Skip to main content

Managed Security Review for CIS Azure Foundations Benchmark v3.0.0

info

The English user guide is currently in beta preview. Most of the documents have been automatically translated from the Japanese version. Should you find any inaccuracies, please reach out to Flatt Security.

This page explains managed security reviews on CIS Azure Foundations Benchmark v3.0.0 provided by Flatt Security. Note that Flatt Security may provide more policies than ones described here, depending on your support plans.

To use managed security reviews

By applying Shisho Cloud workflows to your organization, you'll see security review results soon:

All managed review items

TitleItem in StandardDefault SeverityID in Shisho Cloud
Ensure to enable Entra ID Security Defaults2.1.1Mediumdecision.api.shisho.dev/v1beta:azure_entraid_security_default
Ensure to enable per-user MFA for Entra ID2.1.2Mediumdecision.api.shisho.dev/v1beta:azure_entraid_per_user_mfa
Ensure to define trusted locations in Entra ID2.2.1Lowdecision.api.shisho.dev/v1beta:azure_entraid_trusted_location_usage
Ensure to use location-based Conditional Access Policy in Entra ID2.2.2Mediumdecision.api.shisho.dev/v1beta:azure_entraid_trusted_location_cap
Ensure to require MFA in Entra ID Conditional Access Policy2.2.5Mediumdecision.api.shisho.dev/v1beta:azure_entraid_mfa_cap
Ensure to restrict Entra ID non-administrator users from creating tenants2.3Lowdecision.api.shisho.dev/v1beta:azure_entraid_default_create_tenant_permission
Entra ID should have a Custom Bad Password List2.8Lowdecision.api.shisho.dev/v1beta:azure_entraid_banned_password_list
Ensure to restrict non-administrator users from consenting to Entra applications2.12Mediumdecision.api.shisho.dev/v1beta:azure_entraid_app_consent
Ensure to restrict Entra ID non-administrator users from creating applications2.14Mediumdecision.api.shisho.dev/v1beta:azure_entraid_default_create_app_permission
Ensure that Entra ID guest users have limited access to tenant information2.15Lowdecision.api.shisho.dev/v1beta:azure_entraid_guest_baseline
Ensure that tenant-to-tenant transfer is not allowed in Azure subscription2.15Highdecision.api.shisho.dev/v1beta:azure_entraid_subscription_policy
Ensure to restrict non-administrator users from inviting users to Entra ID2.16Highdecision.api.shisho.dev/v1beta:azure_entraid_invitation_permission
Ensure to restrict Entra ID non-administrator users from creating security groups2.19Lowdecision.api.shisho.dev/v1beta:azure_entraid_default_create_security_group_permission
Ensure to require MFA for new device registration to Entra ID2.22Mediumdecision.api.shisho.dev/v1beta:azure_entraid_device_registration
Ensure to minimize the number of Entra ID global admins2.26Highdecision.api.shisho.dev/v1beta:azure_entraid_global_admin
Ensure that connections to Azure Storage Account are forced to use HTTPS4.1Mediumdecision.api.shisho.dev/v1beta:azure_storageaccount_secure_transfer
Ensure that infrastructure encryption is enabled for Azure Storage Account4.2Lowdecision.api.shisho.dev/v1beta:azure_storageaccount_infrastructure_encryption
Ensure that audit logging is enabled for Azure Database for MySQL/MariaDB4.4.3Mediumdecision.api.shisho.dev/v1beta:azure_mysql_audit
Ensure that public network access to Azure Storage Account is disallowed4.6Highdecision.api.shisho.dev/v1beta:azure_storageaccount_blob_public_access
Ensure that the default network access rule for Azure Storage Account is set to deny all traffic4.7Mediumdecision.api.shisho.dev/v1beta:azure_storageaccount_default_network_rule
Ensure that Azure services access to Azure Storage Account is allowed outside of network rules4.8Infodecision.api.shisho.dev/v1beta:azure_storageaccount_network_bypass
Ensure that private endpoint is used for accessing Azure Storage Account4.9Infodecision.api.shisho.dev/v1beta:azure_storageaccount_private_endpoint
Ensure that soft delete is enabled for Azure Storage Account4.10Mediumdecision.api.shisho.dev/v1beta:azure_storageaccount_blob_soft_delete
Ensure that access logging for Azure Storage Account Queue Service is enabled4.12Lowdecision.api.shisho.dev/v1beta:azure_storageaccount_queue_logging
Ensure that data access logging for Azure Storage Account Blob service is enabled4.13Mediumdecision.api.shisho.dev/v1beta:azure_storageaccount_blob_logging
Ensure that access logging for Azure Storage Account Table Service is enabled4.14Lowdecision.api.shisho.dev/v1beta:azure_storageaccount_table_logging
Ensure that connections to Azure Storage Account are forced to use secure SSL/TLS versions4.15Mediumdecision.api.shisho.dev/v1beta:azure_storageaccount_tls_version
Ensure that cross-tenant replication is disabled for Azure Storage Account4.16Highdecision.api.shisho.dev/v1beta:azure_storageaccount_cross_tenant
Ensure that anonymous read access to Azure Storage Account is disabled4.17Criticaldecision.api.shisho.dev/v1beta:azure_storageaccount_anonymous_access
Ensure no Azure SQL Managed Database allows traffic from 0.0.0.0/05.1.7Criticaldecision.api.shisho.dev/v1beta:azure_sql_public_access
Ensure that connection logging is enabled for Azure Database for PostgreSQL5.2.6Lowdecision.api.shisho.dev/v1beta:azure_postgresql_audit_connection
Ensure that disconnection logging is enabled for Azure Database for PostgreSQL5.2.7Lowdecision.api.shisho.dev/v1beta:azure_postgresql_audit_disconnection
Ensure no Azure Database for MySQL allows traffic from 0.0.0.0/05.3.3Criticaldecision.api.shisho.dev/v1beta:azure_mysql_public_access
Ensure that connection logging is enabled for Azure Database for MySQL/MariaDB5.3.4Lowdecision.api.shisho.dev/v1beta:azure_mysql_audit_connection
Ensure no CosmosDB allows traffic from 0.0.0.0/05.4.1Criticaldecision.api.shisho.dev/v1beta:azure_cosmosdb_public_access
Ensure no Azure Network Security Group allows traffic from 0.0.0.0/07.1Criticaldecision.api.shisho.dev/v1beta:azure_networksecuritygroup_public_access
Ensure Azure Network Security Group flow logs are retained for a sufficient period7.5Lowdecision.api.shisho.dev/v1beta:azure_networksecuritygroup_flow_log_retention
Ensure Azure Network Watcher is enabled7.6Highdecision.api.shisho.dev/v1beta:azure_networkwatcher_usage
Ensure to not make Azure managed disks publicly accessible8.5Highdecision.api.shisho.dev/v1beta:azure_compute_disk_public_access
Ensure that connections to Azure Web Apps are forced to use HTTPS9.1Mediumdecision.api.shisho.dev/v1beta:azure_appservices_webapp_disallow_http
Ensure that FTP is not allowed during deployment of Azure Web Apps9.3Mediumdecision.api.shisho.dev/v1beta:azure_appservices_webapp_disallow_ftp
Ensure that connections to Azure App Services are forced to use secure SSL/TLS versions9.4Mediumdecision.api.shisho.dev/v1beta:azure_appservices_webapp_min_tls_version
Ensure to disable Web Apps remote debugging9.12Highdecision.api.shisho.dev/v1beta:azure_appservices_webapp_remote_debugging