Risk Severity Rating
Risk Severity is based on a predefined matrix from Microsoft, which in turn is based on the Mitre logic and additionally on the controls from the CIS and the NIST benchmarks. This is a link to the reference guide for the Microsoft Cloud Security Benchmark (Previously known as ASBv3) Reference table for all recommendations - Microsoft Defender for Cloud.

Policy Name | Policy ID | Policy Initiative | Risk Severity Rating |
---|---|---|---|
Azure Backup should be enabled for Virtual Machines | 013e242c-8828-4970-87b3-ab247555486d | Azure Security Benchmark | Low |
Cognitive Services accounts should restrict network access | 037eea7a-bd0a-46c5-9a66-03aea78705d3 | Azure Security Benchmark | Medium |
-Preview- Network traffic data collection agent should be installed on Linux virtual machines | 04c4380f-3fae-46e8-96c9-30193528f602 | Azure Security Benchmark | Low |
Azure Web Application Firewall should be enabled for Azure Front Door entry-points | 055aa869-bc98-4af8-bafc-23f1ab6ffe2c | Azure Security Benchmark | Low |
Private endpoint should be enabled for PostgreSQL servers | 0564d078-92f5-4f97-8398-b9f58a51f70b | Azure Security Benchmark | Medium |
Resource logs in Azure Data Lake Store should be enabled | 057ef27e-665e-4328-8ea3-04b3122bd9fb | Azure Security Benchmark | Low |
Audit VMs that do not use managed disks | 06a78e20-9358-41c9-923c-fb736d382a4d | ISO 27001-2013 | Low |
Cognitive Services accounts should disable public network access | 0725b4dd-7e76-479c-a735-68e7ee23d5ca | Azure Security Benchmark | Medium |
Function apps should not have CORS configured to allow every resource to access your apps | 0820b7b9-23aa-4725-a1ce-ae4558f718e5 | Azure Security Benchmark | Low |
Adaptive network hardening recommendations should be applied on internet facing virtual machines | 08e6af2d-db70-460a-bfe9-d5bd474ba9d6 | Azure Security Benchmark | High |
There should be more than one owner assigned to your subscription | 09024ccc-0c5f-475e-9457-b7c0d9ed487b | Azure Security Benchmark | High |
There should be more than one owner assigned to your subscription | 09024ccc-0c5f-475e-9457-b7c0d9ed487b | ISO 27001-2013 | High |
Virtual machines should encrypt temp disks caches and data flows between Compute and Storage resources | 0961003e-5a0a-4549-abde-af6a37f2724d | Azure Security Benchmark | High |
Virtual machines should encrypt temp disks caches and data flows between Compute and Storage resources | 0961003e-5a0a-4549-abde-af6a37f2724d | ISO 27001-2013 | High |
Kubernetes cluster pod hostPath volumes should only use allowed host paths | 098fc59e-46c7-4d99-9b16-64990e543d75 | Azure Security Benchmark | Medium |
-Preview- Certificates should have the specified maximum validity period | 0a075868-4c26-42ef-914c-5bc007359560 | Azure Security Benchmark | Medium |
Private endpoint should be enabled for MariaDB servers | 0a1302fb-a631-4106-9753-f3d494733990 | Azure Security Benchmark | Medium |
Azure Policy Add-on for Kubernetes service (AKS) should be installed and enabled on your clusters | 0a15ec92-a229-4763-bb14-0ea34a568f8d | Azure Security Benchmark | High |
SQL servers should use customer-managed keys to encrypt data at rest | 0a370ff3-6cab-4e85-8995-295fd854c5b8 | Azure Security Benchmark | Low |
Azure Defender for open-source relational databases should be enabled | 0a9fbe0d-c5c4-4da8-87d8-f4fd77338835 | Azure Security Benchmark | High |
Email notification to subscription owner for high severity alerts should be enabled | 0b15565f-aa9e-48ba-8619-45960f2c314d | Azure Security Benchmark | Medium |
Key vaults should have deletion protection enabled | 0b60c0b2-2dc2-4e1c-b5c9-abbed971de53 | Azure Security Benchmark | Medium |
Blocked accounts with owner permissions on Azure resources should be removed | 0cfea604-3201-4e14-88fc-fae4c427a6c5 | Azure Security Benchmark | High |
Function apps should use managed identity | 0da106f2-4ca3-48e8-bc85-c638fe6aea8f | Azure Security Benchmark | Medium |
Authorized IP ranges should be defined on Kubernetes Services | 0e246bcf-5f6f-4f87-bc6f-775d4712c7ea | Azure Security Benchmark | High |
Function apps should have remote debugging turned off | 0e60b895-3786-45da-8377-9c6b4b6ac5f9 | Azure Security Benchmark | Low |
Azure Defender for Key Vault should be enabled | 0e6763cc-5078-4e64-889d-ff4d9a839047 | Azure Security Benchmark | High |
Geo-redundant backup should be enabled for Azure Database for MariaDB | 0ec47710-77ff-4a3d-9181-6aa50af424d0 | Azure Security Benchmark | Low |
Running container images should have vulnerability findings resolved | 0fc39691-5a3f-4e3e-94ee-2e6447309ad9 | Azure Security Benchmark | High |
Dependency agent should be enabled for listed virtual machine images | 11ac78e3-31bc-4f0c-8434-37ab963cea07 | ISO 27001-2013 | Low |
