SOLVED

ASC Security Policies & Compliance Wording

%3CLINGO-SUB%20id%3D%22lingo-sub-1564682%22%20slang%3D%22en-US%22%3EASC%20Security%20Policies%20%26amp%3B%20Compliance%20Wording%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1564682%22%20slang%3D%22en-US%22%3E%3CP%3EHi%20all%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EI%20have%20some%20questions%20i%20don't%20find%20clear%20answers%20in%20the%20documentation%2C%20so%20i%20hope%20you%20may%20share%20your%20insights%20here.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EFirst%2C%20I%20don't%20see%20how%20the%20regulatory%20compliance%20impact%20the%20secure%20score%3F%20Some%20of%20them%20are%20in%20the%20recommendations%2C%20some%20of%20them%20are%20not.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3ESecond%2C%20what's%20actually%20the%20difference%20between%20the%20Azure%20CIS%201.1.0%20and%20the%20Azure%20Benchmark%3F%20And%20how%20they%20are%20connected%20with%20Azure%20Policy%3F%20Additionally%2C%20i%20though%20the%20ASC%20recommendations%20are%20based%20on%20Azure%20Policy%2C%20but%20then%20i%20read%20also%20that%20they%20are%20based%20on%20Benchmarks%3F%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E4th%20thing%3A%20Is%20it%20possible%20to%20e.g.%20set%20up%20one%20of%20the%20policies%20from%20ASC%20Default%20in%20that%20way%20that%20it%20only%20monitor%20it%20for%20a%20specific%20resource%20group%3F%20Let's%20say%20I%20want%20that%20one%20of%20that%20ASC%20default%20policies%20regarding%20VM%20security%20(e.g.%20Disk%20encryption%20on%20VM's)%20only%20monitor%20a%20specific%20resource%20group.%20How%20can%20i%20handle%20that%3F%20I%20tried%20to%20add%20custom%20initiatives%20with%20a%20defined%20scope%20for%20a%20specific%20resource%20but%20then%20there%20are%20no%20recommendations.%26nbsp%3B%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EThank%20you%20in%20advance%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1569884%22%20slang%3D%22en-US%22%3ERe%3A%20ASC%20Security%20Policies%20%26amp%3B%20Compliance%20Wording%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1569884%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F699391%22%20target%3D%22_blank%22%3E%40Tom_Janetscheck%3C%2FA%3E%26nbsp%3B%3C%2FP%3E%3CP%3EHi%20Tom%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EMany%20thanks%20for%20your%20answer.%20ASC%20looks%20very%20simple%20but%20actually%20it's%20much%20more%20magic%20behind%3A)%20%26nbsp%3BI%20have%20a%20few%20follow-up%20questions%20to%20your%20answers.%3C%2FP%3E%3COL%3E%3CLI%3EHow%20does%20it%20then%20come%20that%20many%20of%20the%20CIS%201.1.0%20i%20also%20see%20in%20the%20recommendations%3F%20Am%20I%20right%20that%20many%20but%20not%20all%20of%20the%20regulatory%20compliance%20advices%20are%20in%20the%20recommendations%20which%20in%20the%20end%20effect%20impact%20the%20secure%20score%3F%3C%2FLI%3E%3CLI%3E%26nbsp%3BOk%2C%20i%20see%20that%20they%20are%20not%20the%20same.%20But%20i%20don't%20see%20the%20connection%20between%20them%20and%20the%20baseline%20from%20the%20AZ-500%20learnings%20and%20the%20best%20practices.%20Are%20they%20all%20connected%3F%3CBR%20%2F%3E%3CBR%20%2F%3E%3C%2FLI%3E%3CLI%3EOk%2C%20so%20I%20understand%20it%20like%20that%3A%20the%20idea%20of%20ASC%20recommendations%20isbased%20on%20the%20benchmarks%20and%20best%20practices%20and%20Azure%20Policy%20is%20just%20used%20to%20make%20them%20visible%20in%20a%20technical%20perspective.%3CBR%20%2F%3EWould%20you%20recommend%20here%20to%20not%20only%20remediate%26nbsp%3B%3CSPAN%3Ethem%20but%20also%20to%20create%20new%20Policy%20or%20even%20Azure%20Blueprint%20for%20future%20deployments%20in%20order%20to%20have%20the%20secure%20score%20stable%3F%3C%2FSPAN%3E%3CBR%20%2F%3E%3CBR%20%2F%3E%3C%2FLI%3E%3CLI%3EYes%2C%20that%20was%20was%20my%20question%2C%20if%20I%20could%20do%20exceptions%20for%20a%20specific%20resource%20group%3A)%3F%3C%2FLI%3E%3C%2FOL%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EMany%20thanks%20in%20advance!%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1567371%22%20slang%3D%22en-US%22%3ERe%3A%20ASC%20Security%20Policies%20%26amp%3B%20Compliance%20Wording%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1567371%22%20slang%3D%22en-US%22%3E%3CP%3EHi%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F748777%22%20target%3D%22_blank%22%3E%40GlavniArhivator%3C%2FA%3E%2C%26nbsp%3B%3C%2FP%3E%0A%3CP%3Ethanks%20for%20asking%20these%20great%20questions%2C%20I'll%20try%20to%20answer%20them%20in%20the%20respective%20order%20using%20a%20numbered%20list.