Interpretation of the Columns in Benchmark Compliance Rules:
Rule ID: A unique identifier for the specific security rule or check
Title: A brief description of the security issue or misconfiguration
Severity — Low to High: Determines the risk of being exposed to attacks
Service Type: The AWS service affected or evaluated by the rule
Resource Type: The specific AWS resource being audited
Rule ID | Title | Severity | Service Type | Resource Type |
---|---|---|---|---|
CSPM-AZURE-2024-0003 | App Service Authentication is Disabled | High | Web | Authentication Settings |
CSPM-AZURE-2024-0005 | FTP Deployment is Enabled. | High | Web | App Configuration |
CSPM-AZURE-2024-0006 | HTTP 2.0 Disabled | Medium | Web | App Configuration |
CSPM-AZURE-2024-0007 | HTTP traffic is Permitted | High | Web | Apps |
CSPM-AZURE-2024-0011 | Web Application is using an Outdated PHP Version | High | Web | App Configuration |
CSPM-AZURE-2024-0012 | Web Application is using an Outdated Python Version | High | Web | App Configuration |
CSPM-AZURE-2024-0013 | Insecure TLS Version Detected | High | Web | Apps |
CSPM-AZURE-2024-0015 | Key Vault, if deleted or purged, is Not Recoverable | High | Key Vault | Key Vaults |
CSPM-AZURE-2024-0017 | Key Vault Role Based Access Control Disabled | High | Key Vault | Key Vaults |
CSPM-AZURE-2024-0071 | Secure Transfer (HTTPS) is Not Enforced on Storage Accounts | Critical | Storage | Storage Accounts |
CSPM-AZURE-2024-0074 | Storage Accounts Allows Public Access | High | Storage | Storage Accounts |
CSPM-AZURE-2024-0075 | Storage Account Soft Delete is Disabled | Medium | Storage | Blob Services |
CSPM-AZURE-2024-0076 | “Allow trusted Microsoft services” is Disabled on Storage Accounts | Medium | Storage | Storage Accounts |
CSPM-AZURE-2024-0131 | Ensure that “Enable Infrastructure Encryption” for Each Storage Account in Azure Storage is Set to “enabled” (Automated) | Critical | Storage Resource Provider | Storage Accounts |
CSPM-AZURE-2024-0132 | Ensure that ‘Enable key rotation reminders’ is enabled for each Storage Account (Manual) | Critical | Storage Resource Provider | Storage Accounts |
CSPM-AZURE-2024-0133 | Ensure that Storage Account Access Keys are Periodically Regenerated (Manual) | Medium | Storage Resource Provider | Storage Accounts |
CSPM-AZURE-2024-0136 | Ensure Default Network Access Rule for Storage Accounts is Set to Deny (Automated) | Critical | Storage Resource Provider | Storage Accounts |
CSPM-AZURE-2024-0151 | Use Entra ID Client Authentication and Azure RBAC where possible. (Manual) | Critical | Cosmos DB Resource Provider | Cosmos DB Account |
CSPM-AZURE-2024-0154 | Ensure that Network Security Group Flow logs are captured and sent to Log Analytics (Manual) | Critical | Network Watchers | Network Watchers Flow Logs |
CSPM-AZURE-2024-0167-03 | Ensure that SKU Basic/Consumption is not used on artifacts that need to be monitored (Particularly for Production Workloads) | Critical | Redis Cache | Redis Cache |
CSPM-AZURE-2024-0167-04 | Ensure that SKU Basic/Consumption is not used on artifacts that need to be monitored (Particularly for Production Workloads) | Critical | SQL Database | SQL Database |
CSPM-AZURE-2024-0186 | Ensure that Register with Entra ID is enabled on App Service (Automated) | Critical | App Service | Apps |