Allowlist rules in your adaptive application control policy should be updated | 123a3936-f020-408a-ba0c-47873faf1534 | Azure Security Benchmark | High |
-Preview- Kubernetes clusters should gate deployment of vulnerable images | 13cd7ae3-5bc0-4ac4-a62d-4f7c120b9759 | Azure Security Benchmark | High |
An Azure Active Directory administrator should be provisioned for MySQL servers | 146412e9-005c-472b-9e48-c87b72ac229e | Azure Security Benchmark | High |
Key Vault keys should have an expiration date | 152b15f7-8e1f-4c1f-ab71-8c010ba5dbc0 | Azure Security Benchmark | High |
Transparent Data Encryption on SQL databases should be enabled | 17k78e20-9358-41c9-923c-fb736d382a12 | Azure Security Benchmark | Low |
Transparent Data Encryption on SQL databases should be enabled | 17k78e20-9358-41c9-923c-fb736d382a12 | ISO 27001-2013 | Low |
PostgreSQL servers should use customer-managed keys to encrypt data at rest | 18adea5e-f416-4d0f-8aa8-d24321e3e274 | Azure Security Benchmark | Low |
Kubernetes clusters should be accessible only over HTTPS | 1a5b4dca-0b6f-4cf5-907c-56316bc1bf3d | Azure Security Benchmark | High |
Vulnerability assessment should be enabled on SQL Managed Instance | 1b7aa243-30e4-4c9e-bca8-d0d3022b634a | Azure Security Benchmark | High |
Public network access on Azure SQL Database should be disabled | 1b8ca024-1d5c-4dec-8995-b1a932b41780 | Azure Security Benchmark | Medium |
-Preview- vTPM should be enabled on supported virtual machines | 1c30f9cd-b84c-49cc-aa2c-9288447cc3b3 | Azure Security Benchmark | Low |
Kubernetes clusters should not allow container privilege escalation | 1c6e92c9-99f0-4e55-9cf2-0c234dc48f99 | Azure Security Benchmark | Medium |
Microsoft Defender for Containers should be enabled | 1c988dd6-ade4-430f-a608-2a3e5b0a6d38 | Azure Security Benchmark | High |
-Preview- Guest Attestation extension should be installed on supported Windows virtual machines | 1cb4d9c2-f88f-4069-bee0-dba239a57b09 | Azure Security Benchmark | Low |
Virtual machines should be migrated to new Azure Resource Manager resources | 1d84d5fb-01f6-4d12-ba4f-4a26081d403d | Azure Security Benchmark | High |
Virtual machines should be migrated to new Azure Resource Manager resources | 1d84d5fb-01f6-4d12-ba4f-4a26081d403d | ISO 27001-2013 | High |
Key vaults should have soft delete enabled | 1e66c121-a66a-4b1f-9b83-0fd99bf0fc2d | Azure Security Benchmark | High |
Linux machines should have Log Analytics agent installed on Azure Arc | 1e7fed80-8321-4605-b42c-65fc300f23a3 | Azure Security Benchmark | High |
An Azure Active Directory administrator should be provisioned for SQL servers | 1f314764-cb73-4fc9-b863-8eca98ac36e9 | Azure Security Benchmark | High |
An Azure Active Directory administrator should be provisioned for SQL servers | 1f314764-cb73-4fc9-b863-8eca98ac36e9 | ISO 27001-2013 | High |
Endpoint protection should be installed on your machines | 1f7c564c-0a90-4d44-b7e1-9d456cffaee8 | Azure Security Benchmark | High |
Azure Cosmos DB accounts should use customer-managed keys to encrypt data at rest | 1f905d99-2ab7-462c-a6b0-f709acca6c8f | Azure Security Benchmark | Low |
Microsoft Defender CSPM should be enabled | 1f90fc71-a595-4066-8974-d4d0802e8ef0 | Azure Security Benchmark | High |
VM Image Builder templates should use private link | 2154edb9-244f-4741-9970-660785bccdaa | Azure Security Benchmark | Medium |
Synapse Workspaces should use only Azure Active Directory identities for authentication | 2158ddbe-fefa-408e-b43f-d4faef8ff3b8 | Azure Security Benchmark | High |
Management ports should be closed on your virtual machines | 22730e10-96f6-4aac-ad84-9383d35b5917 | Azure Security Benchmark | Medium |
Only secure connections to your Azure Cache for Redis should be enabled | 22bee202-a82f-4305-9a2a-6d7f44d4dedb | Azure Security Benchmark | High |
Only secure connections to your Azure Cache for Redis should be enabled | 22bee202-a82f-4305-9a2a-6d7f44d4dedb | ISO 27001-2013 | High |
Kubernetes cluster services should listen only on allowed ports | 233a2a17-77ca-4fb1-9b6b-69223d272a44 | Azure Security Benchmark | Medium |
Audit Windows machines that do not have a minimum password age of 1 day | 237b38db-ca4d-4259-9e47-7882441ca2c0 | ISO 27001-2013 | Low |
Azure SignalR Service should use private link | 2393d2cf-a342-44cd-a2e2-fe0188fd1234 | Azure Security Benchmark | Medium |
Resource logs in Azure Kubernetes Service should be enabled | 245fc9df-fa96-4414-9a0b-3738c2f7341c | Azure Security Benchmark | Low |
Endpoint protection solution should be installed on virtual machine scale sets | 26a828e1-e88f-464e-bbb3-c134a282b9de | Azure Security Benchmark | Low |
Azure Defender for App Service should be enabled | 2913021d-f2fd-4f3d-b958-22354e2bdbcb | Azure Security Benchmark | High |