%26nbsp%3B%3C%2FP%3E%0A%3COL%3E%0A%3CLI%3ERegulatory%20compliance%20is%20part%20of%20the%20ASC%20Standard%20tier%2C%20whereas%20Secure%20Score%20comes%20with%20the%20ASC%20free%20tier.%20Today%2C%20we%20do%20not%20map%20the%20compliance%20assessment%20results%20to%20your%20Secure%20Score.%3C%2FLI%3E%0A%3CLI%3EThe%20Azure%20Security%20Benchmark%20is%20not%20exactly%20the%20same%2C%20as%20the%20CIS%201.1.0%20benchmark%20we%20have%20integrated%20in%20ASC.%20However%2C%20its%20controls%20are%20consistent%20with%20other%20well-known%20security%20benchmarks%2C%20such%20as%20CIS%207.1.%20You%20can%20find%20more%20information%20about%20the%20Azure%20Security%20Benchmark%20at%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Fsecurity%2Fbenchmarks%2Foverview%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ehttps%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Fsecurity%2Fbenchmarks%2Foverview%3C%2FA%3E.%26nbsp%3B%3C%2FLI%3E%0A%3CLI%3EBenchmarks%20and%20Azure%20Policy%20are%20not%20the%20same.%20You%20can%20see%20Azure%20Policy%20as%20the%20tool%20for%20technically%20implementing%20auditing%20of%20security%20benchmarks.%20So%2C%20the%20recommendations%20you%20see%20in%20your%20Security%20Controls%20in%20the%20Resource%20Security%20Hygiene%20part%20of%20Azure%20Security%20Center%20are%20derived%20from%20well-known%20security%20benchmarks%20and%20the%20technical%20implementation%20under%20the%20hood%20is%20based%20on%20Azure%20Policy.%20In%20other%20words%3A%20we%20are%20using%20Azure%20Policy%20to%20create%20the%20recommendations%20you%20see%20in%20Azure%20Security%20Center%2C%20but%20these%20recommendations%20are%20based%20on%20industry-standard%20security%20best-practices.%3C%2FLI%3E%0A%3CLI%3ENo%2C%20this%20is%20not%20possible%20today.%20The%20security%20policy%20Azure%20Security%20Center%20relies%20on%20is%20scoped%20to%20the%20Management%20Group%20or%20Subscription%20level.%3C%2FLI%3E%0A%3C%2FOL%3E%0A%3CP%3EBest%20regards%2C%3C%2FP%3E%0A%3CP%3ETom%20Janetscheck%3C%2FP%3E%0A%3CP%3ESenior%20Program%20Manager%3C%2FP%3E%0A%3CP%3ECxE%20%7C%20Azure%20Security%20Center%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1570819%22%20slang%3D%22en-US%22%3ERe%3A%20ASC%20Security%20Policies%20%26amp%3B%20Compliance%20Wording%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1570819%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F699391%22%20target%3D%22_blank%22%3E%40Tom_Janetscheck%3C%2FA%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EThanks%20Tom.%20Everything%20is%20perfectly%20answered%2C%20but%20the%20first%20is%20not%20so%20clear.%3C%2FP%3E%3CP%3EOr%20maybe%20i%20didn't%20explained%20well.%20e.g.%20in%20the%20Azure%20CIS%201.1.0%20I%20see%20a%20Control%20%227.1%20Ensure%20that%20%22OS%20disk%22%20are%20encrypted%22%20and%20below%20the%20%22Disk%20encryption%20should%20be%20applied%20on%20virutal%20machines%22%20security%20control.%20Two%20things%20I%20need%20to%20clarify%20here%3A%20does%20it%20mean%20that%20some%20of%20the%20regulatory%20compliance%20points%20are%20same%20as%20recommendations%20(or%20similar)%20but%20not%20all%3F%20So%20indirectly%20it%20has%20an%20impact%20on%20secure%20score.%3CBR%20%2F%3E%3CBR%20%2F%3EThe%20other%20side%20is%3A%20If%20regulatory%20compliance%20policies%20does%20not%20have%20an%20impact%20on%20secure%20score%2C%20How%20to%20handle%20that%20%22Regulatory%20compliance%20assessment%22%20or%20on%20which%20level%20to%20pay%20attention%20on%20it%3F.%20At%20this%20moment%20it%20looks%20like%20secure%20score%20with%20his%20gamification%20and%20direct%20remediations%20impacts%20is%20much%20more%20relevant%20than%20to%20follow%20regulatory%20compliance%3F%26nbsp%3B%3CBR%20%2F%3E%3CBR%20%2F%3EBest%20regards!%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1571037%22%20slang%3D%22en-US%22%3ERe%3A%20ASC%20Security%20Policies%20%26amp%3B%20Compliance%20Wording%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1571037%22%20slang%3D%22en-US%22%3E%3CP%3EHey%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F748777%22%20target%3D%22_blank%22%3E%40GlavniArhivator%3C%2FA%3E%2C%26nbsp%3B%3C%2FP%3E%0A%3CP%3Esorry%20for%20confusing%20you%20-%20let%20me%20try%20to%20explain%20it%20differently%3A%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThe%20regulatory%20compliance%20part%20of%20ASC%20is%20another%20view%20to%20security%20risks.