Skip to content
SecPod  – Documentation
  • Docs Home
  • Categories
    • Saner Platform
    • Saner Cloud
    • Saner CVEM
    • Security Intelligence
  • More
    • About SecPod
    • Blog
    • Security & Privacy
    • Support Center
    • Resources
  • SCHEDULE A DEMO
  • Toggle website search
Search this website
Menu Close
  • Docs Home
  • Categories
    • Saner Platform
    • Saner Cloud
    • Saner CVEM
    • Security Intelligence
  • More
    • About SecPod
    • Blog
    • Security & Privacy
    • Support Center
    • Resources
  • SCHEDULE A DEMO
  • Toggle website search
  • Docs Home
  • Categories
    • Saner Platform
    • Saner Cloud
    • Saner CVEM
    • Security Intelligence
  • More
    • About SecPod
    • Blog
    • Security & Privacy
    • Support Center
    • Resources
  • SCHEDULE A DEMO

Saner Platform

  • Saner Platform Release Notes
    • Release Notes Saner 6.4.1
    • Release Notes SanerNow 6.4
    • Release Notes SanerNow 6.3.1
    • Release Notes SanerNow 6.3
    • Release Notes SanerNow 6.2.1
    • Release Notes SanerNow 6.2.0.3
    • Release Notes SanerNow 6.2.0.1
    • Release Notes SanerNow 6.2
    • Release Notes SanerNow 6.1.1
    • Release Notes SanerNow 6.1
    • Release Notes SanerNow 6.0
    • Release Notes SanerNow 5.3.1
    • Release Notes SanerNow 5.3
    • Release Notes SanerNow 5.2
    • Release Notes SanerNow 5.1
    • Release Notes SanerNow 5.0
    • Release Notes SanerNow 4.8.0.0
    • Release Notes SanerNow 4.7.0.0
    • Release Notes SanerNow 4.6.0.0
    • Release Notes SanerNow 4.5.0.0
    • Release Notes SanerNow 4.4.0.0
    • Release Notes SanerNow 4.3.0.0
    • Release Notes SanerNow 4.2.2.1
    • Release Notes SanerNow 4.2.2.0
    • Release Notes SanerNow 4.2.1.0
    • Release Notes SanerNow 4.2.0.0
    • Release Notes SanerNow 4.1.1.0
    • Release Notes SanerNow 4.0.0.5
  • Saner Platform Guide
    • Saner Platform Function Guides
    • Saner Device Management User Guide
  • How Tos
    • General
      • How to increase the subscription count for an Account in Saner CVEM
      • How to increment license count for an Organization in Saner CVEM
      • How to provision Saner tools for an Organization
      • How to change subscription type in Saner CVEM
      • How to sign-up with Saner CVEM?
      • How to create a new account in Saner CVEM?
      • How to create a new user in Saner CVEM?
      • How to enable SSO authentication policy in Saner CVEM?
      • How to set alerts in SanerNow?
      • How to view, download and filter the audit logs?
      • How to designate Saner Agent to perform network scan?
      • How to Co-Brand with your logo?
      • How to fetch the details of the mandatory fields from the Okta account?
      • How to create MFA policy for Okta?
      • How to fetch the details of the mandatory fields from the PingID account?
      • How to create MFA policy for PingID?
      • How to fetch the details of the mandatory fields from the PingOne account?
      • How to create MFA policy for PingOne?
      • How to download and install Saner Agent in Mac?
      • How to download and install Saner agent in Linux?
      • How to download and install the Saner agent in Windows?
      • How to update the expiry date of an existing subscription?
      • How to manage users and their preferences using role-based access?
      • How to uninstall SanerNow Agent using SanerNow Offline deployer tool.
      • How to onboard a new organization?
      • How to deploy SanerNow Agent using SanerNow Offline deployer tool.
      • How to install a Saner agent through the command line?
      • How to uninstall the Saner agent through command line?
    • Saner Reports
      • How to configure mail settings to email Report PDF?
      • How to create a custom report in SanerNow?
      • How to schedule for the report back up?
    • Saner Device Management
      • How to create custom groups in Saner CVEM
    • Saner Mail Settings
      • How to create new mail settings in Saner?
      • How to use OAuth-enabled authentication in Saner mail settings
      • How to create OAuth Client ID and Client Secret for Gmail
      • How to create OAuth Client ID and Client Secret for Microsoft 365.
  • FAQs
    • Saner CVEM Technical FAQs
  • Supported OSs and Platforms
    • Operating Systems and Platforms Supported
    • Supported Third-party Applications for Patching