Storage accounts should restrict network access using virtual network rules | 2a1a9cdf-e04d-429a-8416-3bfb72a1b26f | Azure Security Benchmark | Medium |
App Service apps should use managed identity | 2b9ad585-36bc-4615-b300-fd4435808332 | Azure Security Benchmark | Medium |
-Preview- Network traffic data collection agent should be installed on Windows virtual machines | 2f2ee1de-44aa-4762-b6bd-0893fc3f306d | Azure Security Benchmark | Low |
Microsoft Defender for Storage (Classic) should be enabled | 308fbb08-4ab8-4e67-9b29-592e93fb94fa | Azure Security Benchmark | High |
-Preview- Log Analytics Extension should be enabled for listed virtual machine images | 32133ab0-ee4b-4b44-98d6-042180979d50 | ISO 27001-2013 | Low |
Deploy the Linux Guest Configuration extension to enable Guest Configuration assignments on Linux VMs | 331e8ea8-378a-410f-a2e5-ae22f38bb0da | ISO 27001-2013 | Low |
Guest accounts with owner permissions on Azure resources should be removed | 339353f6-2387-4a45-abe4-7f529d121046 | Azure Security Benchmark | High |
Storage accounts should restrict network access | 34c877ad-507e-4c82-993e-3452a6e0ad3c | Azure Security Benchmark | Low |
Storage accounts should restrict network access | 34c877ad-507e-4c82-993e-3452a6e0ad3c | ISO 27001-2013 | Low |
Resource logs in Logic Apps should be enabled | 34f95f76-5386-4de7-b824-0d8478470c9d | Azure Security Benchmark | Low |
Automation account variables should be encrypted | 3657f5a0-770e-44a3-b44e-9431ba1e9735 | Azure Security Benchmark | High |
Automation account variables should be encrypted | 3657f5a0-770e-44a3-b44e-9431ba1e9735 | ISO 27001-2013 | High |
Storage accounts should be migrated to new Azure Resource Manager resources | 37e0d2fe-28a5-43d6-a273-67d37d1f5606 | Azure Security Benchmark | Low |
Storage accounts should be migrated to new Azure Resource Manager resources | 37e0d2fe-28a5-43d6-a273-67d37d1f5606 | ISO 27001-2013 | Low |
Resource logs in IoT Hub should be enabled | 383856f8-de7f-44a2-81fc-e5135b5c2aa4 | Azure Security Benchmark | Low |
Deploy the Windows Guest Configuration extension to enable Guest Configuration assignments on Windows VMs | 385f5831-96d4-41db-9a3c-cd3af78aaae6 | ISO 27001-2013 | Low |
Function apps should require FTPS only | 399b2637-a50f-4f95-96f8-3a145476eb15 | Azure Security Benchmark | High |
Vulnerabilities in security configuration on your virtual machine scale sets should be remediated | 3c735d8a-a4ba-4a3a-b7cf-db7754cf57f4 | Azure Security Benchmark | High |
Add system-assigned managed identity to enable Guest Configuration assignments on virtual machines with no identities | 3cf2ab00-13f1-4d0c-8971-2ac904541a7e | ISO 27001-2013 | Low |
-Preview- Windows virtual machines should enable Azure Disk Encryption or EncryptionAtHost. | 3dc5edcd-002d-444c-b216-e123bbfa37c0 | Azure Security Benchmark | High |
Secure transfer to storage accounts should be enabled | 404c3081-a854-4457-ae30-26a93ef643f9 | Azure Security Benchmark | High |
Secure transfer to storage accounts should be enabled | 404c3081-a854-4457-ae30-26a93ef643f9 | ISO 27001-2013 | High |
Windows machines should have Log Analytics agent installed on Azure Arc | 4078e558-bda6-41fb-9b3c-361e8875200d | Azure Security Benchmark | High |
Kubernetes clusters should disable automounting API credentials | 423dd1ba-798e-40e4-9c4d-b6902674b423 | Azure Security Benchmark | High |
Resource logs in Batch accounts should be enabled | 428256e6-1fac-4f48-a757-df34c2b3336d | Azure Security Benchmark | Low |
Azure Machine Learning workspaces should use private link | 45e05259-1eb5-4f70-9574-baf73e9d219b | Azure Security Benchmark | Medium |
Auto provisioning of the Log Analytics agent should be enabled on your subscription | 475aae12-b88a-4572-8b36-9b712b2b3a17 | Azure Security Benchmark | Low |
Kubernetes cluster containers should not share host process ID or host IPC namespace | 47a1ee2f-2a2a-4576-bf2a-e0e36709c2b8 | Azure Security Benchmark | Medium |
Adaptive application controls for defining safe applications should be enabled on your machines | 47a6b606-51aa-4496-8bb7-64b11cf66adc | Azure Security Benchmark | High |
Adaptive application controls for defining safe applications should be enabled on your machines | 47a6b606-51aa-4496-8bb7-64b11cf66adc | ISO 27001-2013 | High |
Geo-redundant backup should be enabled for Azure Database for PostgreSQL | 48af4db5-9b8b-401c-8e74-076be876a430 | Azure Security Benchmark | Low |
App Service apps that use Java should use the latest 'Java version' | 496223c3-ad65-4ecd-878a-bae78737e9ed | Azure Security Benchmark | Medium |
Add system-assigned managed identity to enable Guest Configuration assignments on VMs with a user-assigned identity | 497dff13-db2a-4c0f-8603-28fa3b331ab6 | ISO 27001-2013 | Low |
