Skip to main content

Azure



Azure Diagnosis Items

CategoryResourceOptionItemDescriptionRisk LevelISO27001CSAPISMS-PStability Assessment
App ServiceLinux App ServiceFailed Request Tracing EnabledLogging MonitoringDisable Failed Request Tracing Settings
MEDIUM
9.1 Monitoring, measurement, analysis and evaluation7.2.2 Audit Records and Monitoring2.11 Incident Prevention and Response1.4.1 Security Audit
App ServiceLinux App ServiceDetailed Error Messages EnabledLogging MonitoringDisable Error Page Storage Settings
MEDIUM
9.1 Monitoring, measurement, analysis and evaluation7.2.2 Audit Records and Monitoring2.11 Incident Prevention and Response1.4.1 Security Audit
App ServiceLinux App ServiceAuth Settings EnabledUser Identification and AuthenticationAuthentication Disabled
MEDIUM
8.1 Operational planning and control10.3.3. Provision of Enhanced Authentication Measures2.5 Authentication and Authorization Management7.3.1 User Identification and Authentication
App ServiceLinux App Service Ftps StateAccess ControlAllow Unencrypted FTP Protocol
HIGH
8.1 Operational planning and control12.3.1. Encryption Policy Establishment2.7 Cryptography Application10.2.1 Encryption
App ServiceLinux App Service Http2 EnabledNetwork SecurityHTTP2 not implemented
LOW
8.1 Operational planning and control11.1.1 Network Security Policy Establishment2.10 System and Service Security Management8.3.1 Infrastructure Security
App ServiceService PllaanSku TierNetwork SecurityUsing SKU with Always On setting disabled
LOW
8.1 Operational planning and control6.2.2. Redundancy and Backup2.9 System and Service Operation Management5.2.1 Service Availability
App ServiceWindows App ServiceFailed Request Tracing EnabledLogging MonitoringDisable Failed Request Tracing Settings
MEDIUM
9.1 Monitoring, measurement, analysis and evaluation7.2.2 Audit Records and Monitoring2.11 Incident Prevention and Response1.4.1 Security Audit
App ServiceWindows App ServiceDetailed Error Messages EnabledLogging MonitoringDisable Error Page Storage Settings
MEDIUM
9.1 Monitoring, measurement, analysis and evaluation7.2.2 Audit Records and Monitoring2.11 Incident Prevention and Response1.4.1 Security Audit
App ServiceWindows App ServiceAuth Settings EnabledUser Identification and AuthenticationAuthentication Disabled
MEDIUM
8.1 Operational planning and control10.3.3. Provision of Enhanced Authentication Measures2.5 Authentication and Authorization Management7.3.1 User Identification and Authentication
App ServiceWindows App ServiceHttp2 EnabledNetwork SecurityHTTP2 not implemented
LOW
8.1 Operational planning and control11.1.1 Network Security Policy Establishment2.10 System and Service Security Management8.3.1 Infrastructure Security
App ServiceWindows App ServiceFtps StateAccess ControlAllow Unencrypted FTP Protocol
HIGH
8.1 Operational planning and control12.3.1. Encryption Policy Establishment2.7 Cryptography Application10.2.1 Encryption
ComputeLinux Virtual Machine Sacle SetEnable Ssh Key AuthenticationUser Identification and AuthenticationSSH key authentication not used
HIGH
8.1 Operational planning and control12.3.1. Encryption Policy Establishment2.7 Cryptography Application10.2.1 Encryption
ComputeLinux Virtual MamchineEnable Ssh Key AuthenticationUser Identification and AuthenticationSSH key authentication not used
HIGH
8.1 Operational planning and control12.3.1. Encryption Policy Establishment2.7 Cryptography Application10.2.1 Encryption
ContainerContainer RegistryPublic Network Access EnabledAccess ControlPublic network access allowed
CRITICAL
8.1 Operational planning and control10.1.1. Access Control Policy Establishment2.6 Access Control7.1.1 Access Control Policy