Saner Cloud

  • Before You Begin
    • Glossary of Terms
    • Read me First
  • Get Started
    • Saner Cloud Deployment Guides
      • Azure Onboarding
      • Troubleshooting
      • Get Started with Saner CNAPP AWS Cloud Deployment V1.0
      • Onboarding with AWS Credentials(Least Recommended Method)
      • Onboarding with AWS Role(Manual)
      • Onboarding with AWS Role CloudFormation (Automatic): Recommended
    • Roles and Permissions
      • Roles and Permissions for AWS Remediation Access
      • Roles and Permissions for Azure Onboarding, Detection, and Remediation
  • Learn About
    • Excessive Permission Categories Evaluated Across Different Cloud Services
    • Publicly Accessible Resources
    • Patch Aging and Patch Impact
    • SecPod Default Benchmarks
    • Watchlists
    • Cloud Workload Protection Platform(CWPP)
    • Overview of Report Views in Saner Cloud
    • Whitelisting Resources
    • Saner Plasma AI Assistant for Seamless User Interaction
    • Critical Events to Monitor in AWS
    • High-Privilege Actions in Critical Activity Logs for AWS
    • Audit Logs in Saner Cloud
    • Excessive Permissions
    • Alerts in SanerCloud
  • User Guides
    • Cloud Security Remediation Management(CSRM) User Guide
    • Cloud Infrastructure Entitlement Management(CIEM) User Guide
    • Cloud Security Posture Anomaly(CSPA) User Guide
    • Cloud Security Asset Exposure(CSAE) User Guide
    • Cloud Security Posture Management(CSPM) User Guide
  • Tell Me How
    • How to Configure Automation Rule to Remediate Misconfigurations?
    • How to Manage Report Views at Organization-level in Saner Cloud?
    • How to Get a Cohesive View from Saner Cloud Unified Dashboard?
    • How to Use Tags to Quickly Filter Resources?
    • How to Troubleshoot Issues with Audit Logs?
    • How to Manage Groups and Tags in Saner Cloud?
    • How to Manage Report Views for a User Account in Saner Cloud?
    • How to Troubleshoot or Analyze with Critical Activity Logs?
    • How to Setup Alerts Across SanerCloud Tools?
    • How to Take Action on Alert Notifications from SanerCloud?
    • CIEM
      • How to See the Active Version for an IAM Policy?
      • How to Troubleshoot or Analyze with Critical Activity Logs?
      • How to View by Type and Usage for any Identity in CIEM?
      • How to Get Visibility into Cloud Entitlements?
      • How to Use Evidence to Address Policies with Excessive Permission?
      • How to Know the Excessive Permissions on a Specific Service?
      • How to Visually See the Relationship between Identity, Entitlement, Policy, or Permission?
      • How to Determine if a Policy has Excessive Permission?
      • How to Initiate Patch Remediation from CIEM Dashboard?
    • CSRM
      • How to Configure Automation Rule to Remediate Misconfigurations?
      • How to Create a Patching Task for Items Currently in “Approval Pending” State?
      • How to Evaluate Remediation Effort with Patching Impact Chart?
      • How to Prioritize and Address Older or High-Risk Anomalies with Patch Aging?
      • How to Monitor the Overall Status of the Remediation Job?
      • How do I Get to Know the Regions Impacted by a Specific Rule?
      • How to View the Severity of a Missing Patch Affected by a Rule?
      • How to Address Missing Patches Via Remediation Tasks?
      • How to Quickly Access the Necessary Tool for Remediation and Begin Patching Tasks?
    • CSAE
      • How to Setup Watchlist Configuration for a Resource?
      • How to Identify Outdated Resources for Cleanup?
      • How does Resource Categorization Work in Saner CSAE?
      • How to Identify Resources Exposed to External Network?
      • How to Understand the Resource Footprint Globally Across Various Regions?
      • How to Make Informed Decisions on Your Expenditure based on Resource Usage Graph?
    • CSPM
      • How to Setup Benchmarks in Saner CSPM?
      • How to Use Quick Evaluation Benchmarks?
