Skip to main content
Skip table of contents

Risk Severity Rating

Risk Severity is based on a predefined matrix from Microsoft, which in turn is based on the Mitre logic and additionally on the controls from the CIS and the NIST benchmarks. This is a link to the reference guide for the Microsoft Cloud Security Benchmark (Previously known as ASBv3) Reference table for all recommendations - Microsoft Defender for Cloud.

Policy Name

Policy ID

Policy Initiative

Risk Severity Rating

Azure Backup should be enabled for Virtual Machines

013e242c-8828-4970-87b3-ab247555486d

Azure Security Benchmark

Low

Cognitive Services accounts should restrict network access

037eea7a-bd0a-46c5-9a66-03aea78705d3

Azure Security Benchmark

Medium

-Preview- Network traffic data collection agent should be installed on Linux virtual machines

04c4380f-3fae-46e8-96c9-30193528f602

Azure Security Benchmark

Low

Azure Web Application Firewall should be enabled for Azure Front Door entry-points

055aa869-bc98-4af8-bafc-23f1ab6ffe2c

Azure Security Benchmark

Low

Private endpoint should be enabled for PostgreSQL servers

0564d078-92f5-4f97-8398-b9f58a51f70b

Azure Security Benchmark

Medium

Resource logs in Azure Data Lake Store should be enabled

057ef27e-665e-4328-8ea3-04b3122bd9fb

Azure Security Benchmark

Low

Audit VMs that do not use managed disks

06a78e20-9358-41c9-923c-fb736d382a4d

ISO 27001-2013

Low

Cognitive Services accounts should disable public network access

0725b4dd-7e76-479c-a735-68e7ee23d5ca

Azure Security Benchmark

Medium

Function apps should not have CORS configured to allow every resource to access your apps

0820b7b9-23aa-4725-a1ce-ae4558f718e5

Azure Security Benchmark

Low

Adaptive network hardening recommendations should be applied on internet facing virtual machines

08e6af2d-db70-460a-bfe9-d5bd474ba9d6

Azure Security Benchmark

High

There should be more than one owner assigned to your subscription

09024ccc-0c5f-475e-9457-b7c0d9ed487b

Azure Security Benchmark

High

There should be more than one owner assigned to your subscription

09024ccc-0c5f-475e-9457-b7c0d9ed487b

ISO 27001-2013

High

Virtual machines should encrypt temp disks caches and data flows between Compute and Storage resources

0961003e-5a0a-4549-abde-af6a37f2724d

Azure Security Benchmark

High

Virtual machines should encrypt temp disks caches and data flows between Compute and Storage resources

0961003e-5a0a-4549-abde-af6a37f2724d

ISO 27001-2013

High

Kubernetes cluster pod hostPath volumes should only use allowed host paths

098fc59e-46c7-4d99-9b16-64990e543d75

Azure Security Benchmark

Medium

-Preview- Certificates should have the specified maximum validity period

0a075868-4c26-42ef-914c-5bc007359560

Azure Security Benchmark

Medium

Private endpoint should be enabled for MariaDB servers

0a1302fb-a631-4106-9753-f3d494733990

Azure Security Benchmark

Medium

Azure Policy Add-on for Kubernetes service (AKS) should be installed and enabled on your clusters

0a15ec92-a229-4763-bb14-0ea34a568f8d

Azure Security Benchmark

High

SQL servers should use customer-managed keys to encrypt data at rest

0a370ff3-6cab-4e85-8995-295fd854c5b8

Azure Security Benchmark

Low

Azure Defender for open-source relational databases should be enabled

0a9fbe0d-c5c4-4da8-87d8-f4fd77338835

Azure Security Benchmark

High

Email notification to subscription owner for high severity alerts should be enabled