%20If%20you%2C%20for%20example%2C%20take%20a%20look%20at%20the%20CIS%201.1.0%20control%20%3CEM%3E7.1%20Ensure%20that%20OS%20disks%20are%20encrypted%3C%2FEM%3E%2C%20and%20you%20then%20go%20to%20the%20underlying%20recommendation%20%3CEM%3E%22Disk%20encryption%20should%20be%20applied%20on%20virtual%20machines%22%3C%2FEM%3E%3B%20once%20you%20remediate%20this%20recommendation%2C%20you%20will%20gain%20credit%20towards%20your%20Secure%20Score%20if%2C%20besides%20this%20recommendation%2C%20you%20have%20made%20sure%20that%20%3CEM%3Eall%3C%2FEM%3E%20other%20recommendations%20in%20the%20same%20Security%20Control%20(Enable%20encryption%20at%20rest)%20have%20also%20been%20remediated.%20So%2C%20in%20order%20to%20increase%20your%20Secure%20Score%2C%20it's%20not%20enough%20to%20remediate%20the%20recommendation%20only%2C%20but%20from%20the%20perspective%20of%20the%20respective%20compliance%20standard%2C%20it%20is.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EIf%20you%20then%2C%20for%20example%2C%20take%20a%20look%20at%20the%20%3CEM%3ESOC%20TSP%3C%2FEM%3E%20set%20of%20controls%2C%20you%20will%20find%20CCE-numbers%20underneath%20C1.2.%20These%20refer%20to%20vulnerabilities%20that%20have%20been%20found%20on%20machines%20within%20the%20scope%20of%20the%20policy.%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-center%22%20image-alt%3D%22Screenshot%202020-08-06%20at%2018.08.39.png%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F210654i8A8BE86FA7F49398%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20title%3D%22Screenshot%202020-08-06%20at%2018.08.39.png%22%20alt%3D%22SOC%20TSP%22%20%2F%3E%3CSPAN%20class%3D%22lia-inline-image-caption%22%20onclick%3D%22event.preventDefault()%3B%22%3ESOC%20TSP%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3EThere%20is%20no%20single%20recommendation%20or%20Security%20Control%20for%20these%20in%20the%20Resource%20Security%20Hygiene%20part%20of%20ASC%2C%20but%20you%20will%20find%20them%20underneath%20the%26nbsp%3B%3CSPAN%20class%3D%22ext-grid-section-column-displayName-margin-left%20ext-grid-section-column-displayName%22%20title%3D%22Vulnerabilities%20in%20security%20configuration%20on%20your%20machines%20should%20be%20remediated%22%20data-bind%3D%22text%3A%20settings.item.displayName%2C%20sanitizedAttr%3A%20%7B%20title%3A%20settings.item.displayName%20%7D%2C%20sanitizedCss%3A%20settings.item.effectiveCss%22%3E%3CEM%3EVulnerabilities%20in%20security%20configuration%20on%20your%20machines%20should%20be%20remediated%3C%2FEM%3E%20recommendation%2C%20which%20is%20part%20of%20the%26nbsp%3B%3CSPAN%20class%3D%22ext-grid-section-column-displayName-hierarchical%22%20title%3D%22Remediate%20security%20configurations%22%20data-bind%3D%22text%3A%20settings.item.displayName%2C%20sanitizedAttr%3A%20%7B%20title%3A%20settings.item.displayName%20%7D%2C%20sanitizedCss%3A%20settings.item.effectiveCss%22%3E%3CEM%3ERemediate%20security%20configurations%3C%2FEM%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FSPAN%3E%3CSPAN%20class%3D%22ext-grid-section-column-displayName-margin-left%20ext-grid-section-column-displayName%22%20title%3D%22Vulnerabilities%20in%20security%20configuration%20on%20your%20machines%20should%20be%20remediated%22%20data-bind%3D%22text%3A%20settings.item.displayName%2C%20sanitizedAttr%3A%20%7B%20title%3A%20settings.item.displayName%20%7D%2C%20sanitizedCss%3A%20settings.item.effectiveCss%22%3Esecurity%20control.%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22ext-grid-section-column-displayName-margin-left%20ext-grid-section-column-displayName%22%20title%3D%22Vulnerabilities%20in%20security%20configuration%20on%20your%20machines%20should%20be%20remediated%22%20data-bind%3D%22text%3A%20settings.item.displayName%2C%20sanitizedAttr%3A%20%7B%20title%3A%20settings.item.displayName%20%7D%2C%20sanitizedCss%3A%20settings.item.effectiveCss%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-center%22%20image-alt%3D%22Screenshot%202020-08-06%20at%2018.14.11.png%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F210655iBADA189DE3941677%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20title%3D%22Screenshot%202020-08-06%20at%2018.14.11.png%22%20alt%3D%22Remediate%20vulnerabilities%22%20%2F%3E%3CSPAN%20class%3D%22lia-inline-image-caption%22%20onclick%3D%22event.preventDefault()%3B%22%3ERemediate%20vulnerabilities%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EWe%20have%20customers%20that%20need%20their%20resources%20to%20comply%20to%20different%20regulatory%20compliance%20standards.