ContainerContainer RegistryAdmin EnabledAccess ControlAdministrator enabled
MEDIUM
8.1 Operational planning and control10.2.1. User Registration and Authorization2.5 Authentication and Authorization Management7.2.2 Access Rights Management
ContainerKubernetesDefault Node Pool > Enable Node Public IpAccess ControlNode Public IP enabled
CRITICAL
8.1 Operational planning and control10.1.1. Access Control Policy Establishment2.6 Access Control7.1.1 Access Control Policy
ContainerKubernetes ClusterSku TierNetwork SecurityFree SKU does not provide Uptime SLA service
HIGH
8.1 Operational planning and control6.2.2. Redundancy and Backup2.9 System and Service Operation Management5.2.1 Service Availability
ContainerKubernetes ClusterDefault Node Pool > Max PodsNetwork SecurityInsufficient maximum number of pods that can be created
HIGH
8.1 Operational planning and control6.2.2. Redundancy and Backup2.9 System and Service Operation Management5.2.1 Service Availability
ContainerKubernetes ClusterApi Server Authorized Ip RangesAccess ControlSetting the entire range of accessible IP addresses
CRITICAL
8.1 Operational planning and control10.1.1. Access Control Policy Establishment2.6 Access Control7.1.1 Access Control Policy
ContainerKubernetes ClusterNetwork PolicyNetwork SecurityNetwork policy not configured
CRITICAL
8.1 Operational planning and control11.1.1 Network Security Policy Establishment2.10 System and Service Security Management8.3.1 Infrastructure Security
CosmosdbCosmosdb Cassandra, Cosmosdb Gremlin, Cosmosdb Mongo, Cosmosdb Sql, Cosmosdb TablePublic Network Access EnabledAccess ControlPublic network access allowed
CRITICAL
8.1 Operational planning and control10.1.1. Access Control Policy Establishment2.6 Access Control7.1.1 Access Control Policy
DatabaseMssql ServerAuditing Policy > Enable Storage Destination, Auditing Policy > Enable Log Analytics DestinationLogging MonitoringAudit policy disabled
MEDIUM
9.1 Monitoring, measurement, analysis and evaluation7.2.2 Audit Records and Monitoring2.11 Incident Prevention and Response1.4.1 Security Audit
DatabaseMssql ServerEnable Storage Destination, Storage Retention DaysLogging MonitoringShort log retention period
MEDIUM
9.1 Monitoring, measurement, analysis and evaluation7.2.2 Audit Records and Monitoring2.11 Incident Prevention and Response1.4.1 Security Audit
DatabaseMssql ServerSecurity Alert Policy > Alert Policy State, Security Alert Policy > Disabled AlertsLogging MonitoringSpecific threat alerts disabled
MEDIUM
9.1 Monitoring, measurement, analysis and evaluation7.2.2 Audit Records and Monitoring2.11 Incident Prevention and Response1.4.1 Security Audit
DatabaseMssql ServerSecurity Alert Policy > Alert Policy State, Security Alert Policy > Alert Retention DaysLogging MonitoringShort log retention period
MEDIUM
9.1 Monitoring, measurement, analysis and evaluation7.2.2 Audit Records and Monitoring2.11 Incident Prevention and Response1.4.1 Security Audit
DatabaseMssql ServerSecurity Alert Policy > Alert Policy State, Security Alert Policy > Alert Email AddressesLogging MonitoringSecurity alert email address not configured
MEDIUM
9.1 Monitoring, measurement, analysis and evaluation7.2.2 Audit Records and Monitoring2.11 Incident Prevention and Response1.4.1 Security Audit
DatabaseMssql ServerSecurity Alert Policy > Alert Policy State, Security Alert Policy > Alert Email Account AdminsLogging MonitoringSubscriber security alerts disabled
LOW
9.1 Monitoring, measurement, analysis and evaluation7.2.2 Audit Records and Monitoring2.11 Incident Prevention and Response1.4.1 Security Audit