0b15565f-aa9e-48ba-8619-45960f2c314d

Azure Security Benchmark

Medium

Key vaults should have deletion protection enabled

0b60c0b2-2dc2-4e1c-b5c9-abbed971de53

Azure Security Benchmark

Medium

Blocked accounts with owner permissions on Azure resources should be removed

0cfea604-3201-4e14-88fc-fae4c427a6c5

Azure Security Benchmark

High

Function apps should use managed identity

0da106f2-4ca3-48e8-bc85-c638fe6aea8f

Azure Security Benchmark

Medium

Authorized IP ranges should be defined on Kubernetes Services

0e246bcf-5f6f-4f87-bc6f-775d4712c7ea

Azure Security Benchmark

High

Function apps should have remote debugging turned off

0e60b895-3786-45da-8377-9c6b4b6ac5f9

Azure Security Benchmark

Low

Azure Defender for Key Vault should be enabled

0e6763cc-5078-4e64-889d-ff4d9a839047

Azure Security Benchmark

High

Geo-redundant backup should be enabled for Azure Database for MariaDB

0ec47710-77ff-4a3d-9181-6aa50af424d0

Azure Security Benchmark

Low

Running container images should have vulnerability findings resolved

0fc39691-5a3f-4e3e-94ee-2e6447309ad9

Azure Security Benchmark

High

Dependency agent should be enabled for listed virtual machine images

11ac78e3-31bc-4f0c-8434-37ab963cea07

ISO 27001-2013

Low

Allowlist rules in your adaptive application control policy should be updated

123a3936-f020-408a-ba0c-47873faf1534

Azure Security Benchmark

High

-Preview- Kubernetes clusters should gate deployment of vulnerable images

13cd7ae3-5bc0-4ac4-a62d-4f7c120b9759

Azure Security Benchmark

High

An Azure Active Directory administrator should be provisioned for MySQL servers

146412e9-005c-472b-9e48-c87b72ac229e

Azure Security Benchmark

High

Key Vault keys should have an expiration date

152b15f7-8e1f-4c1f-ab71-8c010ba5dbc0

Azure Security Benchmark

High

Transparent Data Encryption on SQL databases should be enabled

17k78e20-9358-41c9-923c-fb736d382a12

Azure Security Benchmark

Low

Transparent Data Encryption on SQL databases should be enabled

17k78e20-9358-41c9-923c-fb736d382a12

ISO 27001-2013

Low

PostgreSQL servers should use customer-managed keys to encrypt data at rest

18adea5e-f416-4d0f-8aa8-d24321e3e274

Azure Security Benchmark

Low

Kubernetes clusters should be accessible only over HTTPS

1a5b4dca-0b6f-4cf5-907c-56316bc1bf3d

Azure Security Benchmark

High

Vulnerability assessment should be enabled on SQL Managed Instance

1b7aa243-30e4-4c9e-bca8-d0d3022b634a

Azure Security Benchmark

High

Public network access on Azure SQL Database should be disabled

1b8ca024-1d5c-4dec-8995-b1a932b41780

Azure Security Benchmark

Medium

-Preview- vTPM should be enabled on supported virtual machines

1c30f9cd-b84c-49cc-aa2c-9288447cc3b3

Azure Security Benchmark

Low

Kubernetes clusters should not allow container privilege escalation

1c6e92c9-99f0-4e55-9cf2-0c234dc48f99

Azure Security Benchmark

Medium

Microsoft Defender for Containers should be enabled

1c988dd6-ade4-430f-a608-2a3e5b0a6d38

Azure Security Benchmark

High

-Preview- Guest Attestation extension should be installed on supported Windows virtual machines

1cb4d9c2-f88f-4069-bee0-dba239a57b09

Azure Security Benchmark

Low

Virtual machines should be migrated to new Azure Resource Manager resources

1d84d5fb-01f6-4d12-ba4f-4a26081d403d

Azure Security Benchmark

High

Virtual machines should be migrated to new Azure Resource Manager resources

1d84d5fb-01f6-4d12-ba4f-4a26081d403d

ISO 27001-2013

High

Key vaults should have soft delete enabled

1e66c121-a66a-4b1f-9b83-0fd99bf0fc2d

Azure Security Benchmark

High

Linux machines should have Log Analytics agent installed on Azure Arc

1e7fed80-8321-4605-b42c-65fc300f23a3

Azure Security Benchmark

High

An Azure Active Directory administrator should be provisioned for SQL servers

1f314764-cb73-4fc9-b863-8eca98ac36e9

Azure Security Benchmark

High

An Azure Active Directory administrator should be provisioned for SQL servers

1f314764-cb73-4fc9-b863-8eca98ac36e9

ISO 27001-2013

High

Endpoint protection should be installed on your machines

1f7c564c-0a90-4d44-b7e1-9d456cffaee8

Azure Security Benchmark

High

Azure Cosmos DB accounts should use customer-managed keys to encrypt data at rest

1f905d99-2ab7-462c-a6b0-f709acca6c8f

Azure Security Benchmark

Low

Microsoft Defender CSPM should be enabled

1f90fc71-a595-4066-8974-d4d0802e8ef0

Azure Security Benchmark

High

VM Image Builder templates should use private link

2154edb9-244f-4741-9970-660785bccdaa

Azure Security Benchmark

Medium

Synapse Workspaces should use only Azure Active Directory identities for authentication

2158ddbe-fefa-408e-b43f-d4faef8ff3b8

Azure Security Benchmark

High

Management ports should be closed on your virtual machines

22730e10-96f6-4aac-ad84-9383d35b5917

Azure Security Benchmark

Medium

Only secure connections to your Azure Cache for Redis should be enabled

22bee202-a82f-4305-9a2a-6d7f44d4dedb

Azure Security Benchmark

High

Only secure connections to your Azure Cache for Redis should be enabled

22bee202-a82f-4305-9a2a-6d7f44d4dedb

ISO 27001-2013

High

Kubernetes cluster services should listen only on allowed ports

233a2a17-77ca-4fb1-9b6b-69223d272a44

Azure Security Benchmark

Medium

Audit Windows machines that do not have a minimum password age of 1 day

237b38db-ca4d-4259-9e47-7882441ca2c0

ISO 27001-2013

Low

Azure SignalR Service should use private link

2393d2cf-a342-44cd-a2e2-fe0188fd1234

Azure Security Benchmark

Medium

Resource logs in Azure Kubernetes Service should be enabled

245fc9df-fa96-4414-9a0b-3738c2f7341c

Azure Security Benchmark

Low

Endpoint protection solution should be installed on virtual machine scale sets

26a828e1-e88f-464e-bbb3-c134a282b9de

Azure Security Benchmark

Low

Azure Defender for App Service should be enabled

2913021d-f2fd-4f3d-b958-22354e2bdbcb

Azure Security Benchmark

High

Storage accounts should restrict network access using virtual network rules

2a1a9cdf-e04d-429a-8416-3bfb72a1b26f

Azure Security Benchmark

Medium

App Service apps should use managed identity

2b9ad585-36bc-4615-b300-fd4435808332

Azure Security Benchmark

Medium

-Preview- Network traffic data collection agent should be installed on Windows virtual machines

