Documentation ¶
Index ¶
Constants ¶
This section is empty.
Variables ¶
View Source
var CheckAlertOnSevereNotifications = rules.Register( scan2.Rule{ AVDID: "AVD-AZU-0044", Provider: providers2.AzureProvider, Service: "security-center", ShortCode: "alert-on-severe-notifications", Summary: "Send notification emails for high severity alerts", Impact: "The ability to react to high severity notifications could be delayed", Resolution: " Set alert notifications to be on", Explanation: `It is recommended that at least one valid contact is configured for the security center. Microsoft will notify the security contact directly in the event of a security incident using email and require alerting to be turned on.`, Links: []string{ "https://azure.microsoft.com/en-us/services/security-center/", }, Terraform: &scan2.EngineMetadata{ GoodExamples: terraformAlertOnSevereNotificationsGoodExamples, BadExamples: terraformAlertOnSevereNotificationsBadExamples, Links: terraformAlertOnSevereNotificationsLinks, RemediationMarkdown: terraformAlertOnSevereNotificationsRemediationMarkdown, }, Severity: severity2.Medium, }, func(s *state2.State) (results scan2.Results) { for _, contact := range s.Azure.SecurityCenter.Contacts { if contact.IsUnmanaged() { continue } if contact.EnableAlertNotifications.IsFalse() { results.Add( "Security contact has alert notifications disabled.", contact.EnableAlertNotifications, ) } else { results.AddPassed(&contact) } } return }, )
View Source
var CheckEnableStandardSubscription = rules.Register( scan2.Rule{ AVDID: "AVD-AZU-0045", Provider: providers2.AzureProvider, Service: "security-center", ShortCode: "enable-standard-subscription", Summary: "Enable the standard security center subscription tier", Impact: "Using free subscription does not enable Azure Defender for the resource type", Resolution: "Enable standard subscription tier to benefit from Azure Defender", Explanation: `To benefit from Azure Defender you should use the Standard subscription tier. Enabling Azure Defender extends the capabilities of the free mode to workloads running in private and other public clouds, providing unified security management and threat protection across your hybrid cloud workloads.`, Links: []string{ "https://docs.microsoft.com/en-us/azure/security-center/security-center-pricing", }, Terraform: &scan2.EngineMetadata{ GoodExamples: terraformEnableStandardSubscriptionGoodExamples, BadExamples: terraformEnableStandardSubscriptionBadExamples, Links: terraformEnableStandardSubscriptionLinks, RemediationMarkdown: terraformEnableStandardSubscriptionRemediationMarkdown, }, Severity: severity2.Low, }, func(s *state2.State) (results scan2.Results) { for _, sub := range s.Azure.SecurityCenter.Subscriptions { if sub.IsUnmanaged() { continue } if sub.Tier.EqualTo(securitycenter2.TierFree) { results.Add( "Security center subscription uses the free tier.", sub.Tier, ) } else { results.AddPassed(&sub) } } return }, )
View Source
var CheckSetRequiredContactDetails = rules.Register( scan2.Rule{ AVDID: "AVD-AZU-0046", Provider: providers2.AzureProvider, Service: "security-center", ShortCode: "set-required-contact-details", Summary: "The required contact details should be set for security center", Impact: "Without a telephone number set, Azure support can't contact", Resolution: "Set a telephone number for security center contact", Explanation: `It is recommended that at least one valid contact is configured for the security center. Microsoft will notify the security contact directly in the event of a security incident and will look to use a telephone number in cases where a prompt response is required.`, Links: []string{ "https://azure.microsoft.com/en-us/services/security-center/", }, Terraform: &scan2.EngineMetadata{ GoodExamples: terraformSetRequiredContactDetailsGoodExamples, BadExamples: terraformSetRequiredContactDetailsBadExamples, Links: terraformSetRequiredContactDetailsLinks, RemediationMarkdown: terraformSetRequiredContactDetailsRemediationMarkdown, }, Severity: severity2.Low, }, func(s *state2.State) (results scan2.Results) { for _, contact := range s.Azure.SecurityCenter.Contacts { if contact.IsUnmanaged() { continue } if contact.Phone.IsEmpty() { results.Add( "Security contact does not have a phone number listed.", contact.Phone, ) } else { results.AddPassed(&contact) } } return }, )
Functions ¶
This section is empty.
Types ¶
This section is empty.
Click to show internal directories.
Click to hide internal directories.