Azure Monitor
Overview
Critical
0High
0Medium
1Low
20Informational
0Security issues (21)
Severity | Non-Compliance | Resource | Issue | Remediation | Read more | Action |
---|---|---|---|---|---|---|
Low | — | Monitor | No activity log alert found for "Create Policy Assignment" events. | To enable insights into the changes made within the "Policy Assignment" policy, create an activity log alert for "Create Policy Assignment" events. | More info | |
Low | — | Monitor | No activity log alert found for "Delete Policy Assignment" events. | To enable insights into the changes made within the "Policy Assignment" policy, create an activity log alert for "Delete Policy Assignment" events. | More info | |
Low | — | Monitor | No activity log alert found for "Delete Load Balancer" events. | To mitigate any accidental or intentional deletion of Load Balancers available within your Azure cloud account, create an activity log alert for "Delete Load Balancer" events. | More info | |
Low | — | Monitor | No activity log alert found for "Create/Update Network Security Group" events. | To enable insights into the changes made at the Azure Network Security Group (NSG) level, create an activity log alert for "Create/Update Network Security Group" events. | More info | |
Low | — | Monitor | No activity log alert found for "Delete Network Security Group" events. | To enable insights into the changes made at the Azure Network Security Group (NSG) level, create an activity log alert for "Delete Network Security Group" events. | More info | |
Low | — | Monitor | No activity log alert found for "Create or Update Security Solution" events. | To enable insights into the changes made for your Azure Security Solutions, create an activity log alert for "Create or Update Security Solution" events. | More info | |
Low | — | Monitor | No activity log alert found for "Delete Security Solution" events. | To enable insights into the changes made for your Azure Security Solutions, create an activity log alert for "Delete Security Solution" events. | More info | |
Low | — | Monitor | No activity log alert found for "Update Key Vault" events. | To enable insights into the changes made at the Azure Key Vault level, create an activity log alert for "Update Key Vault" events. | More info | |
Low | — | Monitor | No activity log alert found for "Delete Key Vault" events. | To mitigate any accidental or intentional deletion of Key Vaults available within your Azure cloud account, create an activity log alert for "Delete Key Vault" events. | More info | |
Low | — | Monitor | No activity log alert found for "Create or Update Virtual Machine" events. | To enable insights into the changes made within your cloud environment regarding Azure virtual machines (VMs), create an activity log alert for "Create or Update Virtual Machine" events. | More info | |
Low | — | Monitor | No activity log alert found for "Delete Virtual Machine" events. | To mitigate any accidental or intentional deletion of virtual machines (VMs) available within your Azure cloud account, create an activity log alert for "Delete Virtual Machine" events. | More info | |
Low | — | Monitor | No activity log alert found for "Deallocate Virtual Machine" events. | To mitigate any security issues in case a virtual machine (VM) was accidentally or intentionally stopped, create an activity log alert for "Deallocate Virtual Machine" events. | More info | |
Low | — | Monitor | No activity log alert found for "Power Off Virtual Machine" events. | To mitigate any security issues in case a virtual machine (VM) was accidentally or intentionally powered off, create an activity log alert for "Power Off Virtual Machine" events. | More info | |
Low | — | Monitor | No activity log alert found for "Create/Update Storage Account" events. | To enable insights into the changes made at the Azure Storage account level, create an activity log alert for "Create/Update Storage Account" events. | More info | |
Low | — | Monitor | No activity log alert found for "Delete Storage Account" events. | To mitigate any accidental or intentional deletion of storage accounts available within your Azure cloud account, create an activity log alert for "Delete Storage Account" events. | More info | |
Low | — | Monitor | No activity log alert found for "Create/Update Azure SQL Database" events. | To enable insights into the changes made within your cloud environment regarding Azure SQL database resources, create an activity log alert for "Create/Update Azure SQL Database" events. | More info | |
Low | — | Monitor | No activity log alert found for "Delete Azure SQL Database" events. | To mitigate any accidental or intentional deletion of SQL Databases available within your Azure cloud account, create an activity log alert for "Delete Azure SQL Database" events. | More info | |
Low | — | Monitor | No activity log alert found for "Rename Azure SQL Database" events. | To mitigate any security issues in case an SQL database was accidentally or intentionally renamed, create an activity log alert for "Rename Azure SQL Database" events. | More info | |
Low | PCI DSS 10.2 HIPAA (Audit) | default | Log Profile does not archive your activity log from Australia, Brazil. | To fulfill HIPAA and PCI requirements on secure audit record for environments containing sensitive data, ensures the Log Profile is configured to export all activities from all Azure locations. | More info | |
Low | PCI DSS 10.2 HIPAA (Audit) | default | Log Profile does not collect logs for "Delete" event categories. | To fulfill HIPAA and PCI requirements on secure audit record for environments containing sensitive data, ensure the Log Profile is configured to collect logs for "Write", "Delete" and "Action" event categories. | More info | |
Medium | PCI DSS 10.2 HIPAA (Audit) | default | Log Profile has a retention period of 0 days. | To fulfill HIPAA and PCI requirements on retaining logs for a minimum of 365 days, ensure that the Log Profile created for your activity log has a retention period set either to 0 (retain data forever) or 365 days or more. | More info |
Alert rules (6)
Log alert | Operation | Status | Target | Security issues |
---|---|---|---|---|
Update Security Policy | Microsoft.Security/policies/write | Enabled | AzureBackupRG_eastus_1 | — |
CreateUpdate MySQL Server | Microsoft.DBforMySQL/servers/write | Enabled | prevasio-mysql-server | — |
Delete MySQL Server | Microsoft.DBforMySQL/servers/delete | Enabled | prevasio-mysql-server | — |
CreateUpdate PostgreSQL Server | Microsoft.DBforPostgreSQL/servers/write | Enabled | prevasio-postgresql-server | — |
Delete PostgreSQL Server | Microsoft.DBforPostgreSQL/servers/delete | Enabled | prevasio-postgresql-server | — |
load balancer alert | Microsoft.Network/loadBalancers/write | Disabled | my-load-balancer | — |
Export activity log (1)
Log profile | Number of locations | Retention policy enabled | Retention policy, days | Categories | Security issues |
---|---|---|---|---|---|
default | 71 | ✓ | 0 | Write, Action | 1 Medium + 2 others (details) |
Subscription diagnostic settings (0)
Subscription diagnostic settings | Administrative enabled | Alert enabled | Policy enabled | Security enabled | Security issues |
---|