      • How to Detect Patterns over a Period with Resource Trends?
      • How to Assess System Compliance and Security Posture?
    • CSPA
      • How to Initiate Patch Remediation from CSPA Dashboard?
      • How to Quickly Identify the Detected and Remediated Anomalies for an Account?
      • How to Prioritize Remediation or Fixes based on Confidence Levels?
      • How to Examine the Overall Anomaly Information for Specific Rules or Checks?
      • How to Search and Retrieve Anomaly Data?
      • How to Whitelist Rules or Resources in Cloud Security Scans?
  • Frequently Asked Questions
    • Saner Cloud Technical FAQs
  • Saner Cloud Release Notes
    • Saner Cloud – V.1.1 Release Notes
    • Saner Cloud – V.1.0 Release Notes
  • Security Intelligence for Saner Cloud
    • Infrastructure Entitlement Checks in AWS and Azure
      • Implementing Infrastructure Entitlement Checks in Azure
      • Implementing Infrastructure Entitlement Checks in AWS
    • Posture Anomaly Checks in AWS and Azure
      • Implementing Posture Anomaly Checks in AWS
      • Implementing Posture Anomaly Checks in Azure
    • Benchmark Compliance Rules in AWS and Azure
      • AWS
        • Implementing SecPod Default Rules in AWS
          • Implementing SecPod Global Rules in AWS
          • Implementing SecPod Regional Rules in AWS
        • PCI DSS 3.2.1 Rules in AWS
          • Understand SOC2 Regional Rules in Azure
          • Introduction
          • Understand PCI DSS 3.2.1 Global Rules in AWS
          • Understand PCI DSS 3.2. 1 Regional in AWS
        • CIS 3.0.0 and 4.0.0 Rules in AWS
          • Introduction
          • Understand CIS 3.0.0 Global Rules in AWS
          • Understand CIS 4.0.0 Global Rules in AWS
          • Understand CIS 3.0.0 Regional Rules in AWS
          • Understand CIS 4.0.0 Regional Rules in AWS
        • NIST 800-53 Revision 5 Rules in AWS
          • Introduction
          • Understand NIST 800-53 revision 5 Global Rules in AWS
          • Understand NIST 800-53 revision 5 Regional Rules in AWS
        • SOC
          • Implementing SOC 2 Regional Rules in AWS
          • Implementing SOC 2 Global Rules in AWS
        • Implementing HIPAA HITRUST Rules
          • Implementing HIPAA HITRUST Global Rules in AWS
          • Implementing HIPAA HITRRUST Regional Rules in AWS
      • Azure
        • HIPAA HITRUST Rules in Azure
          • Understand HIPAA HITRUST 14.7.0 Rules in Azure
          • Understand HIPAA HITRUST 14.7.0 Global Rules in Azure
          • Understand HIPAA HITRUST 14.7.0 Regional Rules in Azure
        • PCI DSS Rules in Azure
          • Understand PCI DSS 4.0 Rules in Azure
          • Understand PCI DSS 4.0 Global Rules in Azure
          • Understand PCI DSS 4.0 Regional Rules in Azure
        • SOC Rules in Azure
          • Understand SOC2 Rules in Azure
          • Understand SOC2 Global Rules in Azure
          • Understand SOC2 Regional Rules in Azure
        • CIS Rules in Azure
          • Understand CIS 1.1.0 Benchmark Compliance Rules in Azure
          • Understand CIS 3.0.0 Benchmark Compliance Rules in Azure
          • Understand CIS 1.2.0 Global Benchmark Compliance Rules in Azure
          • Understand CIS 2.1.0 Global Benchmark Compliance Rules in Azure
          • Understand CIS 3.0.0 Global Benchmark Compliance Rules in Azure
          • Understand CIS 2.0.0 Regional Benchmark Compliance Rules in Azure
          • Understand CIS 2.1.0 Regional Benchmark Compliance Rules in Azure
          • Understand CIS 3.0.0 Regional Benchmark Compliance Rules in Azure
        • NIST 800-53 Revision Rules in Azure
          • Understand NIST 800-53 Revision 5 Rules in Azure
          • Understand NIST 800-53 Revision 5 Global Rules in Azure
          • Understand NIST 800-53 Revision 5 Regional Rules in Azure
        • SecPod Rules in Azure
          • Understand SecPod Global Rules in Azure
          • Understand SecPod Regional Rules in Azure
          • Understand SecPod Default Rules in Azure