Azure Event Grid topics should use private link | 4b90e17e-8448-49db-875e-bd83fb6f804f | Azure Security Benchmark | Medium |
Audit Windows machines that do not have a maximum password age of 70 days | 4ceb8dc2-559c-478b-a15b-733fbf1e3738 | ISO 27001-2013 | Low |
App Service apps should require FTPS only | 4d24b6d4-5e53-4a4f-a7f4-618fa573ee4b | Azure Security Benchmark | High |
Azure Defender for servers should be enabled | 4da35fc9-c9e7-4960-aec9-797fe7d9051d | Azure Security Benchmark | High |
A maximum of 3 owners should be designated for your subscription | 4f11b553-d42e-4e3a-89be-32ca364cad4c | Azure Security Benchmark | High |
A maximum of 3 owners should be designated for your subscription | 4f11b553-d42e-4e3a-89be-32ca364cad4c | ISO 27001-2013 | High |
Subscriptions should have a contact email address for security issues | 4f4f78b8-e367-4b10-a341-d9a4ad5cf1c7 | Azure Security Benchmark | Low |
-Preview- Storage account public access should be disallowed | 4fa4b6c0-31ca-4c0d-b10d-24b96f62a751 | Azure Security Benchmark | Medium |
A vulnerability assessment solution should be enabled on your virtual machines | 501541f7-f7e7-4cd6-868c-4190fdad3ac9 | Azure Security Benchmark | Low |
A vulnerability assessment solution should be enabled on your virtual machines | 501541f7-f7e7-4cd6-868c-4190fdad3ac9 | ISO 27001-2013 | Low |
Kubernetes cluster containers should only use allowed AppArmor profiles | 511f5417-5d12-434d-ab2e-816901e72a5e | Azure Security Benchmark | High |
Cosmos DB database accounts should have local authentication methods disabled | 5450f5bd-9c72-4390-a9c4-a7aba4edfdd2 | Azure Security Benchmark | Medium |
Azure Key Vault should have firewall enabled | 55615ac9-af46-4a59-874e-391cc3dfb490 | Azure Security Benchmark | Medium |
Web Application Firewall (WAF) should be enabled for Application Gateway | 564feb30-bf6a-4854-b4bb-0d2d2d1e6c66 | Azure Security Benchmark | Low |
App Service apps should not have CORS configured to allow every resource to access your apps | 5744710e-cc2f-4ee8-8809-3b11e89f4bc9 | Azure Security Benchmark | Low |
Windows web servers should be configured to use secure communication protocols | 5752e6d6-1206-46d8-8ab1-ecc2f71a8112 | Azure Security Benchmark | High |
Audit Windows machines that allow re-use of the previous 24 passwords | 5b054a0d-39e2-4d53-bea3-9734cad2c69b | ISO 27001-2013 | Low |
Container registries should be encrypted with a customer-managed key | 5b9159ae-1701-4a6f-9a7a-aa9c8ddd0580 | Azure Security Benchmark | Low |
App Service apps should have 'Client Certificates (Incoming client certificates)' enabled | 5bb220d9-2698-4ee4-8404-b9c30c9df609 | Azure Security Benchmark | Medium |
Log Analytics extension should be enabled in virtual machine scale sets for listed virtual machine images | 5c3bc7b8-a64c-4e08-a9cd-7ff0f31e1138 | ISO 27001-2013 | Low |
External accounts with write permissions should be removed from your subscription | 5c607a2e-c700-4744-8254-d77e7c9eb5e4 | Azure Security Benchmark | High |
External accounts with write permissions should be removed from your subscription | 5c607a2e-c700-4744-8254-d77e7c9eb5e4 | ISO 27001-2013 | High |
Container registry images should have vulnerability findings resolved | 5f0f936f-2f01-4bf5-b6be-d423792fa562 | Azure Security Benchmark | High |
External accounts with read permissions should be removed from your subscription | 5f76cf89-fbf2-47fd-a3f4-b891fa780b60 | Azure Security Benchmark | High |
Service Fabric clusters should have the ClusterProtectionLevel property set to EncryptAndSign | 617c02be-7f02-4efd-8836-3180d47b6c68 | Azure Security Benchmark | High |
Service Fabric clusters should have the ClusterProtectionLevel property set to EncryptAndSign | 617c02be-7f02-4efd-8836-3180d47b6c68 | ISO 27001-2013 | High |
Authentication to Linux machines should require SSH keys | 630c64f9-8b6b-4c64-b511-6544ceff6fd6 | Azure Security Benchmark | Medium |
Azure Defender for SQL servers on machines should be enabled | 6581d072-105e-4418-827f-bd446d56421b | Azure Security Benchmark | High |
Cognitive Services accounts should enable data encryption with a customer-managed key | 67121cc7-ff39-4ab8-b7e3-95b84dab487d | Azure Security Benchmark | Low |
-Preview- Guest Attestation extension should be installed on supported Linux virtual machines | 672fe5a1-2fcd-42d7-b85d-902b6e28c6ff | Azure Security Benchmark | Low |
Deprecated accounts should be removed from your subscription | 6b1cbf55-e8b6-442f-ba4c-7246b6381474 | Azure Security Benchmark | High |
Deprecated accounts should be removed from your subscription | 6b1cbf55-e8b6-442f-ba4c-7246b6381474 | ISO 27001-2013 | High |
Azure Arc enabled Kubernetes clusters should have the Azure Policy extension installed | 6b2122c1-8120-4ff5-801b-17625a355590 | Azure Security Benchmark | High |