%20With%20the%20Regulatory%20Compliance%20dashboard%2C%20it%20is%20easy%20for%20them%20to%20find%20all%20settings%20that%20need%20to%20be%20configured%20so%20their%20resources%20will%20be%20compliant.%20We%20are%20mapping%20security%20recommendations%20to%20the%20topics%20that%20need%20to%20be%20taken%20care%20of%20when%20applying%20the%20compliance%20standard%20to%20an%20environment.%20So%2C%20with%20the%20compliance%20dashboard%2C%20it%20is%20easier%20to%20plan%20for%20which%20recommendations%20to%20focus%20on%20first%20in%20order%20to%20get%20the%20environment%20compliant%2C%20and%20then%20focus%20on%20remediating%20all%20the%20other%20recommendations%20and%20security%20controls.%20Once%20you%20remediate%20the%20recommendations%20from%20the%20Regulatory%20Compliance%20dashboard%2C%20they%20will%20also%20be%20remediated%20and%20count%20towards%20your%20Secure%20Score%20(but%20again%3A%20for%20receiving%20credits%20towards%20your%20Secure%20Score%2C%20%3CEM%3Eall%20recommendations%3C%2FEM%3E%20within%20a%20Security%20Control%20need%20to%20be%20remediated%20for%20a%20particular%20resource).%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ESo%2C%20to%20make%20sure%20your%20environment%20is%20as%20secure%20as%20possible%2C%20you%20should%20try%20to%20get%20the%20Secure%20Score%20to%20100%25.%20If%20you%20achieve%20this%2C%20your%20compliance%20assessments%20will%20also%20reflect%20this%20achievement.%20If%20you%20focus%20on%20increasing%20your%20Secure%20Score%2C%20the%20recommendations%20that%20pop%20up%20in%20the%20different%20regulatory%20compliance%20assessments%20will%20automatically%20show%20less%20non-compliant%20resources.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EAt%20the%20end%2C%20Secure%20Score%20is%20the%20main%20KPI%20for%20how%20secure%20an%20environment%20is.%20The%20compliance%20dashboard%20gives%20you%20another%20view%20on%20your%20environment.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EBest%20regards%2C%3C%2FP%3E%0A%3CP%3ETom%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1569984%22%20slang%3D%22en-US%22%3ERe%3A%20ASC%20Security%20Policies%20%26amp%3B%20Compliance%20Wording%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1569984%22%20slang%3D%22en-US%22%3E%3CP%3EHi%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F748777%22%20target%3D%22_blank%22%3E%40GlavniArhivator%3C%2FA%3E%2C%3C%2FP%3E%0A%3CP%3Eit's%20all%20about%20the%20details%20%3CIMG%20class%3D%22lia-deferred-image%20lia-image-emoji%22%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Fhtml%2Fimages%2Femoticons%2Fsmile_40x40.gif%22%20alt%3D%22%3Asmile%3A%22%20title%3D%22%3Asmile%3A%22%20%2F%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ERegarding%20your%20follow-up%20questions%3A%3C%2FP%3E%0A%3COL%3E%0A%3CLI%3EThe%20recommendations%20you%20see%20in%20the%20Resource%20Security%20Hygiene%20part%20of%20ASC%2C%20and%20which%20influence%20your%20secure%20score%2C%20are%20derived%20from%20several%20sources%2C%20benchmarks%2C%20and%20best%20practices.%20That%20said%2C%20if%20they%20apply%20to%20the%20CIS1.1.0%20benchmark%2C%20they%20will%20also%20appear%20there.%3C%2FLI%3E%0A%3CLI%3EI%20currently%20don't%20have%20insights%20into%20what%20baselines%20are%20the%20source%20of%20AZ-500%2C%20but%20in%20the%20end%2C%20the%20learnings%20from%20this%20exam%20also%20reflect%20real-life%20best-practices%20(such%20as%20make%20sure%20your%20accounts%20are%20protected%20with%20MFA%2C%20NSGs%20are%20important%20for%20network%20security%2C%20and%20so%20on).%3C%2FLI%3E%0A%3CLI%3EYou%20understand%20this%20correctly.%20Furthermore%2C%20if%20you%20take%20a%20look%20at%20the%20Azure%20Policy%20Initiative%20itself%2C%20you%20might%20see%20policies%20which%20appear%20as%20having%20non-compliant%20resources%2C%20but%20in%20ASC%20they%20are%20not%20shown.%20This%20is%20because%20ASC%20uses%20some%20other%20backend%20mechanisms%20besides%20Azure%20Policy%20only.