Saner CVEM

  • Saner CVEM Release Notes
    • Release Notes Saner 6.4.1
    • Release Notes SanerNow 6.4
    • Release Notes SanerNow 6.3.1
    • Release Notes SanerNow 6.3
    • Release Notes SanerNow 6.2.1
    • Release Notes SanerNow 6.2.0.3
    • Release Notes SanerNow 6.2.0.1
    • Release Notes SanerNow 6.2
    • Release Notes SanerNow 6.1.1
    • Release Notes SanerNow 6.1
    • SanerNow Risk Prioritization Launch
    • Release Notes SanerNow 6.0
    • Release Notes SanerNow 5.3.1
    • Release Notes SanerNow 5.3
    • Release Notes SanerNow 5.2
    • Release Notes SanerNow 5.1
    • Release Notes SanerNow 5.0
    • Release Notes SanerNow 4.8.0.0
    • Release Notes SanerNow 4.7.0.0
    • Release Notes SanerNow 4.6.0.0
    • Release Notes SanerNow 4.5.0.0
    • Release Notes SanerNow 4.4.0.0
    • Release Notes SanerNow 4.3.0.0
    • Release Notes SanerNow 4.2.2.1
    • Release Notes SanerNow 4.2.2.0
    • Release Notes SanerNow 4.2.1.0
    • Release Notes SanerNow 4.2.0.0
    • Release Notes SanerNow 4.1.1.0
    • Release Notes SanerNow 4.0.0.5
  • Saner CVEM Guide
    • What’s New in Saner CVEM?
    • Getting Started with Saner CVEM
    • Pre-requisites for Saner CVEM Deployment
    • How does Saner CVEM’s deployment architecture work?
  • Saner CVEM Products
    • Overview of Saner Continuous Vulnerability and Exposure Management
    • Saner CVEM Unified Dashboard User Guide
    • Saner CVEM Asset Exposure User Guide
    • Saner CVEM Continuous Posture Anomaly Management User Guide
    • Data Points IT teams can Fetch from Saner CPAM
    • Posture Anomaly Computation Rules
    • Saner CVEM Vulnerability Management User Guide
    • Saner CVEM Compliance Management User Guide
    • Saner CVEM Risk Prioritization User Guide
    • Saner CVEM Patch Management User Guide
    • Saner CVEM Endpoint Management User Guide
    • Saner CVEM Remote Access User Guide
    • Saner CVEM Network Scanner User Guide
    • Saner CVEM Cyber Hygiene Score User Guide
  • How Tos
    • Saner CPAM
      • How to create new response in PA tool?
      • How to build your own detection and response in PA tool?
      • How to whitelist an entire PA ID?
      • How to configure Posture Anomaly tool for custom detection?
      • How to fix Anomalies from PA dashboard?
      • How to fix anomalies detected in your account from All Anomalies Page?
      • How to fix anomalies from PA Summary page?
      • How to delete PA scan preferences?
      • How to schedule PA Scans on Daily, Weekly, and Monthly basis?
      • How to launch Posture Anomaly scans?
    • Saner AE
      • How to blacklist and whitelist applications in Saner AE?
      • How to manage asset licenses using Saner AE?
      • How to run an asset scan using Saner AE?
    • Saner VM
      • How to automate and schedule vulnerability scans?
      • How to exclude vulnerabilities in Saner VM tool
      • How to manage excluded vulnerabilities in Saner VM?
      • How to remediate vulnerabilities from vulnerability management dashboard?
    • Saner CM
      • How to run a compliance scan?
      • How to custom create a security policy?
      • How to align with PCI security compliance management?
      • How to align with NIST 800-171 security compliance management?
      • How to align with NIST 800-53 security compliance management?
      • How to align with HIPAA security compliance management using Saner CM?
    • Saner PM
      • How to fix firmware in Saner?
      • How to exclude patches in Saner PM?
      • How to manage excluded patches in Saner PM?
      • How to automate patch management in Saner PM?
      • How to roll back patches in Saner PM?
      • How to specify Service Level Agreement (SLA) using Remediation SLA in Saner PM?
      • How to apply missing patches in Saner PM?
      • How to apply the most critical patches in Saner PM?
      • How to perform custom remediation for applications that require paid patches using Saner PM
      • How to check the status of patching activity?
    • Saner EM
      • How to collect all security events from Windows Events Log?
      • How to check password policy set in Windows systems?
      • How to check status of DEP in Windows systems?