2f2ee1de-44aa-4762-b6bd-0893fc3f306d

Azure Security Benchmark

Low

Microsoft Defender for Storage (Classic) should be enabled

308fbb08-4ab8-4e67-9b29-592e93fb94fa

Azure Security Benchmark

High

-Preview- Log Analytics Extension should be enabled for listed virtual machine images

32133ab0-ee4b-4b44-98d6-042180979d50

ISO 27001-2013

Low

Deploy the Linux Guest Configuration extension to enable Guest Configuration assignments on Linux VMs

331e8ea8-378a-410f-a2e5-ae22f38bb0da

ISO 27001-2013

Low

Guest accounts with owner permissions on Azure resources should be removed

339353f6-2387-4a45-abe4-7f529d121046

Azure Security Benchmark

High

Storage accounts should restrict network access

34c877ad-507e-4c82-993e-3452a6e0ad3c

Azure Security Benchmark

Low

Storage accounts should restrict network access

34c877ad-507e-4c82-993e-3452a6e0ad3c

ISO 27001-2013

Low

Resource logs in Logic Apps should be enabled

34f95f76-5386-4de7-b824-0d8478470c9d

Azure Security Benchmark

Low

Automation account variables should be encrypted

3657f5a0-770e-44a3-b44e-9431ba1e9735

Azure Security Benchmark

High

Automation account variables should be encrypted

3657f5a0-770e-44a3-b44e-9431ba1e9735

ISO 27001-2013

High

Storage accounts should be migrated to new Azure Resource Manager resources

37e0d2fe-28a5-43d6-a273-67d37d1f5606

Azure Security Benchmark

Low

Storage accounts should be migrated to new Azure Resource Manager resources

37e0d2fe-28a5-43d6-a273-67d37d1f5606

ISO 27001-2013

Low

Resource logs in IoT Hub should be enabled

383856f8-de7f-44a2-81fc-e5135b5c2aa4

Azure Security Benchmark

Low

Deploy the Windows Guest Configuration extension to enable Guest Configuration assignments on Windows VMs

385f5831-96d4-41db-9a3c-cd3af78aaae6

ISO 27001-2013

Low

Function apps should require FTPS only

399b2637-a50f-4f95-96f8-3a145476eb15

Azure Security Benchmark

High

Vulnerabilities in security configuration on your virtual machine scale sets should be remediated

3c735d8a-a4ba-4a3a-b7cf-db7754cf57f4

Azure Security Benchmark

High

Add system-assigned managed identity to enable Guest Configuration assignments on virtual machines with no identities

3cf2ab00-13f1-4d0c-8971-2ac904541a7e

ISO 27001-2013

Low

-Preview- Windows virtual machines should enable Azure Disk Encryption or EncryptionAtHost.

3dc5edcd-002d-444c-b216-e123bbfa37c0

Azure Security Benchmark

High

Secure transfer to storage accounts should be enabled

404c3081-a854-4457-ae30-26a93ef643f9

Azure Security Benchmark

High

Secure transfer to storage accounts should be enabled

404c3081-a854-4457-ae30-26a93ef643f9

ISO 27001-2013

High

Windows machines should have Log Analytics agent installed on Azure Arc

4078e558-bda6-41fb-9b3c-361e8875200d

Azure Security Benchmark

High

Kubernetes clusters should disable automounting API credentials

423dd1ba-798e-40e4-9c4d-b6902674b423

Azure Security Benchmark

High

Resource logs in Batch accounts should be enabled

428256e6-1fac-4f48-a757-df34c2b3336d

Azure Security Benchmark

Low

Azure Machine Learning workspaces should use private link

45e05259-1eb5-4f70-9574-baf73e9d219b

Azure Security Benchmark

Medium

Auto provisioning of the Log Analytics agent should be enabled on your subscription

475aae12-b88a-4572-8b36-9b712b2b3a17

Azure Security Benchmark

Low

Kubernetes cluster containers should not share host process ID or host IPC namespace

47a1ee2f-2a2a-4576-bf2a-e0e36709c2b8

Azure Security Benchmark

Medium

Adaptive application controls for defining safe applications should be enabled on your machines

47a6b606-51aa-4496-8bb7-64b11cf66adc

Azure Security Benchmark

High

Adaptive application controls for defining safe applications should be enabled on your machines

47a6b606-51aa-4496-8bb7-64b11cf66adc

ISO 27001-2013

High

Geo-redundant backup should be enabled for Azure Database for PostgreSQL

48af4db5-9b8b-401c-8e74-076be876a430

Azure Security Benchmark

Low

App Service apps that use Java should use the latest 'Java version'

496223c3-ad65-4ecd-878a-bae78737e9ed

Azure Security Benchmark

Medium

Add system-assigned managed identity to enable Guest Configuration assignments on VMs with a user-assigned identity

