Closed BernieWhite closed 2 years ago
I am working on mapping the rules to the ASB alphabetically starting with ACR.
I have finished mapping the rules and will have them all included in a PR with the baseline for #1634
These are the common controls across most Azure Resources
NS-1 Establish network segmentation boundaries (VNet integration) AM-1 Track asset inventory and their risks (Tags) AM-2 Use only approved services (Azure Policy Enforcement) LT-1 Enable Threat detection capabilities (defender enabled) LT-2 Threat detection for identity and access management (defender enabled) LT-3 Enable Logging for Security investigation (logging enabled) IM-1 Use centralized identity and authentication system (AAD in use for example SQL and service fabric) IM-3 Manage application identities securely and automatically (private endpoints where applicable) PV-2 Audit and ensure secure configuration (see xlsx) PV-6 Rapidly and automatically remediate vulnerabilities (see xlsx) DP-3 Encrypt sensitive data in transit (TLS)
@jagoodwin Ok awesome. We can focus on adding rules for these. Then we can look at others as they come up.
Discussed in https://github.com/Azure/PSRule.Rules.Azure/discussions/1244
This enhancement aims to map rules from the Security pillar to Azure Security Benchmark.
Rules will be tagged with:
Azure.WAF/pillar
which will be set toSecurity
Rules will be labeled with (to support mapping to multiple controls if applicable):
Azure.ASB.v3/control
which will be set to the control ID from ASB.Syntax:
For example, in YAML:
For example in PowerShell:
Rules that are already mapped include: