5.1.5 Ensure that logging for Azure KeyVault is 'Enabled'

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

Enable AuditEvent logging for key vault instances to ensure interactions with key vaults are logged and available.

Rationale:

Monitoring how and when key vaults are accessed, and by whom enables an audit trail of interactions with confidential information, keys and certificates managed by Azure Keyvault. Enabling logging for Key Vault saves information in an Azure storage account that the user provides. This creates a new container named insights-logs-auditevent automatically for the specified storage account, and this same storage account can be used for collecting logs for multiple key vaults.

Solution

Follow Microsoft Azure documentation and setup Azure Key Vault Logging.

Default Value:

By default, Diagnostic AuditEvent logging is not enabled for Key Vault instances.

See Also

https://workbench.cisecurity.org/files/3459