Interpretation of the Columns in Benchmark Compliance Rules:
Rule ID: A unique identifier for the specific security rule or check
Title: A brief description of the security issue or misconfiguration
Severity — Low to High: Determines the risk of being exposed to attacks
Service Type: The AWS service affected or evaluated by the rule
Resource Type: The specific AWS resource being audited
Rule ID | Title | Severity | Service Type | Resource Type |
---|---|---|---|---|
Rule ID | Title | Severity | Service Type | Resource Type |
CSPM-AZURE-2024-0001 | The Use of Guest Users Detected | Medium | Microsoft Graph API | Guest Users |
CSPM-AZURE-2024-0003 | App Service Authentication is Disabled | High | Web | Authentication Settings |
CSPM-AZURE-2024-0005 | FTP Deployment is Enabled. | High | Web | App Configuration |
CSPM-AZURE-2024-0006 | HTTP 2.0 Disabled | Medium | Web | App Configuration |
CSPM-AZURE-2024-0007 | HTTP traffic is Permitted | High | Web | Apps |
CSPM-AZURE-2024-0011 | Web Application is using an Outdated PHP Version | High | Web | App Configuration |
CSPM-AZURE-2024-0012 | Web Application is using an Outdated Python Version | High | Web | App Configuration |
CSPM-AZURE-2024-0013 | Insecure TLS Version Detected | High | Web | Apps |
CSPM-AZURE-2024-0015 | Key Vault, if deleted or purged, is Not Recoverable | High | Key Vault | Key Vaults |
CSPM-AZURE-2024-0017 | Key Vault Role Based Access Control Disabled | High | Key Vault | Key Vaults |
CSPM-AZURE-2024-0047 | Microsoft Cloud App Security (MCAS) is Disabled in Security Center | Critical | Security | Security Settings |
CSPM-AZURE-2024-0071 | Secure Transfer (HTTPS) is Not Enforced on Storage Accounts | Critical | Storage | Storage Accounts |
CSPM-AZURE-2024-0074 | Storage Accounts Allows Public Access | High | Storage | Storage Accounts |
CSPM-AZURE-2024-0075 | Storage Account Soft Delete is Disabled | Medium | Storage | Blob Services |
CSPM-AZURE-2024-0076 | “Allow trusted Microsoft services” is Disabled on Storage Accounts | Medium | Storage | Storage Accounts |
CSPM-AZURE-2024-0082 | Ensure Security Defaults is enabled on Microsoft Entra ID | Microsoft Entra ID | Security Defaults | |
CSPM-AZURE-2024-0086 | Ensure Trusted Locations Are Defined (Manual) | Critical | Microsoft Entra ID Conditional Access | Named Locations |
CSPM-AZURE-2024-0104 | Ensure That ‘Guest users access restrictions’ is set to ‘Guest user access is restricted to properties and memberships of their own directory objects’ (Manual) | Critical | Microsoft Entra ID | Authorization Policies |
CSPM-AZURE-2024-0105 | Ensure that ‘Guest invite restrictions’ is set to “Only users assigned to specific admin roles can invite guest users” (Manual) | Critical | Microsoft Entra ID | Authorization Policies |
CSPM-AZURE-2024-0114 | Ensure That Microsoft Defender for App Services Is Set To ‘On’ (Automated) | Critical | Microsoft Defender | Security Configurations |
CSPM-AZURE-2024-0115 | Ensure That Microsoft Defender for (Managed Instance) Azure SQL Databases Is Set To ‘On’ (Automated) | Critical | Microsoft Defender | Security Configurations |
CSPM-AZURE-2024-0116 | Ensure That Microsoft Defender for SQL Servers on Machines Is Set To ‘On’ (Automated) | Critical | Microsoft Defender | Pricings |
CSPM-AZURE-2024-0117 | Ensure That Microsoft Defender for Open Source Relational Databases Is Set To ‘On’ (Automated) | Critical | Microsoft Defender | Pricings |