%20For%20example%2C%20if%20a%20recommendation%20does%20not%20apply%20to%20a%20third-party%20firewall%20appliance%20which%20basically%20is%20a%20Linux%20VM%2C%20the%20Policy%20might%20say%20that%20this%20resource%20is%20non-compliant%2C%20whereas%20ASC%20will%20tell%20you%20that%20the%20recommendation%20does%20not%20apply%20to%20that%20resource.%20So%2C%20for%20your%20security%20policy%2C%20you%20should%20always%20look%20to%20ASC%20instead%20of%20the%20respective%20Azure%20Policy%20Initiative.%20Regarding%20the%20second%20part%20of%20your%20question%3A%20this%20is%20something%20many%20customers%20are%20asking%20for%20and%20this%20is%20why%20I've%20published%20a%20%3CA%20title%3D%22How%20Secure%20Score%20affects%20your%20governance%22%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fazure-security-center%2Fhow-secure-score-affects-your-governance%2Fba-p%2F1490169%22%20target%3D%22_self%22%3Ededicated%20article%3C%2FA%3E%20to%20describe%20how%20Secure%20Score%20affects%20governance%20concepts.%20I%20would%20highly%20recommend%20to%20not%20only%20remediate%20security%20controls%2C%20but%20at%20the%20same%20time%2C%20to%20make%20sure%20you%20either%20have%20Deny%20or%20DINE%20(Deploy%20if%20not%20exists)%20policies%20or%20Azure%20Blueprints%20in%20place%20that%20will%20make%20sure%20your%20future%20resources%20are%20deployed%20secure%20by%20default%2C%20or%20to%20change%20your%20deployment%20pipeline%20(ARM%20templates%2C%20PowerShell%20scripts%2C%20Terraform%20templates%2C...)%20accordingly.%20You%20should%20make%20sure%20to%20have%20policies%20and%20deployment%20scripts%20in%20sync%2C%20not%20to%20create%20conflicts%20during%20deployment.%3C%2FLI%3E%0A%3CLI%3EWe're%20currently%20working%20on%20a%20capability%20like%20this%2C%20but%20there's%20no%20ETA%2C%20yet.%3C%2FLI%3E%0A%3C%2FOL%3E%0A%3CP%3EI%20hope%2C%20this%20helps%3F%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThanks%20and%20best%2C%3C%2FP%3E%0A%3CP%3ETom%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1572421%22%20slang%3D%22en-US%22%3ERe%3A%20ASC%20Security%20Policies%20%26amp%3B%20Compliance%20Wording%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1572421%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F699391%22%20target%3D%22_blank%22%3E%40Tom_Janetscheck%3C%2FA%3E%26nbsp%3B%3C%2FP%3E%3CP%3EThanks%20Tom.%20Where%20can%20I%20find%26nbsp%3B%3CSPAN%20class%3D%22ext-grid-section-column-displayName-margin-left%20ext-grid-section-column-displayName%22%3E%3CSPAN%20class%3D%22ext-grid-section-column-displayName-hierarchical%22%3E%3CEM%3ERemediate%20security%20configurations%3C%2FEM%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FSPAN%3E%3CSPAN%20class%3D%22ext-grid-section-column-displayName-margin-left%20ext-grid-section-column-displayName%22%3Esecurity%20control%20%3F%20I%20don't%20see%20that%20anywhere.%3C%2FSPAN%3E%3C%2FP%3E%3CP%3E%3CBR%20%2F%3EKind%20regards%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1572627%22%20slang%3D%22en-US%22%3ERe%3A%20ASC%20Security%20Policies%20%26amp%3B%20Compliance%20Wording%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1572627%22%20slang%3D%22en-US%22%3E%3CP%3EHi%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F748777%22%20target%3D%22_blank%22%3E%40GlavniArhivator%3C%2FA%3E%2C%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3Eyou%20find%20it%20in%20the%20Resource%20Security%20Hygiene%20part%20of%20Azure%20Security%20Center%20as%20the%20screenshot%20below%20shows%3A%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-center%22%20image-alt%3D%22Screenshot%202020-08-07%20at%2011.37.29.png%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F210963iA6899D0E8B5737ED%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20title%3D%22Screenshot%202020-08-07%20at%2011.37.29.png%22%20alt%3D%22Remediate%20security%20configurations%20Security%20Control%20in%20Azure%20Security%20Center%22%20%2F%3E%3CSPAN%20class%3D%22lia-inline-image-caption%22%20onclick%3D%22event.preventDefault()%3B%22%3ERemediate%20security%20configurations%20Security%20Control%20in%20Azure%20Security%20Center%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%20style%3D%22font-family%3A%20inherit%3B%22%3EBest%20regards%2C%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3ETom%3C%2FP%3E%3C%2FLINGO-BODY%3E
Highlighted
Occasional Contributor

