Azure / missionlz

Azure landing zone for SCCA-compliant organizations.
MIT License
236 stars 134 forks source link

NIST Log Analytics Compliance #313

Open shawngib opened 3 years ago

shawngib commented 3 years ago

Benefit/Result/Outcome
Review non-compliant policies of the default built in NIST 800-53 initiative and decide:

does the policy require work in Terraform to make compliant or do we simply need to document additional work needed by customer to make compliant

Description

Log Analytics Workspace

Policy Description
Saved-queries in Azure Monitor should be saved in customer storage account for logs encryption Link storage account to Log Analytics workspace to protect saved-queries with storage account encryption. Customer-managed keys are commonly required to meet regulatory compliance and for more control over the access to your saved-queries in Azure Monitor. For more details on the above

References:

Acceptance Criteria

shawngib commented 3 years ago

@brooke-hamilton Turns out this is a larger discussion around the correct 'central logging model' needed and used. Some considerations: