CIS Microsoft Azure Foundations v5.0.0 L2

Audit Details

Name: CIS Microsoft Azure Foundations v5.0.0 L2

Updated: 2/4/2026

Authority: CIS

Plugin: microsoft_azure

Revision: 1.0

Estimated Item Count: 69

File Details

Filename: CIS_Microsoft_Azure_Foundations_v5.0.0_L2.audit

Size: 244 kB

MD5: a9e5bf1d688aea1385a6d79f760c796e
SHA256: 6344de11bc96ad4fd0a5f8b3b2b81a1314f74f7cafbc3d5af8518c93eda540ca

Audit Items

DescriptionCategories
2.1.3 Ensure that traffic is encrypted between cluster worker nodes

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

2.1.8 Ensure critical data in Azure Databricks is encrypted with customer-managed keys (CMK)

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

2.1.11 Ensure private endpoints are used to access Azure Databricks workspaces

CONFIGURATION MANAGEMENT, CONTINGENCY PLANNING, PLANNING, PROGRAM MANAGEMENT, SYSTEM AND SERVICES ACQUISITION, SYSTEM AND COMMUNICATIONS PROTECTION

3.1.1 Ensure only MFA enabled identities can access privileged Virtual Machine

IDENTIFICATION AND AUTHENTICATION

5.2.1 Ensure that 'trusted locations' are defined

ACCESS CONTROL, CONFIGURATION MANAGEMENT, CONTINGENCY PLANNING, PLANNING, PROGRAM MANAGEMENT, SYSTEM AND SERVICES ACQUISITION, SYSTEM AND COMMUNICATIONS PROTECTION

5.2.2 Ensure that an exclusionary geographic Conditional Access policy is considered

ACCESS CONTROL

5.2.3 Ensure that an exclusionary device code flow policy is considered

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

5.2.4 Ensure that a multifactor authentication policy exists for all users

IDENTIFICATION AND AUTHENTICATION

5.2.5 Ensure that multifactor authentication is required for risky sign-ins

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

5.2.6 Ensure that multifactor authentication is required for Windows Azure Service Management API

IDENTIFICATION AND AUTHENTICATION

5.2.7 Ensure that multifactor authentication is required to access Microsoft Admin Portals

IDENTIFICATION AND AUTHENTICATION

5.2.8 Ensure a Token Protection Conditional Access policy is considered

IDENTIFICATION AND AUTHENTICATION

5.13 Ensure that 'User consent for applications' is set to 'Allow user consent for apps from verified publishers, for selected permissions'

CONFIGURATION MANAGEMENT

5.16 Ensure that 'Guest invite restrictions' is set to 'Only users assigned to specific admin roles [...]' or 'No one [..]'

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY, IDENTIFICATION AND AUTHENTICATION

5.18 Ensure that 'Restrict user ability to access groups features in My Groups' is set to 'Yes'

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

5.19 Ensure that 'Users can create security groups in Azure portals, API or PowerShell' is set to 'No'

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

5.20 Ensure that 'Owners can manage group membership requests in My Groups' is set to 'No'

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

5.21 Ensure that 'Users can create Microsoft 365 groups in Azure portals, API or PowerShell' is set to 'No'

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

5.24 Ensure that a custom role is assigned permissions for administering resource locks

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY, MEDIA PROTECTION

5.25 Ensure that 'Subscription leaving Microsoft Entra tenant' and 'Subscription entering Microsoft Entra tenant' is set to 'Permit no one'

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

5.28 Ensure passwordless authentication methods are considered

IDENTIFICATION AND AUTHENTICATION

6.1.1.3 Ensure the storage account containing the container with activity logs is encrypted with customer-managed key (CMK)

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

6.1.1.5 Ensure that Network Security Group Flow logs are captured and sent to Log Analytics

SYSTEM AND INFORMATION INTEGRITY

6.1.1.6 Ensure that logging for Azure AppService 'HTTP logs' is enabled

AUDIT AND ACCOUNTABILITY

6.1.1.7 Ensure that virtual network flow logs are captured and sent to Log Analytics

SYSTEM AND INFORMATION INTEGRITY

6.1.1.8 Ensure that a Microsoft Entra diagnostic setting exists to send Microsoft Graph activity logs to an appropriate destination

AUDIT AND ACCOUNTABILITY

6.1.1.9 Ensure that a Microsoft Entra diagnostic setting exists to send Microsoft Entra activity logs to an appropriate destination

AUDIT AND ACCOUNTABILITY

6.1.1.10 Ensure that Intune logs are captured and sent to Log Analytics

AUDIT AND ACCOUNTABILITY

6.1.3.1 Ensure Application Insights are Configured

AUDIT AND ACCOUNTABILITY

6.1.5 Ensure that SKU Basic/Consumption is not used on artifacts that need to be monitored (Particularly for Production Workloads)

SYSTEM AND SERVICES ACQUISITION

6.2 Ensure that Resource Locks are set for Mission-Critical Azure Resources

ACCESS CONTROL, MEDIA PROTECTION

7.5 Ensure that network security group flow log retention days is set to greater than or equal to 90

AUDIT AND ACCOUNTABILITY

7.6 Ensure that Network Watcher is 'Enabled' for Azure Regions that are in use

CONFIGURATION MANAGEMENT, CONTINGENCY PLANNING, PLANNING, PROGRAM MANAGEMENT, SYSTEM AND SERVICES ACQUISITION, SYSTEM AND COMMUNICATIONS PROTECTION

7.8 Ensure that virtual network flow log retention days is set to greater than or equal to 90

AUDIT AND ACCOUNTABILITY

7.9 Ensure 'Authentication type' is set to 'Azure Active Directory' only for Azure VPN Gateway point-to-site configuration

ACCESS CONTROL

7.10 Ensure Azure Web Application Firewall (WAF) is enabled on Azure Application Gateway

SYSTEM AND COMMUNICATIONS PROTECTION

7.14 Ensure request body inspection is enabled in Azure Web Application Firewall policy on Azure Application Gateway

SYSTEM AND COMMUNICATIONS PROTECTION

7.15 Ensure bot protection is enabled in Azure Web Application Firewall policy on Azure Application Gateway

SYSTEM AND COMMUNICATIONS PROTECTION

7.16 Ensure Azure Network Security Perimeter is used to secure Azure platform-as-a-service resources

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

8.1.1.1 Ensure Microsoft Defender CSPM is set to 'On'

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

8.1.2.1 Ensure Microsoft Defender for APIs is set to 'On'

SECURITY ASSESSMENT AND AUTHORIZATION, RISK ASSESSMENT

8.1.3.1 Ensure that Defender for Servers is set to 'On'

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

8.1.3.2 Ensure that 'Vulnerability assessment for machines' component status is set to 'On'

RISK ASSESSMENT

8.1.3.3 Ensure that 'Endpoint protection' component status is set to 'On'

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

8.1.3.4 Ensure that 'Agentless scanning for machines' component status is set to 'On'

RISK ASSESSMENT

8.1.3.5 Ensure that 'File Integrity Monitoring' component status is set to 'On'

RISK ASSESSMENT

8.1.4.1 Ensure That Microsoft Defender for Containers Is Set To 'On'

RISK ASSESSMENT

8.1.5.1 Ensure That Microsoft Defender for Storage Is Set To 'On'

RISK ASSESSMENT

8.1.5.2 Ensure Advanced Threat Protection Alerts for Storage Accounts Are Monitored

AUDIT AND ACCOUNTABILITY

8.1.6.1 Ensure That Microsoft Defender for App Services Is Set To 'On'

RISK ASSESSMENT, SYSTEM AND SERVICES ACQUISITION