497dff13-db2a-4c0f-8603-28fa3b331ab6

ISO 27001-2013

Low

Azure Event Grid topics should use private link

4b90e17e-8448-49db-875e-bd83fb6f804f

Azure Security Benchmark

Medium

Audit Windows machines that do not have a maximum password age of 70 days

4ceb8dc2-559c-478b-a15b-733fbf1e3738

ISO 27001-2013

Low

App Service apps should require FTPS only

4d24b6d4-5e53-4a4f-a7f4-618fa573ee4b

Azure Security Benchmark

High

Azure Defender for servers should be enabled

4da35fc9-c9e7-4960-aec9-797fe7d9051d

Azure Security Benchmark

High

A maximum of 3 owners should be designated for your subscription

4f11b553-d42e-4e3a-89be-32ca364cad4c

Azure Security Benchmark

High

A maximum of 3 owners should be designated for your subscription

4f11b553-d42e-4e3a-89be-32ca364cad4c

ISO 27001-2013

High

Subscriptions should have a contact email address for security issues

4f4f78b8-e367-4b10-a341-d9a4ad5cf1c7

Azure Security Benchmark

Low

-Preview- Storage account public access should be disallowed

4fa4b6c0-31ca-4c0d-b10d-24b96f62a751

Azure Security Benchmark

Medium

A vulnerability assessment solution should be enabled on your virtual machines

501541f7-f7e7-4cd6-868c-4190fdad3ac9

Azure Security Benchmark

Low

A vulnerability assessment solution should be enabled on your virtual machines

501541f7-f7e7-4cd6-868c-4190fdad3ac9

ISO 27001-2013

Low

Kubernetes cluster containers should only use allowed AppArmor profiles

511f5417-5d12-434d-ab2e-816901e72a5e

Azure Security Benchmark

High

Cosmos DB database accounts should have local authentication methods disabled

5450f5bd-9c72-4390-a9c4-a7aba4edfdd2

Azure Security Benchmark

Medium

Azure Key Vault should have firewall enabled

55615ac9-af46-4a59-874e-391cc3dfb490

Azure Security Benchmark

Medium

Web Application Firewall (WAF) should be enabled for Application Gateway

564feb30-bf6a-4854-b4bb-0d2d2d1e6c66

Azure Security Benchmark

Low

App Service apps should not have CORS configured to allow every resource to access your apps

5744710e-cc2f-4ee8-8809-3b11e89f4bc9

Azure Security Benchmark

Low

Windows web servers should be configured to use secure communication protocols

5752e6d6-1206-46d8-8ab1-ecc2f71a8112

Azure Security Benchmark

High

Audit Windows machines that allow re-use of the previous 24 passwords

5b054a0d-39e2-4d53-bea3-9734cad2c69b

ISO 27001-2013

Low

Container registries should be encrypted with a customer-managed key

5b9159ae-1701-4a6f-9a7a-aa9c8ddd0580

Azure Security Benchmark

Low

App Service apps should have 'Client Certificates (Incoming client certificates)' enabled

5bb220d9-2698-4ee4-8404-b9c30c9df609

Azure Security Benchmark

Medium

Log Analytics extension should be enabled in virtual machine scale sets for listed virtual machine images

5c3bc7b8-a64c-4e08-a9cd-7ff0f31e1138

ISO 27001-2013

Low

External accounts with write permissions should be removed from your subscription

5c607a2e-c700-4744-8254-d77e7c9eb5e4

Azure Security Benchmark

High

External accounts with write permissions should be removed from your subscription

5c607a2e-c700-4744-8254-d77e7c9eb5e4

ISO 27001-2013

High

Container registry images should have vulnerability findings resolved

5f0f936f-2f01-4bf5-b6be-d423792fa562

Azure Security Benchmark

High

External accounts with read permissions should be removed from your subscription

5f76cf89-fbf2-47fd-a3f4-b891fa780b60

Azure Security Benchmark

High

Service Fabric clusters should have the ClusterProtectionLevel property set to EncryptAndSign

617c02be-7f02-4efd-8836-3180d47b6c68

Azure Security Benchmark

High

Service Fabric clusters should have the ClusterProtectionLevel property set to EncryptAndSign

617c02be-7f02-4efd-8836-3180d47b6c68

ISO 27001-2013

High

Authentication to Linux machines should require SSH keys

630c64f9-8b6b-4c64-b511-6544ceff6fd6

Azure Security Benchmark

Medium

Azure Defender for SQL servers on machines should be enabled

6581d072-105e-4418-827f-bd446d56421b

Azure Security Benchmark

High

Cognitive Services accounts should enable data encryption with a customer-managed key

67121cc7-ff39-4ab8-b7e3-95b84dab487d

Azure Security Benchmark

Low

-Preview- Guest Attestation extension should be installed on supported Linux virtual machines

672fe5a1-2fcd-42d7-b85d-902b6e28c6ff

Azure Security Benchmark

Low

Deprecated accounts should be removed from your subscription

6b1cbf55-e8b6-442f-ba4c-7246b6381474

Azure Security Benchmark

High

Deprecated accounts should be removed from your subscription

6b1cbf55-e8b6-442f-ba4c-7246b6381474

ISO 27001-2013

High

Azure Arc enabled Kubernetes clusters should have the Azure Policy extension installed