Hi all

 

I have some questions i don't find clear answers in the documentation, so i hope you may share your insights here.

 

First, I don't see how the regulatory compliance impact the secure score? Some of them are in the recommendations, some of them are not.

 

Second, what's actually the difference between the Azure CIS 1.1.0 and the Azure Benchmark? And how they are connected with Azure Policy? Additionally, i though the ASC recommendations are based on Azure Policy, but then i read also that they are based on Benchmarks?

 

4th thing: Is it possible to e.g. set up one of the policies from ASC Default in that way that it only monitor it for a specific resource group? Let's say I want that one of that ASC default policies regarding VM security (e.g. Disk encryption on VM's) only monitor a specific resource group. How can i handle that? I tried to add custom initiatives with a defined scope for a specific resource but then there are no recommendations. 

 

Thank you in advance

13 Replies
Highlighted
Best Response confirmed by GlavniArhivator (Occasional Contributor)
Solution

Hi @GlavniArhivator

thanks for asking these great questions, I'll try to answer them in the respective order using a numbered list. 

  1. Regulatory compliance is part of the ASC Standard tier, whereas Secure Score comes with the ASC free tier. Today, we do not map the compliance assessment results to your Secure Score.
  2. The Azure Security Benchmark is not exactly the same, as the CIS 1.1.0 benchmark we have integrated in ASC. However, its controls are consistent with other well-known security benchmarks, such as CIS 7.1. You can find more information about the Azure Security Benchmark at https://docs.microsoft.com/en-us/azure/security/benchmarks/overview
  3. Benchmarks and Azure Policy are not the same. You can see Azure Policy as the tool for technically implementing auditing of security benchmarks. So, the recommendations you see in your Security Controls in the Resource Security Hygiene part of Azure Security Center are derived from well-known security benchmarks and the technical implementation under the hood is based on Azure Policy. In other words: we are using Azure Policy to create the recommendations you see in Azure Security Center, but these recommendations are based on industry-standard security best-practices.
  4. No, this is not possible today. The security policy Azure Security Center relies on is scoped to the Management Group or Subscription level.

Best regards,

Tom Janetscheck

Senior Program Manager

CxE | Azure Security Center

 

Highlighted

@Tom_Janetscheck 

Hi Tom

 

Many thanks for your answer. ASC looks very simple but actually it's much more magic behind:)  I have a few follow-up questions to your answers.

  1. How does it then come that many of the CIS 1.1.0 i also see in the recommendations? Am I right that many but not all of the regulatory compliance advices are in the recommendations which in the end effect impact the secure score?
  2.  Ok, i see that they are not the same. But i don't see the connection between them and the baseline from the AZ-500 learnings and the best practices. Are they all connected?

  3. Ok, so I understand it like that: the idea of ASC recommendations isbased on the benchmarks and best practices and Azure Policy is just used to make them visible in a technical perspective.
    Would you recommend here to not only remediate them but also to create new Policy or even Azure Blueprint for future deployments in order to have the secure score stable?

  4. Yes, that was was my question, if I could do exceptions for a specific resource group:)?

 

Many thanks in advance!

 

Highlighted

Hi @GlavniArhivator,

it's all about the details :smile:

 

Regarding your follow-up questions:

  1. The recommendations you see in the Resource Security Hygiene part of ASC, and which influence your secure score, are derived from several sources, benchmarks, and best practices. That said, if they apply to the CIS1.1.0 benchmark, they will also appear there.
  2. I currently don't have insights into what baselines are the source of AZ-500, but in the end, the learnings from this exam also reflect real-life best-practices (such as make sure your accounts are protected with MFA, NSGs are important for network security, and so on).
  3. You understand this correctly. Furthermore, if you take a look at the Azure Policy Initiative itself, you might see policies which appear as having non-compliant resources, but in ASC they are not shown. This is because ASC uses some other backend mechanisms besides Azure Policy only. For example, if a recommendation does not apply to a third-party firewall appliance which basically is a Linux VM, the Policy might say that this resource is non-compliant, whereas ASC will tell you that the recommendation does not apply to that resource. So, for your security policy, you should always look to ASC instead of the respective Azure Policy Initiative. Regarding the second part of your question: this is something many customers are asking for and this is why I've published a dedicated article to describe how Secure Score affects governance concepts. I would highly recommend to not only remediate security controls, but at the same time, to make sure you either have Deny or DINE (Deploy if not exists) policies or Azure Blueprints in place that will make sure your future resources are deployed secure by default, or to change your deployment pipeline (ARM templates, PowerShell scripts, Terraform templates,...) accordingly. You should make sure to have policies and deployment scripts in sync, not to create conflicts during deployment.
  4. We're currently working on a capability like this, but there's no ETA, yet.

I hope, this helps?