DatabaseMssql ServerSecurity Alert Policy > Alert Policy StateLogging MonitoringSecurity alert disabled
MEDIUM
9.1 Monitoring, measurement, analysis and evaluation7.2.2 Audit Records and Monitoring2.11 Incident Prevention and Response1.4.1 Security Audit
DatabaseMssql ServerMinimum Tls VersionEncryptionUse of Weak TLS Versions
HIGH
8.1 Operational planning and control12.3.1. Encryption Policy Establishment2.7 Cryptography Application10.2.1 Encryption
DatabaseMysqlThreat Detection EnabledLogging MonitoringThreat Detection Disabled
HIGH
9.1 Monitoring, measurement, analysis and evaluation7.2.2 Audit Records and Monitoring2.11 Incident Prevention and Response1.4.1 Security Audit
DatabaseMysqlFirewall Rule > Start Ip Address, Firewall Rule > End Ip AddressAccess ControlSetting the entire range of accessible IP addresses
HIGH
8.1 Operational planning and control10.1.1. Access Control Policy Establishment2.6 Access Control7.1.1 Access Control Policy
DatabaseMysqlPublic Network Access EnabledAccess ControlPublic network access allowed
CRITICAL
8.1 Operational planning and control10.1.1. Access Control Policy Establishment2.6 Access Control7.1.1 Access Control Policy
DatabaseMysqlMinimum Tls VersionEncryptionUse of Weak TLS Versions
HIGH
8.1 Operational planning and control12.3.1. Encryption Policy Establishment2.7 Cryptography Application10.2.1 Encryption
DatabaseMysqlSsl Enforcement EnabledNetwork SecurityEncryption Connection Not Applied
HIGH
8.1 Operational planning and control12.3.1. Encryption Policy Establishment2.7 Cryptography Application10.2.1 Encryption
DatabaseMysql DatabaseEnable Storage Destination, Storage Retention DaysLogging MonitoringShort log retention period
MEDIUM
9.1 Monitoring, measurement, analysis and evaluation7.2.2 Audit Records and Monitoring2.11 Incident Prevention and Response1.4.1 Security Audit
DatabaseMysql DatabaseAuditing Policy > Enable Storage Destination, Auditing Policy > Enable Log Analytics DestinationLogging MonitoringAudit policy disabled
MEDIUM
9.1 Monitoring, measurement, analysis and evaluation7.2.2 Audit Records and Monitoring2.11 Incident Prevention and Response1.4.1 Security Audit
DatabaseMysql DatabaseZone RedundantData ProtectionZone Redundancy Disabled
HIGH
8.1 Operational planning and control12.1.4. Data Protection2.9 System and Service Operation Management10.1.4 Data Protection
DatabaseMysql FlexibleFirewall Rule > Start Ip Address, Firewall Rule > End Ip AddressAccess ControlSetting the entire range of accessible IP addresses
HIGH
8.1 Operational planning and control10.1.1. Access Control Policy Establishment2.6 Access Control7.1.1 Access Control Policy
DatabaseMysql ServerPublic Network Access EnabledAccess ControlPublic network access allowed
CRITICAL
8.1 Operational planning and control10.1.1. Access Control Policy Establishment2.6 Access Control7.1.1 Access Control Policy
DatabasePostgresqlConfiguration > Log RetentionLogging MonitoringLog Retention Disabled
MEDIUM
9.1 Monitoring, measurement, analysis and evaluation7.2.2 Audit Records and Monitoring2.11 Incident Prevention and Response1.4.1 Security Audit
DatabasePostgresqlConfiguration > Connection ThrottlingLogging MonitoringConnection Throttling Disabled
MEDIUM
9.1 Monitoring, measurement, analysis and evaluation7.2.2 Audit Records and Monitoring2.11 Incident Prevention and Response1.4.1 Security Audit
DatabasePostgresqlConfiguration > Log CheckpointLogging MonitoringLog Checkpointing Disabled
MEDIUM
9.1 Monitoring, measurement, analysis and evaluation7.2.2 Audit Records and Monitoring2.11 Incident Prevention and Response1.4.1 Security Audit