6b2122c1-8120-4ff5-801b-17625a355590

Azure Security Benchmark

High

SQL servers on machines should have vulnerability findings resolved

6ba6d016-e7c3-4842-b8f2-4992ebc0d72d

Azure Security Benchmark

High

Function apps should only be accessible over HTTPS

6d555dd1-86f2-4f1c-8ed7-5abae7c6cbab

Azure Security Benchmark

Medium

Function apps should only be accessible over HTTPS

6d555dd1-86f2-4f1c-8ed7-5abae7c6cbab

ISO 27001-2013

Medium

Email notification for high severity alerts should be enabled

6e2593d9-add6-4083-9c9b-4b7d2188c899

Azure Security Benchmark

Low

Storage accounts should use private link

6edd7eda-6dd8-40f7-810d-67160c639cd9

Azure Security Benchmark

Medium

Storage accounts should use customer-managed key for encryption

6fac406b-40ca-413b-bf8e-0bf964659c25

Azure Security Benchmark

Low

App Service apps that use Python should use the latest 'Python version'

7008174a-fd10-4ef0-817e-fc820a951d73

Azure Security Benchmark

Medium

Function apps that use Python should use the latest 'Python version'

7238174a-fd10-4ef0-817e-fc820a951d73

Azure Security Benchmark

Medium

App Service apps that use PHP should use the latest 'PHP version'

7261b898-8a84-4db8-9e04-18527132abb3

Azure Security Benchmark

Medium

Windows machines should meet requirements of the Azure compute security baseline

72650e9f-97bc-4b2a-ab5f-9781a9fcecbc

Azure Security Benchmark

Low

Private endpoint should be enabled for MySQL servers

7595c971-233d-4bcf-bd18-596129188c49

Azure Security Benchmark

Medium

Private endpoint connections on Azure SQL Database should be enabled

7698e800-9299-47a6-b3b6-5a0fee576eed

Azure Security Benchmark

Medium

Azure Cache for Redis should use private link

7803067c-7d34-46e3-8c79-0ca68fc4036d

Azure Security Benchmark

Medium

Azure SQL Managed Instance should have Azure Active Directory Only Authentication enabled

78215662-041e-49ed-a9dd-5385911b3a1f

Azure Security Benchmark

High

Audit diagnostic setting for selected resource types

7f89b1eb-583c-429a-8828-af049802c1d9

ISO 27001-2013

Low

Azure Defender for Azure SQL Database servers should be enabled

7fe3b40f-802b-4cdd-8bd4-fd799c948cc2

Azure Security Benchmark

High

Accounts with read permissions on Azure resources should be MFA enabled

81b3ccb4-e6e8-4e4a-8d05-5df25cd29fd4

Azure Security Benchmark

High

Geo-redundant backup should be enabled for Azure Database for MySQL

82339799-d096-41ae-8538-b108becf0970

Azure Security Benchmark

Low

Kubernetes cluster pods should only use approved host network and port range

82985f06-dc18-4a48-bc1c-b9f4f0098cfe

Azure Security Benchmark

Medium

Resource logs in Event Hub should be enabled

83a214f7-d01a-484b-91a9-ed54470c9a6a

Azure Security Benchmark

Low

MySQL servers should use customer-managed keys to encrypt data at rest

83cef61d-dbd1-4b20-a4fc-5fbc7da10833

Azure Security Benchmark

Low

-Preview- Log Analytics extension should be installed on your Linux Azure Arc machines

842c54e8-c2f9-4d79-ae8d-38d8b8019373

Azure Security Benchmark

High

Azure Cosmos DB accounts should have firewall rules

862e97cf-49fc-4a5c-9de4-40d4e2e7c8eb

Azure Security Benchmark

Medium

System updates should be installed on your machines

86b3d65f-7626-441e-b690-81a8b71cff60

Azure Security Benchmark

High

System updates should be installed on your machines

86b3d65f-7626-441e-b690-81a8b71cff60

ISO 27001-2013

High

SQL servers with auditing to storage account destination should be configured with 90 days retention or higher

89099bee-89e0-4b26-a5f4-165451757743

Azure Security Benchmark

Low

Blocked accounts with read and write permissions on Azure resources should be removed

8d7e1fde-fe26-4b5f-8108-f8e432cbc2be

Azure Security Benchmark

High

-Preview- Azure Arc enabled Kubernetes clusters should have Microsoft Defender for Cloud extension installed

8dfab9c4-fe7b-49ad-85e4-1e9be085358f

Azure Security Benchmark

High

Endpoint protection health issues should be resolved on your machines

8e42c1f2-a2ab-49bc-994a-12bcd0dc4ac2

Azure Security Benchmark

Medium

App Service apps should have resource logs enabled

91a78b24-f231-4a8a-8da9-02c35b2b6510

Azure Security Benchmark

Medium

MFA should be enabled for accounts with write permissions on your subscription

9297c21d-2ed6-4474-b48f-163f75654ce3

Azure Security Benchmark

High

MFA should be enabled for accounts with write permissions on your subscription

9297c21d-2ed6-4474-b48f-163f75654ce3

ISO 27001-2013

High

Accounts with write permissions on Azure resources should be MFA enabled

931e118d-50a1-4457-a5e4-78550e086c52

Azure Security Benchmark

High

Microsoft Defender for SQL status should be protected for Arc-enabled SQL Servers

