEMENT, CONTINGENCY PLANNING, PLANNING, PROGRAM MANAGEMENT, SYSTEM AND SERVICES ACQUISITION, SYSTEM AND COMMUNICATIONS PROTECTION

3.1.2 Ensure that network security groups are configured for Databricks subnets

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

3.1.4 Ensure that users and groups are synced from Microsoft Entra ID to Azure Databricks

ACCESS CONTROL

3.1.5 Ensure that Unity Catalog is configured for Azure Databricks

ACCESS CONTROL

3.1.6 Ensure that usage is restricted and expiry is enforced for Databricks personal access tokens

ACCESS CONTROL

3.1.7 Ensure that diagnostic log delivery is configured for Azure Databricks

AUDIT AND ACCOUNTABILITY

6.1.1 Ensure that 'security defaults' is enabled in Microsoft Entra ID

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

6.1.2 Ensure that 'multifactor authentication' is 'enabled' for all users

IDENTIFICATION AND AUTHENTICATION

6.1.3 Ensure that 'Allow users to remember multifactor authentication on devices they trust' is disabled

IDENTIFICATION AND AUTHENTICATION

6.3.1 Ensure that Azure admin accounts are not used for daily operations

ACCESS CONTROL

6.3.2 Ensure that guest users are reviewed on a regular basis

ACCESS CONTROL

6.3.3 Ensure that use of the 'User Access Administrator' role is restricted

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

6.3.4 Ensure that all 'privileged' role assignments are periodically reviewed

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

6.4 Ensure that 'Restrict non-admin users from creating tenants' is set to 'Yes'

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

6.5 Ensure that 'Number of methods required to reset' is set to '2'

IDENTIFICATION AND AUTHENTICATION

6.6 Ensure that account 'Lockout threshold' is less than or equal to '10'

ACCESS CONTROL

6.7 Ensure that account 'Lockout duration in seconds' is greater than or equal to '60'

ACCESS CONTROL

6.8 Ensure that a 'Custom banned password list' is set to 'Enforce'

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

6.9 Ensure that 'Number of days before users are asked to re-confirm their authentication information' is not set to '0'

ACCESS CONTROL

6.10 Ensure that 'Notify users on password resets?' is set to 'Yes'

ACCESS CONTROL

6.11 Ensure that 'Notify all admins when other admins reset their password?' is set to 'Yes'

ACCESS CONTROL

6.12 Ensure that 'User consent for applications' is set to 'Do not allow user consent'

ACCESS CONTROL, CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION

6.14 Ensure that 'Users can register applications' is set to 'No'

ACCESS CONTROL, CONFIGURATION MANAGEMENT

6.15 Ensure that 'Guest users access restrictions' is set to 'Guest user access is restricted to properties and memberships of their own directory objects'

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY, MEDIA PROTECTION

6.17 Ensure that 'Restrict access to Microsoft Entra admin center' is set to 'Yes'

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

6.22 Ensure that 'Require Multifactor Authentication to register or join devices with Microsoft Entra' is set to 'Yes'

IDENTIFICATION AND AUTHENTICATION

6.23 Ensure that no custom subscription administrator roles exist

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

6.26 Ensure fewer than 5 users have global administrator assignment

ACCESS CONTROL

7.1.1.1 Ensure that a 'Diagnostic Setting' exists for Subscription Activity Logs

AUDIT AND ACCOUNTABILITY

7.1.1.2 Ensure Diagnostic Setting captures appropriate categories

AUDIT AND ACCOUNTABILITY

7.1.1.4 Ensure that logging for Azure Key Vault is 'Enabled'

AUDIT AND ACCOUNTABILITY

7.1.2.1 Ensure that Activity Log Alert exists for Create Policy Assignment

AUDIT AND ACCOUNTABILITY

7.1.2.2 Ensure that Activity Log Alert exists for Delete Policy Assignment

AUDIT AND ACCOUNTABILITY

7.1.2.3 Ensure that Activity Log Alert exists for Create or Update Network Security Group

AUDIT AND ACCOUNTABILITY

7.1.2.4 Ensure that Activity Log Alert exists for Delete Network Security Group

AUDIT AND ACCOUNTABILITY

7.1.2.5 Ensure that Activity Log Alert exists for Create or Update Security Solution

AUDIT AND ACCOUNTABILITY

7.1.2.6 Ensure that Activity Log Alert exists for Delete Security Solution

AUDIT AND ACCOUNTABILITY

7.1.2.7 Ensure that Activity Log Alert exists for Create or Update SQL Server Firewall Rule

AUDIT AND ACCOUNTABILITY

7.1.2.8 Ensure that Activity Log Alert exists for Delete SQL Server Firewall Rule

AUDIT AND ACCOUNTABILITY

7.1.2.9 Ensure that Activity Log Alert exists for Create or Update Public IP Address rule

AUDIT AND ACCOUNTABILITY

7.1.2.10 Ensure that Activity Log Alert exists for Delete Public IP Address rule

AUDIT AND ACCOUNTABILITY

7.1.2.11 Ensure that an Activity Log Alert exists for Service Health

AUDIT AND ACCOUNTABILITY

7.1.4 Ensure that Azure Monitor Resource Logging is Enabled for All Services that Support it

AUDIT AND ACCOUNTABILITY

8.1 Ensure that RDP access from the Internet is evaluated and restricted

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

8.2 Ensure that SSH access from the Internet is evaluated and restricted

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

8.3 Ensure that UDP access from the Internet is evaluated and restricted

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

8.4 Ensure that HTTP(S) access from the Internet is evaluated and restricted

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION