CIS Microsoft Azure Foundations v4.0.0 L2

Audit Details

Name: CIS Microsoft Azure Foundations v4.0.0 L2

Updated: 6/24/2025

Authority: CIS

Plugin: microsoft_azure

Revision: 1.0

Estimated Item Count: 61

File Details

Filename: CIS_Microsoft_Azure_Foundations_v4.0.0_L2.audit

Size: 216 kB

MD5: d799ceb5542bab1d8d0229b5bbd20d75
SHA256: 657f6b67483df31e32df5ba4add3756892b550e400052ef11bbb11e11830e6eb

Audit Items

DescriptionCategories
2.1.1.2.1 Ensure Critical Data is Encrypted with Customer Managed Keys (CMK)

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

2.2.2.1 Ensure Private Endpoints are used to access {service}

CONFIGURATION MANAGEMENT, CONTINGENCY PLANNING, PLANNING, PROGRAM MANAGEMENT, SYSTEM AND SERVICES ACQUISITION, SYSTEM AND COMMUNICATIONS PROTECTION

3.1.3 Ensure that traffic is encrypted between cluster worker nodes

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

3.1.8 Ensure that data at rest and in transit is encrypted in Azure Databricks using customer managed keys (CMK)

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

4.1.1 Ensure only MFA enabled identities can access privileged Virtual Machine

IDENTIFICATION AND AUTHENTICATION

6.2.1 Ensure that 'trusted locations' are defined

ACCESS CONTROL, CONFIGURATION MANAGEMENT, CONTINGENCY PLANNING, PLANNING, PROGRAM MANAGEMENT, SYSTEM AND SERVICES ACQUISITION, SYSTEM AND COMMUNICATIONS PROTECTION

6.2.2 Ensure that an exclusionary geographic Conditional Access policy is considered

ACCESS CONTROL

6.2.3 Ensure that an exclusionary device code flow policy is considered

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

6.2.4 Ensure that a multifactor authentication policy exists for all users

IDENTIFICATION AND AUTHENTICATION

6.2.5 Ensure that multifactor authentication is required for risky sign-ins

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

6.2.6 Ensure that multifactor authentication is required for Windows Azure Service Management API

IDENTIFICATION AND AUTHENTICATION

6.2.7 Ensure that multifactor authentication is required to access Microsoft Admin Portals

IDENTIFICATION AND AUTHENTICATION

6.13 Ensure that 'User consent for applications' is set to 'Allow user consent for apps from verified publishers, for selected permissions'

CONFIGURATION MANAGEMENT

6.16 Ensure that 'Guest invite restrictions' is set to 'Only users assigned to specific admin roles can invite guest users'

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY, IDENTIFICATION AND AUTHENTICATION

6.18 Ensure that 'Restrict user ability to access groups features in My Groups' is set to 'Yes'

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

6.19 Ensure that 'Users can create security groups in Azure portals, API or PowerShell' is set to 'No'

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

6.20 Ensure that 'Owners can manage group membership requests in My Groups' is set to 'No'

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

6.21 Ensure that 'Users can create Microsoft 365 groups in Azure portals, API or PowerShell' is set to 'No'

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

6.24 Ensure that a custom role is assigned permissions for administering resource locks

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY, MEDIA PROTECTION

6.25 Ensure that 'Subscription leaving Microsoft Entra tenant' and 'Subscription entering Microsoft Entra tenant' is set to 'Permit no one'

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

7.1.1.3 Ensure the storage account containing the container with activity logs is encrypted with Customer Managed Key (CMK)

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

7.1.1.5 Ensure that Network Security Group Flow logs are captured and sent to Log Analytics

SYSTEM AND INFORMATION INTEGRITY

7.1.1.6 Ensure that logging for Azure AppService 'HTTP logs' is enabled

AUDIT AND ACCOUNTABILITY

7.1.1.7 Ensure that virtual network flow logs are captured and sent to Log Analytics

SYSTEM AND INFORMATION INTEGRITY

7.1.1.8 Ensure that a Microsoft Entra diagnostic setting exists to send Microsoft Graph activity logs to an appropriate destination