938c4981-c2c9-4168-9cd6-972b8675f906

Azure Security Benchmark

High

Guest accounts with write permissions on Azure resources should be removed

94e1c2ac-cbbe-4cac-a2b5-389c812dee87

Azure Security Benchmark

High

Kubernetes cluster should not allow privileged containers

95edb821-ddaf-4404-9732-666045e056b4

Azure Security Benchmark

Medium

-Preview- Secure Boot should be enabled on supported Windows virtual machines

97566dd7-78ae-4997-8b36-1c7bfe0d8121

Azure Security Benchmark

Low

Azure Event Grid domains should use private link

9830b652-8523-49cc-b1b3-e17dce1127ca

Azure Security Benchmark

Medium

Key Vault secrets should have an expiration date

98728c90-32c7-4049-8429-847dc0f4fe37

Azure Security Benchmark

High

Function apps that use Java should use the latest 'Java version'

9d0b6ea4-93e2-4578-bf2f-6bb17d22b4bc

Azure Security Benchmark

Medium

All network ports should be restricted on network security groups associated to your virtual machine

9daedab3-fb2d-461e-b861-71790eead4f6

Azure Security Benchmark

High

All network ports should be restricted on network security groups associated to your virtual machine

9daedab3-fb2d-461e-b861-71790eead4f6

ISO 27001-2013

High

Kubernetes clusters should not use the default namespace

9f061a12-e40d-4183-a00e-171812443373

Azure Security Benchmark

Low

Azure Kubernetes Service clusters should have Defender profile enabled

a1840de2-8088-4ea8-b153-b4c723e9cb01

Azure Security Benchmark

High

-Preview- Guest Attestation extension should be installed on supported Linux virtual machines scale sets

a21f8c92-9e22-4f09-b759-50500d1d2dda

Azure Security Benchmark

Low

Audit Windows machines that do not restrict the minimum password length to 14 characters

a2d0e922-65d0-40c4-8f87-ea6da2d307a2

ISO 27001-2013

Low

Log Analytics agent should be installed on your virtual machine scale sets for Azure Security Center monitoring

a3a6ea0c-e018-4933-9ef0-5aaa1501449b

Azure Security Benchmark

High

Audit usage of custom RBAC roles

a451c1ef-c6ca-483d-87ed-f49761e3ffb5

Azure Security Benchmark

Low

Audit usage of custom RBAC roles

a451c1ef-c6ca-483d-87ed-f49761e3ffb5

ISO 27001-2013

Low

App Service apps should only be accessible over HTTPS

a4af4a39-4135-47fb-b175-47fbdf85311d

Azure Security Benchmark

Medium

App Service apps should only be accessible over HTTPS

a4af4a39-4135-47fb-b175-47fbdf85311d

ISO 27001-2013

Medium

Log Analytics agent should be installed on your virtual machine for Azure Security Center monitoring

a4fe33eb-e377-4efb-ab31-0784311bc499

Azure Security Benchmark

High

Azure Key Vaults should use private link

a6abeaec-4d90-4a02-805f-6b26c4d3fbe9

Azure Security Benchmark

Medium

Auditing on SQL server should be enabled

a6fb4358-5bf4-4ad7-ba82-2cd2f41ce5e9

Azure Security Benchmark

Low

Auditing on SQL server should be enabled

a6fb4358-5bf4-4ad7-ba82-2cd2f41ce5e9

ISO 27001-2013

Low

Azure DDoS Protection Standard should be enabled

a7aca53f-2ed4-4466-a25e-0b45ade68efd

Azure Security Benchmark

Medium

MFA should be enabled on accounts with owner permissions on your subscription

aa633080-8b72-40c4-a2d7-d00c03e80bed

Azure Security Benchmark

High

MFA should be enabled on accounts with owner permissions on your subscription

aa633080-8b72-40c4-a2d7-d00c03e80bed

ISO 27001-2013

High

Azure SQL Database should have Azure Active Directory Only Authentication enabled

abda6d70-9778-44e7-84a8-06713e6db027

Azure Security Benchmark

Medium

Azure Defender for SQL should be enabled for unprotected Azure SQL servers

abfb4388-5bf4-4ad7-ba82-2cd2f41ceae9

Azure Security Benchmark

High

Azure Defender for SQL should be enabled for unprotected SQL Managed Instances

abfb7388-5bf4-4ad7-ba99-2cd2f41cebb9

Azure Security Benchmark

High

SQL managed instances should use customer-managed keys to encrypt data at rest

ac01ad65-10e5-46df-bdd9-6b0cad13e1d2

Azure Security Benchmark

Low

Role-Based Access Control (RBAC) should be used on Kubernetes Services

ac4a19c2-fa67-49b4-8ae5-0b2e78c49457

Azure Security Benchmark

High

Guest Configuration extension should be installed on your machines

ae89ebca-1c92-4898-ac2c-9f63decb045c

Azure Security Benchmark

Medium

Azure Spring Cloud should use network injection

af35e2a4-ef96-44e7-a9ae-853dd97032c4

Azure Security Benchmark

Medium

Monitor missing Endpoint Protection in Azure Security Center

af6cd1bd-1635-48cb-bde7-5b15693900b9

Azure Security Benchmark

High

Monitor missing Endpoint Protection in Azure Security Center

af6cd1bd-1635-48cb-bde7-5b15693900b9

ISO 27001-2013

High

Management ports of virtual machines should be protected with just-in-time network access control