      • How to check faulty Anti-Virus (AV) status in Windows systems?
      • How to check for Anti-Virus (AV) status in Windows systems?
      • How to check account lockout policy on Windows systems?
      • How to check if Bit-locker protection is OFF in Windows systems?
      • How to list all inactive users on Windows systems?
      • How to list all guest accounts in Windows systems?
      • How to list all Administrator accounts on Windows systems?
      • How to list last-logon details of users on Windows systems?
      • How to identify all users in Windows systems?
      • How to collect all services that are currently running in Windows systems?
      • How to list all Groups in Windows systems?
      • How to collect all keyboard and pointing devices connected to Windows systems?
      • How to collect all storage devices connected to Windows systems?
      • How to investigate total RAM or CPU threshold (greater than or equal to 80%) in Windows systems?
      • How to collect operating systems information in Windows?
      • How to investigate disks running out of space (<100 MB) in Windows systems?
      • How to collect and investigate disk information on Windows systems?
      • How to collect all installed patches in Windows systems?
      • How to collect all software patches that are hidden in the Windows Update server?
      • How to check the status of Windows Update Server (WSUS/SCCM)?
      • How to collect BIOS information such as serial number, version, manufacturer in Windows systems?
      • How to collect all the important missing patches in Windows systems?
      • How to check wireless security in Linux systems?
      • How to collect mounted disk information on Linux systems?
      • How to check wireless signal quality in Linux systems?
      • How to check all firewall policies on Linux systems?
      • How to collect all Dynamic Host Configuration Protocol (DHCP) information on Linux systems?
      • How to collect DNS information on Linux systems?
      • How to collect ARP entries that are created when a hostname is resolved to an IP address and then to a MAC addressing in Linux?
      • How to check wireless signal quality in Windows systems?
      • How to check wireless security in Windows systems?
      • How to collect all open ports in Windows systems?
      • How to collect all network interfaces in Windows systems?
      • How to investigate DNS cache on Windows systems?
      • How to check all firewall policies on Windows systems?
      • How to collect DNS information on Windows systems?
      • How to collect all the applications with an unknown publisher in Linux systems?
      • How to perform system tuning?
      • How to collect all software licenses in Windows systems?
      • How to identify potentially unwanted programs such as torrent downloaders or unnecessary toolbars running on Windows systems?
      • How to collect a list of applications that are started when you boot your computer?
      • How to collect all the applications with an unknown publisher in Windows systems?
      • How to collect all software licenses in Mac systems?
      • How to collect ARP entries that are created when a hostname is resolved to an IP address and then to a MAC addressing Windows?
      • How to collect all families of operating systems such as Windows, Unix, and macOS?
      • How to collect environment variables set in all operating systems?
      • How to collect all the applications with an unknown publisher in Mac systems?
      • How to delete and quarantine a file?
      • How to start and stop the processes in Saner?
      • How to block blacklisted applications in Saner?
      • How to enable/disable devices in Saner
      • How to manually import devices into Saner?
      • How to deploy software in Saner EM?
      • How to enable and disable firewall settings in Saner AE?
      • How to collect all shared resources on Windows systems?
      • How to collect all Dynamic Host Configuration Protocol (DHCP) information on Windows systems?
      • How to connect to a client machine graphically using Saner Remote Access
  • FAQs
    • Saner CVEM Technical FAQs