SQL servers on machines should have vulnerability findings resolved | 6ba6d016-e7c3-4842-b8f2-4992ebc0d72d | Azure Security Benchmark | High |
Function apps should only be accessible over HTTPS | 6d555dd1-86f2-4f1c-8ed7-5abae7c6cbab | Azure Security Benchmark | Medium |
Function apps should only be accessible over HTTPS | 6d555dd1-86f2-4f1c-8ed7-5abae7c6cbab | ISO 27001-2013 | Medium |
Email notification for high severity alerts should be enabled | 6e2593d9-add6-4083-9c9b-4b7d2188c899 | Azure Security Benchmark | Low |
Storage accounts should use private link | 6edd7eda-6dd8-40f7-810d-67160c639cd9 | Azure Security Benchmark | Medium |
Storage accounts should use customer-managed key for encryption | 6fac406b-40ca-413b-bf8e-0bf964659c25 | Azure Security Benchmark | Low |
App Service apps that use Python should use the latest 'Python version' | 7008174a-fd10-4ef0-817e-fc820a951d73 | Azure Security Benchmark | Medium |
Function apps that use Python should use the latest 'Python version' | 7238174a-fd10-4ef0-817e-fc820a951d73 | Azure Security Benchmark | Medium |
App Service apps that use PHP should use the latest 'PHP version' | 7261b898-8a84-4db8-9e04-18527132abb3 | Azure Security Benchmark | Medium |
Windows machines should meet requirements of the Azure compute security baseline | 72650e9f-97bc-4b2a-ab5f-9781a9fcecbc | Azure Security Benchmark | Low |
Private endpoint should be enabled for MySQL servers | 7595c971-233d-4bcf-bd18-596129188c49 | Azure Security Benchmark | Medium |
Private endpoint connections on Azure SQL Database should be enabled | 7698e800-9299-47a6-b3b6-5a0fee576eed | Azure Security Benchmark | Medium |
Azure Cache for Redis should use private link | 7803067c-7d34-46e3-8c79-0ca68fc4036d | Azure Security Benchmark | Medium |
Azure SQL Managed Instance should have Azure Active Directory Only Authentication enabled | 78215662-041e-49ed-a9dd-5385911b3a1f | Azure Security Benchmark | High |
Audit diagnostic setting for selected resource types | 7f89b1eb-583c-429a-8828-af049802c1d9 | ISO 27001-2013 | Low |
Azure Defender for Azure SQL Database servers should be enabled | 7fe3b40f-802b-4cdd-8bd4-fd799c948cc2 | Azure Security Benchmark | High |
Accounts with read permissions on Azure resources should be MFA enabled | 81b3ccb4-e6e8-4e4a-8d05-5df25cd29fd4 | Azure Security Benchmark | High |
Geo-redundant backup should be enabled for Azure Database for MySQL | 82339799-d096-41ae-8538-b108becf0970 | Azure Security Benchmark | Low |
Kubernetes cluster pods should only use approved host network and port range | 82985f06-dc18-4a48-bc1c-b9f4f0098cfe | Azure Security Benchmark | Medium |
Resource logs in Event Hub should be enabled | 83a214f7-d01a-484b-91a9-ed54470c9a6a | Azure Security Benchmark | Low |
MySQL servers should use customer-managed keys to encrypt data at rest | 83cef61d-dbd1-4b20-a4fc-5fbc7da10833 | Azure Security Benchmark | Low |
-Preview- Log Analytics extension should be installed on your Linux Azure Arc machines | 842c54e8-c2f9-4d79-ae8d-38d8b8019373 | Azure Security Benchmark | High |
Azure Cosmos DB accounts should have firewall rules | 862e97cf-49fc-4a5c-9de4-40d4e2e7c8eb | Azure Security Benchmark | Medium |
System updates should be installed on your machines | 86b3d65f-7626-441e-b690-81a8b71cff60 | Azure Security Benchmark | High |
System updates should be installed on your machines | 86b3d65f-7626-441e-b690-81a8b71cff60 | ISO 27001-2013 | High |
SQL servers with auditing to storage account destination should be configured with 90 days retention or higher | 89099bee-89e0-4b26-a5f4-165451757743 | Azure Security Benchmark | Low |
Blocked accounts with read and write permissions on Azure resources should be removed | 8d7e1fde-fe26-4b5f-8108-f8e432cbc2be | Azure Security Benchmark | High |
-Preview- Azure Arc enabled Kubernetes clusters should have Microsoft Defender for Cloud extension installed | 8dfab9c4-fe7b-49ad-85e4-1e9be085358f | Azure Security Benchmark | High |
Endpoint protection health issues should be resolved on your machines | 8e42c1f2-a2ab-49bc-994a-12bcd0dc4ac2 | Azure Security Benchmark | Medium |
App Service apps should have resource logs enabled | 91a78b24-f231-4a8a-8da9-02c35b2b6510 | Azure Security Benchmark | Medium |
MFA should be enabled for accounts with write permissions on your subscription | 9297c21d-2ed6-4474-b48f-163f75654ce3 | Azure Security Benchmark | High |
MFA should be enabled for accounts with write permissions on your subscription | 9297c21d-2ed6-4474-b48f-163f75654ce3 | ISO 27001-2013 | High |
Accounts with write permissions on Azure resources should be MFA enabled | 931e118d-50a1-4457-a5e4-78550e086c52 | Azure Security Benchmark | High |