DatabasePostgresqlConfiguration > Log ConnectionsLogging MonitoringLog Connections Disabled
MEDIUM
9.1 Monitoring, measurement, analysis and evaluation7.2.2 Audit Records and Monitoring2.11 Incident Prevention and Response1.4.1 Security Audit
DatabasePostgresqlFirewall Rule > Start Ip Address, Firewall Rule > End Ip AddressAccess ControlSetting the entire range of accessible IP addresses
HIGH
8.1 Operational planning and control10.1.1. Access Control Policy Establishment2.6 Access Control7.1.1 Access Control Policy
DatabasePostgresqlPublic Network Access EnabledAccess ControlPublic network access allowed
CRITICAL
8.1 Operational planning and control10.1.1. Access Control Policy Establishment2.6 Access Control7.1.1 Access Control Policy
DatabasePostgresqlMinimum Tls VersionEncryptionUse of Weak TLS Versions
HIGH
8.1 Operational planning and control12.3.1. Encryption Policy Establishment2.7 Cryptography Application10.2.1 Encryption
DatabasePostgresqlSsl Enforcement EnabledNetwork SecurityEncryption Connection Not Applied
HIGH
8.1 Operational planning and control12.3.1. Encryption Policy Establishment2.7 Cryptography Application10.2.1 Encryption
DatabasePostgresql FlexibleGeo Redundant Backup EnabledData ProtectionGeo-Redundant Backup Disabled
HIGH
8.1 Operational planning and control6.2.2. Redundancy and Backup2.9 System and Service Operation Management5.2.1 Service Availability
DatabasePostgresql FlexibleFirewall Rule > Start Ip Address, Firewall Rule > End Ip AddressAccess ControlSetting the entire range of accessible IP addresses
HIGH
8.1 Operational planning and control10.1.1. Access Control Policy Establishment2.6 Access Control7.1.1 Access Control Policy
Key VaultKey VaultNetwork Acl ActionAccess ControlDeny Requests That Do Not Match Configured IP
CRITICAL
8.1 Operational planning and control10.1.1. Access Control Policy Establishment2.6 Access Control7.1.1 Access Control Policy
Key VaultKey VaultPurge Protection EnabledData ProtectionDisable Deletion Protection
MEDIUM
8.1 Operational planning and control12.1.4. Data Protection2.9 System and Service Operation Management10.1.4 Data Protection
Key VaultKey VaultKey Vault Secret > Content TypeEncryptionSecret Content Type Not Configured
LOW
8.1 Operational planning and control12.3.2. Encryption Key Management2.7 Cryptography Application10.2.2 Encryption
Key VaultKey VaultKey Vault Secret > Enabled Expiration DateEncryptionSecret Expiration Setting Disabled
LOW
8.1 Operational planning and control12.3.2. Encryption Key Management2.7 Cryptography Application10.2.2 Encryption
Key VaultKey VaultKey Vault Key > Enabled Expiration DateEncryptionKey Expiration Setting Disabled
MEDIUM
8.1 Operational planning and control12.3.2. Encryption Key Management2.7 Cryptography Application10.2.2 Encryption
NetworkApplication GatewayHttp Listener > ProtocolAccess ControlUse of Unencrypted HTTP Protocol
CRITICAL
8.1 Operational planning and control12.3.1. Encryption Policy Establishment2.7 Cryptography Application10.2.1 Encryption
NetworkNetwork Security GroupSecurity Rules > Direction, Security Rules > Access, Security Rules > Source Address Prefixes, Security Rules > Destination Port RangesAccess ControlFTP Access Allowed from the Internet
CRITICAL
8.1 Operational planning and control10.1.1. Access Control Policy Establishment2.6 Access Control7.1.1 Access Control Policy
NetworkNetwork Security GroupSecurity Rules > Direction, Security Rules > Access, Security Rules > Source Address Prefixes, Security Rules > Destination Port RangesAccess ControlSSH Access Allowed from the Internet
CRITICAL