 

Thanks and best,

Tom

Highlighted

@Tom_Janetscheck 

 

Thanks Tom. Everything is perfectly answered, but the first is not so clear.

Or maybe i didn't explained well. e.g. in the Azure CIS 1.1.0 I see a Control "7.1 Ensure that "OS disk" are encrypted" and below the "Disk encryption should be applied on virutal machines" security control which is in the recommendations. When i remediate them, then i have an effect on secure score. Two things I need to clarify here: does it mean that some of the regulatory compliance points are same as recommendations (or similar) but not all? And genrally spoken , I though that both ASC and Indusitry & regulatory standards policies (Azure CIS1.1.0, ISO 27001, SOT TSP and so on) do create recommendations which impact my secure score? 

The other side is: If regulatory compliance policies does not have an impact on secure score, How to handle that "Regulatory compliance assessment" or on which level to pay attention on it?. At this moment it looks like secure score with his gamification and direct remediations impacts is much more relevant than to follow regulatory compliance? 

Best regards!

Highlighted

Hey @GlavniArhivator

sorry for confusing you - let me try to explain it differently:

 

The regulatory compliance part of ASC is another view to security risks. If you, for example, take a look at the CIS 1.1.0 control 7.1 Ensure that OS disks are encrypted, and you then go to the underlying recommendation "Disk encryption should be applied on virtual machines"; once you remediate this recommendation, you will gain credit towards your Secure Score if, besides this recommendation, you have made sure that all other recommendations in the same Security Control (Enable encryption at rest) have also been remediated. So, in order to increase your Secure Score, it's not enough to remediate the recommendation only, but from the perspective of the respective compliance standard, it is.

 

If you then, for example, take a look at the SOC TSP set of controls, you will find CCE-numbers underneath C1.2. These refer to vulnerabilities that have been found on machines within the scope of the policy.

SOC TSPSOC TSP

There is no single recommendation or Security Control for these in the Resource Security Hygiene part of ASC, but you will find them underneath the Vulnerabilities in security configuration on your machines should be remediated recommendation, which is part of the Remediate security configurations security control.

Remediate vulnerabilitiesRemediate vulnerabilities

 

We have customers that need their resources to comply to different regulatory compliance standards. With the Regulatory Compliance dashboard, it is easy for them to find all settings that need to be configured so their resources will be compliant. We are mapping security recommendations to the topics that need to be taken care of when applying the compliance standard to an environment. So, with the compliance dashboard, it is easier to plan for which recommendations to focus on first in order to get the environment compliant, and then focus on remediating all the other recommendations and security controls. Once you remediate the recommendations from the Regulatory Compliance dashboard, they will also be remediated and count towards your Secure Score (but again: for receiving credits towards your Secure Score, all recommendations within a Security Control need to be remediated for a particular resource).

 

So, to make sure your environment is as secure as possible, you should try to get the Secure Score to 100%. If you achieve this, your compliance assessments will also reflect this achievement. If you focus on increasing your Secure Score, the recommendations that pop up in the different regulatory compliance assessments will automatically show less non-compliant resources.

 

At the end, Secure Score is the main KPI for how secure an environment is. The compliance dashboard gives you another view on your environment.

 

Best regards,

Tom

Highlighted

@Tom_Janetscheck 

Thanks Tom. Where can I find Remediate security configurations security control ? I don't see that anywhere.


Kind regards

Highlighted

Hi @GlavniArhivator,

you find it in the Resource Security Hygiene part of Azure Security Center:

 

Remediate security configurations Security Control in Azure Security CenterRemediate security configurations Security Control in Azure Security Center

Best regards,

Tom

Highlighted

@Tom_Janetscheck 

 

Sorry Tom, I meant the CCE-... recommendations within the regulatory policy controls (like SOC, ISO ...).


Thanks and all the best

Highlighted

Hey @GlavniArhivator

 

they are grouped as vulnerabilities under the Vulnerabilities in security configuration on your machines should be remediated recommendation, which is part of the above mentioned security control.

Screenshot 2020-08-07 at 13.22.37.png

Best,

Tom

Highlighted

@Tom_Janetscheck 

 

Hi guys. I am not sure if you are right here.

First of all, it is not really clear if the regulatories are that one that gives the security controls/recommendations and are showed in the recommendation tab or vice versa if the benchmarks of Microsoft are just creating recommendations and feed or map them to standards. 

 

Because os it is confusing that it s not clear if all the recommendations are from one of the regulatories or not; and.. at the other side there are quite a lot of "empty" controls in the regulations.

 

Why I see this like that? - Exclusion of recommendations does not work

Yes; let's say i want to exclude a security recommendation control because I dont need it. When I exclude that policy in the ASC default and even when i delete the default ASC policy, I still see that recommendation in the out-of-the-box Azure CIS regulation or other regulatories and also in the recommendations. This leads to false positives and to a decreased security score.

 

Highlighted

Hey @marekatai

 

I'm not sure if I could entirely follow your argumentation, but let me try to divide and explain the different parts.