b0f33259-77d7-4c9e-aac6-3aabcfae693c

Azure Security Benchmark

High

Resource logs in Search services should be enabled

b4330a05-a843-4bc8-bf9a-cacce50c67f4

Azure Security Benchmark

Low

An Azure Active Directory administrator should be provisioned for PostgreSQL servers

b4dec045-250a-48c2-b5cc-e0c4eec8b5b4

Azure Security Benchmark

Medium

Public network access should be disabled for PostgreSQL servers

b52376f7-9612-48a1-81cd-1ffe4b61032c

Azure Security Benchmark

Medium

Service Fabric clusters should only use Azure Active Directory for client authentication

b54ed75b-3e1a-44ac-a333-05ba39b99ff0

Azure Security Benchmark

High

Service Fabric clusters should only use Azure Active Directory for client authentication

b54ed75b-3e1a-44ac-a333-05ba39b99ff0

ISO 27001-2013

High

Network Watcher should be enabled

b6e2945c-0b7b-40f5-9233-7a5323b5cdc6

Azure Security Benchmark

Low

Azure Machine Learning workspaces should be encrypted with a customer-managed key

ba769a63-b8cc-4b2d-abf6-ac33c7204be8

Azure Security Benchmark

Low

Non-internet-facing virtual machines should be protected with network security groups

bb91dfba-c30d-4263-9add-9c2384e659a6

Azure Security Benchmark

Low

IP Forwarding on your virtual machine should be disabled

bd352bd5-2853-4985-bf0d-73806b4a5744

Azure Security Benchmark

Medium

-Preview- machines should be configured to periodically check for missing System updates

bd876905-5b84-4f73-ab2d-2e7a7c4568d9

Azure Security Benchmark

High

Azure Defender for DNS should be enabled

bdc59948-5574-49b3-bb91-76b7c986428d

Azure Security Benchmark

High

Windows Defender Exploit Guard should be enabled on your machines

bed48b13-6647-468e-aa2f-1af1d3f4dd40

Azure Security Benchmark

Medium

Audit Windows machines that do not have the password complexity setting enabled

bf16e0bb-31e1-4646-8202-60a235cc7e74

ISO 27001-2013

Low

Kubernetes cluster containers should only use allowed capabilities

c26596ff-4d70-4e6a-9a30-c2506bd2f80c

Azure Security Benchmark

High

Azure Defender for Resource Manager should be enabled

c3d20c29-b36d-48fe-808b-99a87530ad99

Azure Security Benchmark

High

System updates on virtual machine scale sets should be installed

c3f317a7-a95c-4547-b7e7-11017ebdf2fe

Azure Security Benchmark

High

Resource logs in Data Lake Analytics should be enabled

c95c74d9-38fe-4f0d-af86-0c7d626a315c

Azure Security Benchmark

Low

App Configuration should use private link

ca610c1d-041c-4332-9d88-7ed3094967c7

Azure Security Benchmark

Medium

-Preview- Linux virtual machines should enable Azure Disk Encryption or EncryptionAtHost.

ca88aadc-6e2b-416c-9de2-5a0f01d1693f

Azure Security Benchmark

High

App Service apps should have remote debugging turned off

cb510bfd-1cba-4d9f-a230-cb0976f4bb71

Azure Security Benchmark

Low

Resource logs in Key Vault should be enabled

cf820ca0-f99e-4f3e-84fb-66e913812d21

Azure Security Benchmark

Low

Container registries should not allow unrestricted network access

d0793b48-0edc-4296-a390-4c75d1bdfd71

Azure Security Benchmark

Medium

Enforce SSL connection should be enabled for PostgreSQL database servers

d158790f-bfb0-486c-8631-2dc6b4e8e6af

Azure Security Benchmark

Medium

Virtual machines' Guest Configuration extension should be deployed with system-assigned managed identity

d26f7642-7545-4e18-9b75-8c9bbdee3a9a

Azure Security Benchmark

Medium

Kubernetes clusters should not grant CAP_SYS_ADMIN security capabilities

d2e7ea85-6b44-4317-a0be-1b951587f626

Azure Security Benchmark

High

-Preview- Log Analytics extension should be installed on your Windows Azure Arc machines

d69b1763-b96d-40b8-a2d9-ca31e9fd0d3e

Azure Security Benchmark

High

Public network access should be disabled for MySQL servers

d9844e8a-1437-4aeb-a32c-0c992f056095

Azure Security Benchmark

Medium

Audit Windows machines that do not store passwords using reversible encryption

da0f98fe-a24b-4ad5-af69-bd0400233661

ISO 27001-2013

Low

Kubernetes cluster containers should run with a read only root file system

df49d893-a74c-421d-bc95-c663042e5b80

Azure Security Benchmark

Medium

Vulnerabilities in security configuration on your machines should be remediated

e1e5fd5d-3e4c-4ce1-8661-7d1873ae6b15

Azure Security Benchmark

Low

Vulnerabilities in security configuration on your machines should be remediated

e1e5fd5d-3e4c-4ce1-8661-7d1873ae6b15

ISO 27001-2013

Low

Dependency agent should be enabled in virtual machine scale sets for listed virtual machine images

