5.1.3 Ensure the storage container storing the activity logs is not publicly accessible

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

The storage account container containing the activity log export should not be publicly accessible.

Rationale:

Allowing public access to activity log content may aid an adversary in identifying weaknesses in the affected account's use or configuration.

Impact:

Configuring container Access policy to private will remove access from the container for everyone except owners of the storage account. Access policy needs to be set explicitly in order to allow access to other desired users.

NOTE: Nessus has provided the target output to assist in reviewing the benchmark to ensure target compliance.

Solution

From Azure Console

Search for Storage Accounts to access Storage account blade

Click on the storage account name

In Section Blob Service click Containers. It will list all the containers in next blade

Look for a record with container named as insight-operational-logs. Click ... from right most column to open Context menu

Click Access Policy from Context Menu and set Public Access Level to Private (no anonymous access)

Using Azure Command Line Interface 2.0

az storage container set-permission --name insights-operational-logs --account-name <Storage Account Name> --public-access off

Default Value:

By default, public access is set to null (allowing only private access) for a container with activity log export.

See Also

https://workbench.cisecurity.org/files/3459