CSPM-AZURE-2024-0118 | Ensure That Microsoft Defender for Azure Cosmos DB Is Set To ‘On’ (Automated) | Critical | Microsoft Defender | Pricings |
CSPM-AZURE-2024-0119 | Ensure That Microsoft Defender for Storage Is Set To ‘On’ (Automated) | Critical | Microsoft Defender | Pricings |
CSPM-AZURE-2024-0120 | Ensure That Microsoft Defender for Containers Is Set To ‘On’ (Automated) | Critical | Microsoft Defender | Pricings |
CSPM-AZURE-2024-0121 | Ensure That Microsoft Defender for Key Vault Is Set To ‘On’ (Automated) | Critical | Microsoft Defender | Security Configurations |
CSPM-AZURE-2024-0122 | Ensure That Microsoft Defender for DNS Is Set To ‘On’ (Automated) | Critical | Microsoft Defender | Security Configurations |
CSPM-AZURE-2024-0123 | Ensure That Microsoft Defender for Resource Manager Is Set To ‘On’ (Automated) | Critical | Microsoft Defender | Security Configurations |
CSPM-AZURE-2024-0129 | Ensure that Microsoft Defender External Attack Surface Monitoring (EASM) | Critical | Microsoft Defender | Security Configurations |
CSPM-AZURE-2024-0130 | Ensure That Microsoft Defender for IoT Hub Is Set To ‘On’ (Manual) | Critical | Microsoft Defender | Security Configurations |
CSPM-AZURE-2024-0131 | Ensure that “Enable Infrastructure Encryption” for Each Storage Account in Azure Storage is Set to “enabled” (Automated) | Critical | Storage Resource Provider | Storage Accounts |
CSPM-AZURE-2024-0132 | Ensure that ‘Enable key rotation reminders’ is enabled for each Storage Account (Manual) | Critical | Storage Resource Provider | Storage Accounts |
CSPM-AZURE-2024-0133 | Ensure that Storage Account Access Keys are Periodically Regenerated (Manual) | Medium | Storage Resource Provider | Storage Accounts |
CSPM-AZURE-2024-0136 | Ensure Default Network Access Rule for Storage Accounts is Set to Deny (Automated) | Critical | Storage Resource Provider | Storage Accounts |
CSPM-AZURE-2024-0141 | Ensure the “Minimum TLS version” for storage accounts is set to “Version 1.2” (Automated) | Critical | Storage Resource Provider | Storage Accounts |
CSPM-AZURE-2024-0151 | Use Entra ID Client Authentication and Azure RBAC where possible. (Manual) | Critical | Cosmos DB Resource Provider | Cosmos DB Account |
CSPM-AZURE-2024-0154 | Ensure that Network Security Group Flow logs are captured and sent to Log Analytics (Manual) | Critical | Network Watchers | Network Watchers Flow Logs |
CSPM-AZURE-2024-0167-01 | Ensure that SKU Basic/Consumption is not used on artifacts that need to be monitored (Particularly for Production Workloads) | Critical | Virtual Networks | Public IP Addresses |
CSPM-AZURE-2024-0167-02 | Ensure that SKU Basic/Consumption is not used on artifacts that need to be monitored (Particularly for Production Workloads) | Critical | Load Balancer | Load Balancer |
CSPM-AZURE-2024-0167-03 | Ensure that SKU Basic/Consumption is not used on artifacts that need to be monitored (Particularly for Production Workloads) | Critical | Redis Cache | Redis Cache |
CSPM-AZURE-2024-0167-04 | Ensure that SKU Basic/Consumption is not used on artifacts that need to be monitored (Particularly for Production Workloads) | Critical | SQL Database | SQL Database |
CSPM-AZURE-2024-0167-05 | Ensure that SKU Basic/Consumption is not used on artifacts that need to be monitored (Particularly for Production Workloads) | Critical | SQL Database | Database |
CSPM-AZURE-2024-0186 | Ensure that Register with Entra ID is enabled on App Service (Automated) | Critical | App Service | Apps |