Microsoft Defender for SQL status should be protected for Arc-enabled SQL Servers | 938c4981-c2c9-4168-9cd6-972b8675f906 | Azure Security Benchmark | High |
Guest accounts with write permissions on Azure resources should be removed | 94e1c2ac-cbbe-4cac-a2b5-389c812dee87 | Azure Security Benchmark | High |
Kubernetes cluster should not allow privileged containers | 95edb821-ddaf-4404-9732-666045e056b4 | Azure Security Benchmark | Medium |
-Preview- Secure Boot should be enabled on supported Windows virtual machines | 97566dd7-78ae-4997-8b36-1c7bfe0d8121 | Azure Security Benchmark | Low |
Azure Event Grid domains should use private link | 9830b652-8523-49cc-b1b3-e17dce1127ca | Azure Security Benchmark | Medium |
Key Vault secrets should have an expiration date | 98728c90-32c7-4049-8429-847dc0f4fe37 | Azure Security Benchmark | High |
Function apps that use Java should use the latest 'Java version' | 9d0b6ea4-93e2-4578-bf2f-6bb17d22b4bc | Azure Security Benchmark | Medium |
All network ports should be restricted on network security groups associated to your virtual machine | 9daedab3-fb2d-461e-b861-71790eead4f6 | Azure Security Benchmark | High |
All network ports should be restricted on network security groups associated to your virtual machine | 9daedab3-fb2d-461e-b861-71790eead4f6 | ISO 27001-2013 | High |
Kubernetes clusters should not use the default namespace | 9f061a12-e40d-4183-a00e-171812443373 | Azure Security Benchmark | Low |
Azure Kubernetes Service clusters should have Defender profile enabled | a1840de2-8088-4ea8-b153-b4c723e9cb01 | Azure Security Benchmark | High |
-Preview- Guest Attestation extension should be installed on supported Linux virtual machines scale sets | a21f8c92-9e22-4f09-b759-50500d1d2dda | Azure Security Benchmark | Low |
Audit Windows machines that do not restrict the minimum password length to 14 characters | a2d0e922-65d0-40c4-8f87-ea6da2d307a2 | ISO 27001-2013 | Low |
Log Analytics agent should be installed on your virtual machine scale sets for Azure Security Center monitoring | a3a6ea0c-e018-4933-9ef0-5aaa1501449b | Azure Security Benchmark | High |
Audit usage of custom RBAC roles | a451c1ef-c6ca-483d-87ed-f49761e3ffb5 | Azure Security Benchmark | Low |
Audit usage of custom RBAC roles | a451c1ef-c6ca-483d-87ed-f49761e3ffb5 | ISO 27001-2013 | Low |
App Service apps should only be accessible over HTTPS | a4af4a39-4135-47fb-b175-47fbdf85311d | Azure Security Benchmark | Medium |
App Service apps should only be accessible over HTTPS | a4af4a39-4135-47fb-b175-47fbdf85311d | ISO 27001-2013 | Medium |
Log Analytics agent should be installed on your virtual machine for Azure Security Center monitoring | a4fe33eb-e377-4efb-ab31-0784311bc499 | Azure Security Benchmark | High |
Azure Key Vaults should use private link | a6abeaec-4d90-4a02-805f-6b26c4d3fbe9 | Azure Security Benchmark | Medium |
Auditing on SQL server should be enabled | a6fb4358-5bf4-4ad7-ba82-2cd2f41ce5e9 | Azure Security Benchmark | Low |
Auditing on SQL server should be enabled | a6fb4358-5bf4-4ad7-ba82-2cd2f41ce5e9 | ISO 27001-2013 | Low |
Azure DDoS Protection Standard should be enabled | a7aca53f-2ed4-4466-a25e-0b45ade68efd | Azure Security Benchmark | Medium |
MFA should be enabled on accounts with owner permissions on your subscription | aa633080-8b72-40c4-a2d7-d00c03e80bed | Azure Security Benchmark | High |
MFA should be enabled on accounts with owner permissions on your subscription | aa633080-8b72-40c4-a2d7-d00c03e80bed | ISO 27001-2013 | High |
Azure SQL Database should have Azure Active Directory Only Authentication enabled | abda6d70-9778-44e7-84a8-06713e6db027 | Azure Security Benchmark | Medium |
Azure Defender for SQL should be enabled for unprotected Azure SQL servers | abfb4388-5bf4-4ad7-ba82-2cd2f41ceae9 | Azure Security Benchmark | High |
Azure Defender for SQL should be enabled for unprotected SQL Managed Instances | abfb7388-5bf4-4ad7-ba99-2cd2f41cebb9 | Azure Security Benchmark | High |
SQL managed instances should use customer-managed keys to encrypt data at rest | ac01ad65-10e5-46df-bdd9-6b0cad13e1d2 | Azure Security Benchmark | Low |
Role-Based Access Control (RBAC) should be used on Kubernetes Services | ac4a19c2-fa67-49b4-8ae5-0b2e78c49457 | Azure Security Benchmark | High |
Guest Configuration extension should be installed on your machines | ae89ebca-1c92-4898-ac2c-9f63decb045c | Azure Security Benchmark | Medium |
Azure Spring Cloud should use network injection | af35e2a4-ef96-44e7-a9ae-853dd97032c4 | Azure Security Benchmark | Medium |
Monitor missing Endpoint Protection in Azure Security Center | af6cd1bd-1635-48cb-bde7-5b15693900b9 | Azure Security Benchmark | High |
Monitor missing Endpoint Protection in Azure Security Center | af6cd1bd-1635-48cb-bde7-5b15693900b9 | ISO 27001-2013 | High |