Security Intelligence

  • Network Scanner Product Support Matrix
  • Privilege levels for authenticated scans using Saner Network Scanner
  • Overview of Security Content and Intelligence
  • Security Content Statistics
  • Application and OS Remediation Coverage
  • Compliance Benchmark Coverage
  • List of Vulnerability to Exploit/Malware Mapping covered in Saner
  • OVAL Definitions Family-wise Distribution
  • OVAL Definitions Class-wise Distribution
  • OVAL Definitions Platform Coverage
View Categories
  • Home
  • Docs
  • Saner Cloud
  • Security Intelligence for Saner Cloud
  • Benchmark Compliance Rules in AWS and Azure
  • Azure
  • CIS Rules in Azure
  • Understand CIS 3.0.0 Global Benchmark Compliance Rules in Azure

Understand CIS 3.0.0 Global Benchmark Compliance Rules in Azure

Print Friendly, PDF & Email

Interpretation of the Columns in Benchmark Compliance Rules:

Rule ID: A unique identifier for the specific security rule or check

Title: A brief description of the security issue or misconfiguration

Severity — Low to High: Determines the risk of being exposed to attacks

Service Type: The AWS service affected or evaluated by the rule

Resource Type: The specific AWS resource being audited

Rule IDTitleDescriptionSeverityService TypeResource Type
CSPM-AZURE-2024-0001The Use of Guest Users DetectedRefrain from generating guest users, as they are often incorporated outside the established employee onboarding and offboarding procedures. This practice could inadvertently go unnoticed indefinitely, introducing a potential security vulnerability.MediumMicrosoft Graph APIGuest Users
CSPM-AZURE-2024-0047Microsoft Cloud App Security (MCAS) is Disabled in Security CenterSecurity Center provides an additional layer of protection by leveraging Azure Resource Manager events, which serve as the control plane for Azure. Through analysis of these Azure Resource Manager records, Security Center identifies unusual or potentially harmful operations within the Azure subscription environment. It’s worth noting that several of the analytics mentioned are powered by Microsoft Cloud App Security.HighSecuritySecurity Settings
CSPM-AZURE-2024-0048Windows Defender ATP (WDATP) is Disabled in Security CenterThe integration of Windows Defender Advanced Threat Protection (WDATP) into Azure Security Center provides extensive Endpoint Detection and Response (EDR) capabilities. This integration enables the identification of anomalies and the detection and response to advanced attacks on Windows server endpoints. Windows Defender ATP within Security Center supports detection on operating systems such as Windows Server 2016, 2012 R2, and 2008 R2 SP1 in a Standard service subscription.HighSecuritySecurity Settings
CSPM-AZURE-2024-0082Ensure Security Defaults is enabled on Microsoft Entra IDSecurity defaults in Microsoft Entra ID simplify the process of securing your organization and enhancing protection. These defaults include preconfigured settings designed to guard against common attacks. Available to all users, security defaults aim to provide a fundamental level of security at no additional cost. You can enable these defaults through the Azure portal.MediumMicrosoft Entra IDSecurity Defaults
CSPM-AZURE-2024-0086Ensure Trusted Locations Are Defined (Manual)In Azure Active Directory, it’s important to define trusted locations to enhance security and streamline access control. Trusted locations are IP ranges or geographic areas from which users can access resources with fewer security restrictions, such as bypassing certain Conditional Access policies. To verify that trusted locations are properly defined, log in to the Azure portal, navigate to Azure Active Directory, and go to ‘Security’ > ‘Conditional Access’ > ‘Named locations.’ Ensure that appropriate trusted locations are configured to balance security with user convenience. Manually review and update these settings as necessary to ensure that they align with your organization’s security requirements and access policies.MediumMicrosoft Entra ID Conditional AccessNamed Locations
CSPM-AZURE-2024-0104Ensure That ‘Guest users access restrictions’ is set to ‘Guest user access is restricted to properties and memberships of their own directory objects’ (Manual)This helps prevent unauthorized access to sensitive data within your Azure environment. By restricting guest users to their own resources, you can reduce the risk of data breaches and maintain a secure perimeter.MediumMicrosoft Entra IDAuthorization Policies
CSPM-AZURE-2024-0105Ensure that ‘Guest invite restrictions’ is set to “Only users assigned to specific admin roles can invite guest users” (Manual)To enhance security and maintain control over guest user access, ensure that only users with designated administrative roles have the authority to invite external users to your Azure environment. This restriction helps prevent unauthorized access and mitigate potential risks.MediumMicrosoft Entra IDAuthorization Policies