e2dd799a-a932-4e9d-ac17-d473bc3c6c10

ISO 27001-2013

Low

Kubernetes cluster containers CPU and memory resource limits should not exceed the specified limits

e345eecc-fa47-480f-9e88-67dcc122b164

Azure Security Benchmark

Medium

MFA should be enabled on accounts with read permissions on your subscription

e3576e28-8b17-4677-84c3-db2990658d64

Azure Security Benchmark

High

MFA should be enabled on accounts with read permissions on your subscription

e3576e28-8b17-4677-84c3-db2990658d64

ISO 27001-2013

High

Accounts with owner permissions on Azure resources should be MFA enabled

e3e008c3-56b9-4133-8fd7-d3347377402a

Azure Security Benchmark

High

Audit Linux machines that do not have the passwd file permissions set to 0644

e6955644-301c-44b5-a4c4-528577de6861

ISO 27001-2013

Low

Subnets should be associated with a Network Security Group

e71308d3-144b-4262-b144-efdc3cc90517

Azure Security Benchmark

Low

Enforce SSL connection should be enabled for MySQL database servers

e802a67a-daf5-4436-9ea6-f6d821dd0c5d

Azure Security Benchmark

Medium

Vulnerabilities in container security configurations should be remediated

e8cbc669-f12d-49eb-93e7-9273119e9933

Azure Security Benchmark

High

Container registries should use private link

e8eef0a8-67cf-4eb4-9386-14b0e78733d4

Azure Security Benchmark

Medium

Guest accounts with read permissions on Azure resources should be removed

e9ac8f8e-ce22-4355-8f04-99b911d6be52

Azure Security Benchmark

High

Audit Linux machines that allow remote connections from accounts without passwords

ea53dbee-c6c9-4f0e-9f9e-de0039b78023

ISO 27001-2013

Low

Function apps should have 'Client Certificates (Incoming client certificates)' enabled

eaebaea7-8013-4ceb-9d14-7eb32271373c

Azure Security Benchmark

Medium

Deprecated accounts with owner permissions should be removed from your subscription

ebb62a0c-3560-49e1-89ed-27e074e9f8ad

Azure Security Benchmark

High

Deprecated accounts with owner permissions should be removed from your subscription

ebb62a0c-3560-49e1-89ed-27e074e9f8ad

ISO 27001-2013

High

Vulnerability assessment should be enabled on your SQL servers

ef2a8f2a-b3d9-49cd-a8a8-9a3aaaf647d9

Azure Security Benchmark

High

API Management services should use a virtual network

ef619a2c-cc4d-4d03-b2ba-8c94a834d85b

Azure Security Benchmark

Medium

Kubernetes cluster pods and containers should only run with approved user and group IDs

f06ddb64-5fa3-4b77-b166-acb36f7f6042

Azure Security Benchmark

High

App Service apps should use the latest TLS version

f0e6e85b-9b9f-4a4b-b67b-f730d42f1b0b

Azure Security Benchmark

High

-Preview- Guest Attestation extension should be installed on supported Windows virtual machines scale sets

f655e522-adff-494d-95c2-52d4f6d56a42

Azure Security Benchmark

Low

Internet-facing virtual machines should be protected with network security groups

f6de0be7-9a8a-4b8a-b349-43cf02d22f7c

Azure Security Benchmark

High

Audit Linux machines that have accounts without passwords

f6ec09a3-78bf-4f8f-99dc-6c77182d0f99

ISO 27001-2013

Low

External accounts with owner permissions should be removed from your subscription

f8456c1c-aa66-4dfb-861a-25d127b775c9

Azure Security Benchmark

High

External accounts with owner permissions should be removed from your subscription

f8456c1c-aa66-4dfb-861a-25d127b775c9

ISO 27001-2013

High

-Preview- System updates should be installed on your machines (powered by Update Center)

f85bf3e0-d513-442e-89c3-1784ad63382b

Azure Security Benchmark

High

Resource logs in Service Bus should be enabled

f8d36e2f-389b-4ee4-898d-21aeb69a0f45

Azure Security Benchmark

Low

Resource logs in Azure Stream Analytics should be enabled

f9be5368-9bf5-4b84-9e0a-7850da98bb46

Azure Security Benchmark

Low

Function apps should use the latest TLS version

f9d614c5-c173-4d56-95a7-b4437057d193

Azure Security Benchmark

High

-Preview- All Internet traffic should be routed via your deployed Azure Firewall

fc5e4038-4584-4632-8c85-c0448d374b2c

Azure Security Benchmark

Low

Linux machines should meet requirements for the Azure compute security baseline

fc9b3da7-8347-4380-8e70-0a0361d8dedd

Azure Security Benchmark

Low

Public network access should be disabled for MariaDB servers

fdccbe47-f3e3-4213-ad5d-ea459b2fa077

Azure Security Benchmark

Medium

Kubernetes cluster containers should only use allowed images

febd0533-8e55-448f-b837-bd0e06f16469

Azure Security Benchmark

High

SQL databases should have vulnerability findings resolved

feedbf84-6b99-488c-acc2-71c829aa5ffc

Azure Security Benchmark

High

SQL databases should have vulnerability findings resolved

feedbf84-6b99-488c-acc2-71c829aa5ffc

ISO 27001-2013

High

JavaScript errors detected

Please note, these errors can depend on your browser setup.

If this problem persists, please contact our support.