Management ports of virtual machines should be protected with just-in-time network access control | b0f33259-77d7-4c9e-aac6-3aabcfae693c | Azure Security Benchmark | High |
Resource logs in Search services should be enabled | b4330a05-a843-4bc8-bf9a-cacce50c67f4 | Azure Security Benchmark | Low |
An Azure Active Directory administrator should be provisioned for PostgreSQL servers | b4dec045-250a-48c2-b5cc-e0c4eec8b5b4 | Azure Security Benchmark | Medium |
Public network access should be disabled for PostgreSQL servers | b52376f7-9612-48a1-81cd-1ffe4b61032c | Azure Security Benchmark | Medium |
Service Fabric clusters should only use Azure Active Directory for client authentication | b54ed75b-3e1a-44ac-a333-05ba39b99ff0 | Azure Security Benchmark | High |
Service Fabric clusters should only use Azure Active Directory for client authentication | b54ed75b-3e1a-44ac-a333-05ba39b99ff0 | ISO 27001-2013 | High |
Network Watcher should be enabled | b6e2945c-0b7b-40f5-9233-7a5323b5cdc6 | Azure Security Benchmark | Low |
Azure Machine Learning workspaces should be encrypted with a customer-managed key | ba769a63-b8cc-4b2d-abf6-ac33c7204be8 | Azure Security Benchmark | Low |
Non-internet-facing virtual machines should be protected with network security groups | bb91dfba-c30d-4263-9add-9c2384e659a6 | Azure Security Benchmark | Low |
IP Forwarding on your virtual machine should be disabled | bd352bd5-2853-4985-bf0d-73806b4a5744 | Azure Security Benchmark | Medium |
-Preview- machines should be configured to periodically check for missing System updates | bd876905-5b84-4f73-ab2d-2e7a7c4568d9 | Azure Security Benchmark | High |
Azure Defender for DNS should be enabled | bdc59948-5574-49b3-bb91-76b7c986428d | Azure Security Benchmark | High |
Windows Defender Exploit Guard should be enabled on your machines | bed48b13-6647-468e-aa2f-1af1d3f4dd40 | Azure Security Benchmark | Medium |
Audit Windows machines that do not have the password complexity setting enabled | bf16e0bb-31e1-4646-8202-60a235cc7e74 | ISO 27001-2013 | Low |
Kubernetes cluster containers should only use allowed capabilities | c26596ff-4d70-4e6a-9a30-c2506bd2f80c | Azure Security Benchmark | High |
Azure Defender for Resource Manager should be enabled | c3d20c29-b36d-48fe-808b-99a87530ad99 | Azure Security Benchmark | High |
System updates on virtual machine scale sets should be installed | c3f317a7-a95c-4547-b7e7-11017ebdf2fe | Azure Security Benchmark | High |
Resource logs in Data Lake Analytics should be enabled | c95c74d9-38fe-4f0d-af86-0c7d626a315c | Azure Security Benchmark | Low |
App Configuration should use private link | ca610c1d-041c-4332-9d88-7ed3094967c7 | Azure Security Benchmark | Medium |
-Preview- Linux virtual machines should enable Azure Disk Encryption or EncryptionAtHost. | ca88aadc-6e2b-416c-9de2-5a0f01d1693f | Azure Security Benchmark | High |
App Service apps should have remote debugging turned off | cb510bfd-1cba-4d9f-a230-cb0976f4bb71 | Azure Security Benchmark | Low |
Resource logs in Key Vault should be enabled | cf820ca0-f99e-4f3e-84fb-66e913812d21 | Azure Security Benchmark | Low |
Container registries should not allow unrestricted network access | d0793b48-0edc-4296-a390-4c75d1bdfd71 | Azure Security Benchmark | Medium |
Enforce SSL connection should be enabled for PostgreSQL database servers | d158790f-bfb0-486c-8631-2dc6b4e8e6af | Azure Security Benchmark | Medium |
Virtual machines' Guest Configuration extension should be deployed with system-assigned managed identity | d26f7642-7545-4e18-9b75-8c9bbdee3a9a | Azure Security Benchmark | Medium |
Kubernetes clusters should not grant CAP_SYS_ADMIN security capabilities | d2e7ea85-6b44-4317-a0be-1b951587f626 | Azure Security Benchmark | High |
-Preview- Log Analytics extension should be installed on your Windows Azure Arc machines | d69b1763-b96d-40b8-a2d9-ca31e9fd0d3e | Azure Security Benchmark | High |
Public network access should be disabled for MySQL servers | d9844e8a-1437-4aeb-a32c-0c992f056095 | Azure Security Benchmark | Medium |
Audit Windows machines that do not store passwords using reversible encryption | da0f98fe-a24b-4ad5-af69-bd0400233661 | ISO 27001-2013 | Low |
Kubernetes cluster containers should run with a read only root file system | df49d893-a74c-421d-bc95-c663042e5b80 | Azure Security Benchmark | Medium |
Vulnerabilities in security configuration on your machines should be remediated | e1e5fd5d-3e4c-4ce1-8661-7d1873ae6b15 | Azure Security Benchmark | Low |
Vulnerabilities in security configuration on your machines should be remediated | e1e5fd5d-3e4c-4ce1-8661-7d1873ae6b15 | ISO 27001-2013 | Low |
Dependency agent should be enabled in virtual machine scale sets for listed virtual machine images | e2dd799a-a932-4e9d-ac17-d473bc3c6c10 | ISO 27001-2013 | Low |