CSPM-AZURE-2024-0114Ensure That Microsoft Defender for App Services Is Set To ‘On’ (Automated)Enabling Microsoft Defender for App Service activates advanced threat detection, including threat intelligence, anomaly detection, and behavior analytics, within Microsoft Defender for Cloud. This provides automated protection, helping to secure your App Service applications against potential threats.MediumMicrosoft DefenderSecurity Configurations
CSPM-AZURE-2024-0115Ensure That Microsoft Defender for (Managed Instance) Azure SQL Databases Is Set To ‘On’ (Automated)By enabling Microsoft Defender for Azure SQL Databases, you activate threat detection for your Managed Instance databases. This feature provides advanced threat intelligence, anomaly detection, and behavior analytics through Microsoft Defender for Cloud, helping safeguard your databases with proactive, automated protection against potential security threats.HighMicrosoft DefenderSecurity Configurations
CSPM-AZURE-2024-0116Ensure That Microsoft Defender for SQL Servers on Machines Is Set To ‘On’ (Automated)Enabling Microsoft Defender for SQL servers on machines activates threat detection for SQL servers hosted on machines. This feature provides advanced threat intelligence, anomaly detection, and behavior analytics through Microsoft Defender for Cloud, offering proactive protection to help secure your SQL servers from potential threats.HighMicrosoft DefenderPricings
CSPM-AZURE-2024-0117Ensure That Microsoft Defender for Open Source Relational Databases Is Set To ‘On’ (Automated)Enabling Microsoft Defender for open-source relational databases activates comprehensive threat detection capabilities tailored for these databases. This feature leverages advanced threat intelligence, anomaly detection, and behavior analytics within Microsoft Defender for Cloud to provide continuous monitoring and proactive security. By doing so, it ensures that your open-source relational databases are safeguarded against potential vulnerabilities and emerging threats, offering robust, automated protection in a cloud environment.MediumMicrosoft DefenderPricings
CSPM-AZURE-2024-0118Ensure That Microsoft Defender for Azure Cosmos DB Is Set To ‘On’ (Automated)Microsoft Defender for Azure Cosmos DB continuously monitors and scans all incoming network requests for potential threats targeting your Azure Cosmos DB resources. This provides proactive security, ensuring that your data is protected from malicious activities and vulnerabilities by detecting and responding to threats in real-time.HighMicrosoft DefenderPricings
CSPM-AZURE-2024-0119Ensure That Microsoft Defender for Storage Is Set To ‘On’ (Automated)Enabling Microsoft Defender for Storage activates advanced threat detection for your storage accounts. This includes real-time threat intelligence, anomaly detection, and behavior analytics, all integrated within Microsoft Defender for Cloud. These capabilities help protect your storage resources by identifying and responding to potential security threats, ensuring enhanced data security and proactive risk management.HighMicrosoft DefenderPricings
CSPM-AZURE-2024-0120Ensure That Microsoft Defender for Containers Is Set To ‘On’ (Automated)Enabling Microsoft Defender for Containers activates advanced threat detection for Container Registries and Kubernetes environments. It utilizes threat intelligence, anomaly detection, and behavior analytics in Microsoft Defender for Cloud to enhance security. Key features include continuous monitoring, compliance enforcement with Azure Policy for Kubernetes, agentless resource discovery, and vulnerability assessments for container images. These tools provide comprehensive protection for your containerized applications.HighMicrosoft DefenderPricings
CSPM-AZURE-2024-0121Ensure That Microsoft Defender for Key Vault Is Set To ‘On’ (Automated)Enabling Microsoft Defender for Key Vault activates threat detection for your Key Vault resources, utilizing advanced threat intelligence, anomaly detection, and behavior analytics within Microsoft Defender for Cloud. This proactive approach enhances the security of your sensitive data by identifying and responding to potential threats, ensuring that your Key Vault remains protected against unauthorized access and vulnerabilities.HighMicrosoft DefenderSecurity Configurations
