InformationThe storage account with the activity log export container is configured to use BYOK (Use Your Own Key).
Configuring the storage account with the activity log export container to use BYOK (Use Your Own Key) provides additional confidentiality controls on log data as a given user must have read permission on the corresponding storage account and must be granted decrypt permission by the CMK.
NOTE: Nessus has provided the target output to assist in reviewing the benchmark to ensure target compliance.
SolutionFrom Azure Console
In right column, Click service Storage Accounts to access Storage account blade
Click on the storage account name
In Section SETTINGS click Encryption. It will show Storage service encryption configuration pane.
Check Use your own key which will expand Encryption Key Settings
Use option Enter key URI or Select from Key Vault to set up encryption with your own key
Using Azure Command Line Interface 2.0
az storage account update --name <name of the storage account> --resource-group <resource group for a storage account> --encryption-key-source=Microsoft.Keyvault --encryption-key-vault <Key Valut URI> --encryption-key-name <KeyName> --encryption-key-version <Key Version>
By default, for a storage account keySource is set to Microsoft.Storage allowing encryption with vendor Managed key and not the BYOK (Use Your Own Key).