ssc-spc-ccoe-cei / azure-guardrails-solution-accelerator

This implementation automates reporting to verify compliance with GC Cloud Guardrails. SSC and TBS review the results. Cette mise en œuvre automatise la production de rapports afin de vérifier la conformité aux mesures de sécurité infonuagique du GC. SPC et SCT examinent les résultats.
Other
11 stars 4 forks source link

GR1 | Validation 5 | Alerts to Flag Misuse and Suspicious Activities (M) #169

Open MathesonSho opened 3 months ago

MathesonSho commented 3 months ago

ItemName: Alerts to Flag Misuse and Suspicious Activities (M) ItemName FR:

Updated on 2024-11-04

Description: This is a new control for the validation “Confirm that alerts to the authorized personnel have been implemented to flag misuse or suspicious activities for all user accounts”. This control will focus on the guidance provided in the GC Event Logging Guidance Table A‑14 Cloud Environments.

It will look at the configuration of Azure Monitor Alerts for the following "suspicious" activities.

  1. Any activity on Breakglass account(s)
  2. Conditional access policy changes

General Flow:

  1. Check Alert Rule Configuration (does is monitor what it's supposed to?)
  2. Check Action Group Results (is it sending alerts to someone?)

Potential Check Flow 1:

Potential Check Flow 2:

Both checks need to be compliant in order to pass this check.

**Consider other options and the most efficient way to achieve the above.