CSPM-AZURE-2024-0122Ensure That Microsoft Defender for DNS Is Set To ‘On’ (Automated)Microsoft Defender for DNS monitors and scans all network traffic leaving your subscription, providing critical insights into potential security threats. This service helps identify suspicious DNS activity, ensuring that any malicious behavior is detected and addressed promptly. As of August 1, customers with an existing subscription to Defender for DNS can continue using the service, while new subscribers will receive alerts about suspicious DNS activity as part of Defender for Servers P2, enhancing their overall security posture.HighMicrosoft DefenderSecurity Configurations
CSPM-AZURE-2024-0123Ensure That Microsoft Defender for Resource Manager Is Set To ‘On’ (Automated)Microsoft Defender for Resource Manager actively scans incoming administrative requests aimed at modifying your infrastructure, whether they originate from the command-line interface (CLI) or the Azure portal. This proactive monitoring helps detect and mitigate potential security threats, ensuring that unauthorized changes are identified and addressed swiftly, thereby enhancing the overall security and integrity of your cloud resources.HighMicrosoft DefenderSecurity Configurations
CSPM-AZURE-2024-0129Ensure that Microsoft Defender External Attack Surface Monitoring (EASM)An organization’s attack surface includes assets with public network identifiers or URIs that external threat actors can access from outside the cloud. A larger attack surface increases security challenges. Defender EASM can scan your infrastructure, including domains, hosts, CIDR blocks, and SSL certificates, and store them in an inventory. This inventory, generated by scanning provided Seeds (FQDNs, IP CIDR blocks, WHOIS records), includes insights such as vulnerabilities (CVEs), open ports, and weak SSL certificates. Within 24-48 hours, results are classified as High/Medium/Low, along with proposed mitigations for potential risks.HighMicrosoft DefenderSecurity Configurations
CSPM-AZURE-2024-0130Ensure That Microsoft Defender for IoT Hub Is Set To ‘On’ (Manual)Microsoft Defender for IoT serves as a central security hub for managing and protecting IoT devices across your organization. It provides continuous monitoring, threat detection, and response capabilities, ensuring that all connected devices are safeguarded against potential security risks. By integrating with Microsoft Defender for Cloud, it offers a comprehensive view of your IoT environment, helping to identify vulnerabilities and prevent cyberattacks, while maintaining a secure and resilient infrastructure for your IoT operations.HighMicrosoft DefenderSecurity Configurations
CSPM-AZURE-2024-0167-01Ensure that SKU Basic/Consumption is not used on artifacts that need to be monitored (Particularly for Production Workloads)Although Basic or Free SKUs in Azure may offer cost savings, they have considerable limitations in terms of monitoring and support. These lower-tier SKUs often do not include full service level agreements (SLAs) and may not be eligible for Microsoft support. Consequently, Basic/Free SKUs are unsuitable for production workloads, where strong monitoring, reliability, and support are essential. To ensure optimal performance and support in production environments, always choose higher-tier SKUs.MediumVirtual NetworksPublic IP Addresses
CSPM-AZURE-2024-0167-02Ensure that SKU Basic/Consumption is not used on artifacts that need to be monitored (Particularly for Production Workloads)While Basic or Free SKUs in Azure may be cost-effective, they come with significant limitations regarding monitoring and support. These SKUs typically lack comprehensive service level agreements (SLAs) and may not qualify for Microsoft support. As a result, Basic/Free SKUs should never be used for production workloads, where robust monitoring, reliability, and support are critical. For production environments, always opt for higher-tier SKUs to ensure adequate performance and support.MediumLoad BalancerLoad Balancer
CSPM-AZURE-2024-0167-05Ensure that SKU Basic/Consumption is not used on artifacts that need to be monitored (Particularly for Production Workloads)While Basic or Free SKUs in Azure may be cost-effective, they come with significant limitations regarding monitoring and support. These SKUs typically lack comprehensive service level agreements (SLAs) and may not qualify for Microsoft support. As a result, Basic/Free SKUs should never be used for production workloads, where robust monitoring, reliability, and support are critical. For production environments, always opt for higher-tier SKUs to ensure adequate performance and support.MediumSQL DatabaseDatabase
Share This Article :
  • X
  • LinkedIn
Still stuck? How can we help?

Saner Documentation Feedback

Understand CIS 2.1.0 Global Benchmark Compliance Rules in AzureUnderstand CIS 2.0.0 Regional Benchmark Compliance Rules in Azure
Copyright 2025 - SecPod. All Rights Reserved. Privacy Policy.
SanerNow Version 6.3.x