 

Security Recommendations, which are part of Security Controls, and Regulatory Compliance are two different parts of the product. Security Controls combine Security Recommendations that belong together and influence your environment's Secure Score. These recommendations are based on the Security Policy Initiative, which you can customise. As you said, today you can only switch a security policy in this initiative on and off, but we are currently working on a resource exemption capability (no ETA, yet). It is correct that switching off a security policy in the security initiative will not influence the recommendations within the regulatory compliance policies, because they rely on separate compliance policies. Why is that?

 

In the regulatory compliance part of the product, we take standard definitions like ISO27001, SOC TSP, or HITRUST/HIPAA and map their regulations to assessments that will then show you how compliant your Azure environment is in regards of these standards. If you decide that for your environment, you want to switch off some of the recommendations in the resource security hygiene part, than this is okay and you can do it - but from a compliance perspective, your environment then might never be compliant regarding a particular compliance policy.

 

Let me give you an example:

You might decide, to switch off the recommendation External accounts with owner permissions should be removed from your subscription. You can do it with a Custom Security Policy, so you don't need to take care of it when remediating recommendations. But what if your company needs to comply to the SOC TSP compliance standard? This compliance standard contains section C1.2: Confidential information within the boundaries of the system is protected against unauthorized access, use, and disclosure during input, processing, retention, output, and disposition in accordance with confidentiality commitments and requirements. And part of this compliance standard is the above mentioned assessment. So, if you'd switch it off because you decide you cannot remove external accounts with owner permissions and take the risk which is associated with it, your environment would never be compliant regarding this particular compliance standard. This is why you cannot switch off parts of compliance policies. In this example, in order to comply to SOC TSP, you would have to disable external ownership and think of a different process.

 

I don't think that this leads to false positives. First of all, Secure Score is not part of Regulatory Compliance, but of resource security hygiene. That said, we don't score your achievements in the Regulatory Compliance towards the Secure Score, because it is a different idea behind. Of course, if you get your environment "green" regarding a particular compliance standard, your Secure Score might also have increased, because, at the same time, you'll have remediated some entire Security Controls when taking care of getting your environment compliant. But the main idea behind Regulatory Compliance in Azure Security Center is to give you an easy view on separate compliance rules and what assessments need to be remediated. Again, if you want to customise your Security Policy, you can do it. But compliance standards are not customisable because they simply demand several enforcements. It is not a false positive because the assessments belong to the standards. And your Secure Score will not decrease, but increase, once you switch off particular Security Controls or Recommendations.

 

I hope this helps and clarifies it a bit more.

 

Best regards,

Tom Janetscheck

Senior Program Manager

CxE | Azure Security Center

Highlighted

@Tom_Janetscheck 

 

Hi Tom,

 

This whole thread is most interesting en gives a lot of new insights on how to make optimal use of Security Center. Everybody has his own insights and use-cases and I want to check my insights after reading this thread. I'm working on a large project and we would like to govern our subscriptions based on the Azure CIS 1.1.0 (new) Compliance policy.

  1. To a default configuration of Security Center I manually added the 'Azure CIS 1.1.0 (new)' policy from Regulatory Compliance. In the 'Recommendations'-pane I see under "Custom Recommendations" several items (controls) added from Azure CIS 1.1.0. (new), but not all. Is it correct to assume that the CIS 1.1.0 (new) controls not visible under 'Custom Recommendations' overlap with the ASC policy/benchmark and therefore are not specifically named in the recommendations?
  2. We want to empower our projects team as much as possible in managing their own subscriptions. Secure score is fantastic tool for the project-teams to provide insigths in the general security posture of the subscription.  We would also like to provide that insight based on the Azure CIS 1.1.0 (new) compliance policy. Is the number of 'passed controls' in the dashboard available in the API? Or maybe you have another suggestion?
  3. We want to keep our Azure CIS 1.1.0 (new) policy up to date. What would be the recommended way to be notified/informed of new releases of this policy.

Thank you for your time.

 

Regards, Erik

Highlighted

@Erik_Snijder

 

Hello Erik,

thanks for asking. I'm glad you like this thread and the Secure Score feature. Regarding your questions:

  1. That's correct. As mentioned above, Regulatory Compliance standards are another view on existing (and additional) recommendations. The default set of recommendations and the compliance standards technically consist of Azure Policy Initiatives, that share a common set of policies. If you already see a recommendation that is also part of the Compliance Standard you activate additionally, the same policy is used and, therefore, no second recommendation is added.
  2. Yes, the Regulatory Compliance Standards API contains the number of passed, failed, and not applicable controls:

    Tom_Janetscheck_0-1599835282261.png

    I have published an automation artifact in our GitHub community, which will send a weekly compliance report per subscription by email. The email will contain the information gathered from the above mentioned API. Maybe you can use parts of this Playbook for your scenario?
  3. As long as you are using the builtin Policy Initiatives, they are automatically maintained.

Have a great weekend and best regards,

 

Tom Janetscheck

Senior Program Manager

CxE | Azure Security Center