8.1 Operational planning and control10.1.1. Access Control Policy Establishment2.6 Access Control7.1.1 Access Control Policy
NetworkNetwork Security GroupSecurity Rules > Direction, Security Rules > Access, Security Rules > Source Address Prefixes, Security Rules > Destination Port RangesAccess ControlHTTP Access Allowed from the Internet
CRITICAL
8.1 Operational planning and control10.1.1. Access Control Policy Establishment2.6 Access Control7.1.1 Access Control Policy
NetworkNetwork Security GroupSecurity Rules > Direction, Security Rules > Access, Security Rules > Source Address Prefixes, Security Rules > Destination Port RangesAccess ControlRDP Access Allowed from the Internet
CRITICAL
8.1 Operational planning and control10.1.1. Access Control Policy Establishment2.6 Access Control7.1.1 Access Control Policy
NetworkNetwork Security GroupSecurity Rules > Direction, Security Rules > Access, Security Rules > Source Address Prefixes / Access ControlCIDR Exposed Entirely
CRITICAL
8.1 Operational planning and control10.1.1. Access Control Policy Establishment2.6 Access Control7.1.1 Access Control Policy
NetworkNetwork Security GroupSecurity Rules > Direction, Security Rules > Access, Security Rules > Source Address Prefixes / Access ControlCIDR Exposed Entirely
CRITICAL
8.1 Operational planning and control10.1.1. Access Control Policy Establishment2.6 Access Control7.1.1 Access Control Policy
NetworkWeb Application Firewall PolicyOwasp VersionData ProtectionUsing a Version Without Rules to Defend Against Log4jShell
CRITICAL
8.1 Operational planning and control12.1.4. Data Protection2.9 System and Service Operation Management10.1.4 Data Protection
Redis CacheRedis CachePublic Network Access EnabledAccess ControlPublic network access allowed
CRITICAL
8.1 Operational planning and control10.1.1. Access Control Policy Establishment2.6 Access Control7.1.1 Access Control Policy
Redis CacheRedis CacheSku Name Data ProtectionUsing a SKU That Does Not Provide Replication Features
HIGH
8.1 Operational planning and control12.1.4. Data Protection2.9 System and Service Operation Management10.1.4 Data Protection
Redis CacheRedis CacheMinimum Tls VersionEncryptionUse of Weak TLS Versions
HIGH
8.1 Operational planning and control12.3.1. Encryption Policy Establishment2.7 Cryptography Application10.2.1 Encryption
Redis CacheRedis CacheEnable Non Ssl PortAccess ControlAllowing Unencrypted Communication
HIGH
8.1 Operational planning and control12.3.1. Encryption Policy Establishment2.7 Cryptography Application10.2.1 Encryption
StorageStorage AccountNetworking > BypassAccess ControlBypass of Azure Service Not Possible
HIGH
8.1 Operational planning and control10.1.1. Access Control Policy Establishment2.6 Access Control7.1.1 Access Control Policy
StorageStorage AccountStorage Container > Container Access TypeAccess ControlPublic Access Item Configuration
HIGH
8.1 Operational planning and control10.1.1. Access Control Policy Establishment2.6 Access Control7.1.1 Access Control Policy
StorageStorage AccountPublic Network Access EnabledAccess ControlPublic network access allowed
CRITICAL
8.1 Operational planning and control10.1.1. Access Control Policy Establishment2.6 Access Control7.1.1 Access Control Policy
StorageStorage AccountMinimum Tls VersionEncryptionUse of Weak TLS Versions
HIGH
8.1 Operational planning and control12.3.1. Encryption Policy Establishment2.7 Cryptography Application10.2.1 Encryption
StorageStorage AccountEnable Https Traffic OnlyAccess ControlUsing Unencrypted HTTP Protocol
CRITICAL
8.1 Operational planning and control12.3.1. Encryption Policy Establishment2.7 Cryptography Application10.2.1 Encryption