Kubernetes cluster containers CPU and memory resource limits should not exceed the specified limits | e345eecc-fa47-480f-9e88-67dcc122b164 | Azure Security Benchmark | Medium |
MFA should be enabled on accounts with read permissions on your subscription | e3576e28-8b17-4677-84c3-db2990658d64 | Azure Security Benchmark | High |
MFA should be enabled on accounts with read permissions on your subscription | e3576e28-8b17-4677-84c3-db2990658d64 | ISO 27001-2013 | High |
Accounts with owner permissions on Azure resources should be MFA enabled | e3e008c3-56b9-4133-8fd7-d3347377402a | Azure Security Benchmark | High |
Audit Linux machines that do not have the passwd file permissions set to 0644 | e6955644-301c-44b5-a4c4-528577de6861 | ISO 27001-2013 | Low |
Subnets should be associated with a Network Security Group | e71308d3-144b-4262-b144-efdc3cc90517 | Azure Security Benchmark | Low |
Enforce SSL connection should be enabled for MySQL database servers | e802a67a-daf5-4436-9ea6-f6d821dd0c5d | Azure Security Benchmark | Medium |
Vulnerabilities in container security configurations should be remediated | e8cbc669-f12d-49eb-93e7-9273119e9933 | Azure Security Benchmark | High |
Container registries should use private link | e8eef0a8-67cf-4eb4-9386-14b0e78733d4 | Azure Security Benchmark | Medium |
Guest accounts with read permissions on Azure resources should be removed | e9ac8f8e-ce22-4355-8f04-99b911d6be52 | Azure Security Benchmark | High |
Audit Linux machines that allow remote connections from accounts without passwords | ea53dbee-c6c9-4f0e-9f9e-de0039b78023 | ISO 27001-2013 | Low |
Function apps should have 'Client Certificates (Incoming client certificates)' enabled | eaebaea7-8013-4ceb-9d14-7eb32271373c | Azure Security Benchmark | Medium |
Deprecated accounts with owner permissions should be removed from your subscription | ebb62a0c-3560-49e1-89ed-27e074e9f8ad | Azure Security Benchmark | High |
Deprecated accounts with owner permissions should be removed from your subscription | ebb62a0c-3560-49e1-89ed-27e074e9f8ad | ISO 27001-2013 | High |
Vulnerability assessment should be enabled on your SQL servers | ef2a8f2a-b3d9-49cd-a8a8-9a3aaaf647d9 | Azure Security Benchmark | High |
API Management services should use a virtual network | ef619a2c-cc4d-4d03-b2ba-8c94a834d85b | Azure Security Benchmark | Medium |
Kubernetes cluster pods and containers should only run with approved user and group IDs | f06ddb64-5fa3-4b77-b166-acb36f7f6042 | Azure Security Benchmark | High |
App Service apps should use the latest TLS version | f0e6e85b-9b9f-4a4b-b67b-f730d42f1b0b | Azure Security Benchmark | High |
-Preview- Guest Attestation extension should be installed on supported Windows virtual machines scale sets | f655e522-adff-494d-95c2-52d4f6d56a42 | Azure Security Benchmark | Low |
Internet-facing virtual machines should be protected with network security groups | f6de0be7-9a8a-4b8a-b349-43cf02d22f7c | Azure Security Benchmark | High |
Audit Linux machines that have accounts without passwords | f6ec09a3-78bf-4f8f-99dc-6c77182d0f99 | ISO 27001-2013 | Low |
External accounts with owner permissions should be removed from your subscription | f8456c1c-aa66-4dfb-861a-25d127b775c9 | Azure Security Benchmark | High |
External accounts with owner permissions should be removed from your subscription | f8456c1c-aa66-4dfb-861a-25d127b775c9 | ISO 27001-2013 | High |
-Preview- System updates should be installed on your machines (powered by Update Center) | f85bf3e0-d513-442e-89c3-1784ad63382b | Azure Security Benchmark | High |
Resource logs in Service Bus should be enabled | f8d36e2f-389b-4ee4-898d-21aeb69a0f45 | Azure Security Benchmark | Low |
Resource logs in Azure Stream Analytics should be enabled | f9be5368-9bf5-4b84-9e0a-7850da98bb46 | Azure Security Benchmark | Low |
Function apps should use the latest TLS version | f9d614c5-c173-4d56-95a7-b4437057d193 | Azure Security Benchmark | High |
-Preview- All Internet traffic should be routed via your deployed Azure Firewall | fc5e4038-4584-4632-8c85-c0448d374b2c | Azure Security Benchmark | Low |
Linux machines should meet requirements for the Azure compute security baseline | fc9b3da7-8347-4380-8e70-0a0361d8dedd | Azure Security Benchmark | Low |
Public network access should be disabled for MariaDB servers | fdccbe47-f3e3-4213-ad5d-ea459b2fa077 | Azure Security Benchmark | Medium |
Kubernetes cluster containers should only use allowed images | febd0533-8e55-448f-b837-bd0e06f16469 | Azure Security Benchmark | High |
SQL databases should have vulnerability findings resolved | feedbf84-6b99-488c-acc2-71c829aa5ffc | Azure Security Benchmark | High |
SQL databases should have vulnerability findings resolved | feedbf84-6b99-488c-acc2-71c829aa5ffc | ISO 27001-2013 | High |