AUDIT AND ACCOUNTABILITY

7.1.1.9 Ensure that a Microsoft Entra diagnostic setting exists to send Microsoft Entra activity logs to an appropriate destination

AUDIT AND ACCOUNTABILITY

7.1.1.10 Ensure that Intune logs are captured and sent to Log Analytics

AUDIT AND ACCOUNTABILITY

7.1.3.1 Ensure Application Insights are Configured

AUDIT AND ACCOUNTABILITY

7.1.5 Ensure that SKU Basic/Consumption is not used on artifacts that need to be monitored (Particularly for Production Workloads)

SYSTEM AND SERVICES ACQUISITION

7.2 Ensure that Resource Locks are set for Mission-Critical Azure Resources

ACCESS CONTROL, MEDIA PROTECTION

8.5 Ensure that Network Security Group Flow Log retention period is 'greater than 90 days'

AUDIT AND ACCOUNTABILITY

8.6 Ensure that Network Watcher is 'Enabled' for Azure Regions that are in use

CONFIGURATION MANAGEMENT, CONTINGENCY PLANNING, PLANNING, PROGRAM MANAGEMENT, SYSTEM AND SERVICES ACQUISITION, SYSTEM AND COMMUNICATIONS PROTECTION

8.8 Ensure that virtual network flow log retention days is set to greater than or equal to 90

AUDIT AND ACCOUNTABILITY

9.1.3.1 Ensure that Defender for Servers is set to 'On'

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

9.1.3.2 Ensure that 'Vulnerability assessment for machines' component status is set to 'On'

RISK ASSESSMENT

9.1.3.3 Ensure that 'Endpoint protection' component status is set to 'On'

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

9.1.3.4 Ensure that 'Agentless scanning for machines' component status is set to 'On'

RISK ASSESSMENT

9.1.3.5 Ensure that 'File Integrity Monitoring' component status is set to 'On'

RISK ASSESSMENT

9.1.4.1 Ensure That Microsoft Defender for Containers Is Set To 'On'

RISK ASSESSMENT

9.1.5.1 Ensure That Microsoft Defender for Storage Is Set To 'On'

RISK ASSESSMENT

9.1.6.1 Ensure That Microsoft Defender for App Services Is Set To 'On'

RISK ASSESSMENT, SYSTEM AND SERVICES ACQUISITION

9.1.7.1 Ensure That Microsoft Defender for Azure Cosmos DB Is Set To 'On'

RISK ASSESSMENT, SYSTEM AND SERVICES ACQUISITION

9.1.7.2 Ensure That Microsoft Defender for Open-Source Relational Databases Is Set To 'On'

RISK ASSESSMENT, SYSTEM AND SERVICES ACQUISITION

9.1.7.3 Ensure That Microsoft Defender for (Managed Instance) Azure SQL Databases Is Set To 'On'

RISK ASSESSMENT, SYSTEM AND SERVICES ACQUISITION

9.1.7.4 Ensure That Microsoft Defender for SQL Servers on Machines Is Set To 'On'

RISK ASSESSMENT, SYSTEM AND SERVICES ACQUISITION

9.1.8.1 Ensure That Microsoft Defender for Key Vault Is Set To 'On'

RISK ASSESSMENT

9.1.9.1 Ensure That Microsoft Defender for Resource Manager Is Set To 'On'

ACCESS CONTROL, RISK ASSESSMENT

9.1.16 Ensure that Microsoft Defender External Attack Surface Monitoring (EASM) is enabled

RISK ASSESSMENT

9.1.17 [LEGACY] Ensure That Microsoft Defender for DNS Is Set To 'On'

RISK ASSESSMENT, SYSTEM AND COMMUNICATIONS PROTECTION

9.2.1 Ensure That Microsoft Defender for IoT Hub Is Set To 'On'

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY