Secure by default with built-in CIS Benchmarks - adjust parameters, define exceptions, and enforce them consistently across cloud and on-premises with Azure Arc
Security is more important than ever. The industry-standard for secure machine configuration is the Center for Internet Security (CIS) Benchmarks. These benchmarks provide consensus-based prescriptive guidance to help organizations harden diverse systems, reduce risk, and streamline compliance with major regulatory frameworks and industry standards like NIST, HIPAA, and PCI DSS. In our previous post, we outlined our plans to improve the Linux server compliance and hardening experience on Azure and shared a vision for integrating CIS Benchmarks. Today, that vision has turned into reality.
We're now announcing the next phase of this work: Center for Internet Security (CIS) Benchmarks are now available on Azure for all Azure endorsed distros, at no additional cost to Azure and Azure Arc customers.
With today's announcement, you get access to the CIS Benchmarks on Azure with full parity to what’s published by the Center for Internet Security (CIS). You can adjust parameters or define exceptions, tailoring security to your needs and applying consistent controls across cloud, hybrid, and on-premises environments - without having to implement every control manually. Thanks to this flexible architecture, you can truly manage compliance as code.
How we achieve parity
To ensure accuracy and trust, we rely on and ingest CIS machine-readable Benchmark content (OVAL/XCCDF files) as the source of truth. This guarantees that the controls and rules you apply in Azure match the official CIS specifications, reducing drift and ensuring compliance confidence.
What’s new under the hood
At the core of this update is azure-osconfig’s new compliance engine - a lightweight, open-source module developed by the Azure Core Linux team. It evaluates Linux systems directly against industry-standard benchmarks like CIS, supporting both audit and, in the future, auto-remediation. This enables accurate, scalable compliance checks across large Linux fleets. Here you can read more about azure-osconfig.
Dynamic rule evaluation
The new compliance engine supports simple fact-checking operations, evaluation of logic operations on them (e.g., anyOf, allOf) and Lua based scripting, which allows to express complex checks required by the CIS Critical Security Controls - all evaluated natively without external scripts.
Scalable architecture for large fleets
When the assignment is created, the Azure control plane instructs the machine to pull the latest Policy package via the Machine Configuration agent. Azure-osconfig’s compliance engine is integrated as a light-weight library to the package and called by Machine Configuration agent for evaluation – which happens every 15-30minutes. This ensures near real-time compliance state without overwhelming resources and enables consistent evaluation across thousands of VMs and Azure Arc-enabled servers.
Future-ready for remediation and enforcement
While the Public Preview starts with audit-only mode, the roadmap includes per-rule remediation and enforcement using technologies like eBPF for kernel-level controls. This will allow proactive prevention of configuration drift and runtime hardening at scale. Please reach out if you interested in auto-remediation or enforcement.
Extensibility beyond CIS Benchmarks
The architecture was designed to support other security and compliance standards as well and isn’t limited to CIS Benchmarks. The compliance engine is modular, and we plan to extend the platform with STIG and other relevant industry benchmarks. This positions Azure as a platform for a place where you can manage your compliance from a single control-plane without duplicating efforts elsewhere.
Collaboration with the CIS
This milestone reflects a close collaboration between Microsoft and the CIS to bring industry-standard security guidance into Azure as a built-in capability. Our shared goal is to make cloud-native compliance practical and consistent, while giving customers the flexibility to meet their unique requirements. We are committed to continuously supporting new Benchmark releases, expanding coverage with new distributions and easing adoption through built-in workflows, such as moving from your current Benchmark version to a new version while preserving your custom configurations.
Certification and trust
We can proudly announce that azure-osconfig has met all the requirements and is officially certified by the CIS for Benchmark assessment, so you can trust compliance results as authoritative. Minor benchmark updates will be applied automatically, while major version will be released separately. We will include workflows to help migrate customizations seamlessly across versions.
Key Highlights
- Built-in CIS Benchmarks for Azure Endorsed Linux distributions
- Full parity with official CIS Benchmarks content and certified by the CIS for Benchmark Assessment
- Flexible configuration: adjust parameters, define exceptions, tune severity
- Hybrid support: enforce the same baseline across Azure, on-prem, and multi-cloud with Azure Arc
- Reporting format in CIS tooling style
Supported use cases
- Certified CIS Benchmarks for all Azure Endorsed Distros - Audit only (L1/L2 server profiles)
- Hybrid / On-premises and other cloud machines with Azure Arc for the supported distros
- Compliance as Code (example via Github -> Azure OIDC auth and API integration)
- Compatible with GuestConfig workbook
What’s next?
Our next mission is to bring the previously announced auto-remediation capability into this experience, expand the distribution coverage and elevate our workflows even further. We’re focused on empowering you to resolve issues while honoring the unique operational complexity of your environments. Stay tuned!
Get Started
- Documentation link for this capability
- Enable CIS Benchmarks in Machine Configuration and select the “Official Center for Internet Security (CIS) Benchmarks for Linux Workloads” then select the distributions for your assignment, and customize as needed.
- In case if you want any additional distribution supported or have any feedback for azure-osconfig – please open an Azure support case or a Github issue here
- Relevant Ignite 2025 session:
Connect with us at Ignite
Meet the Linux team and stop by the Linux on Azure booth to see these innovations in action:
|
Session Type |
Session Code |
Session Name |
Date/Time (PST) |
|
Theatre |
THR 712 |
Tue, Nov 18/ 3:15 PM – 3:45 PM | |
|
Breakout |
BRK 143 |
Optimizing performance, deployments, and security for Linux on Azure |
Thu, Nov 20/ 1:00 PM – 1:45 PM |
|
Breakout |
BRK 144 |
Wed, Nov 19/ 1:30 PM – 2:15 PM | |
|
Breakout |
BRK 104 |
From VMs and containers to AI apps with Azure Red Hat OpenShift |
Thu, Nov 20/ 8:30 AM – 9:15 AM |
|
Theatre |
THR 701 |
From Container to Node: Building Minimal-CVE Solutions with Azure Linux |
Wed, Nov 19/ 3:30 PM – 4:00 PM |
|
Lab |
Lab 505 |
Fast track your Linux and PostgreSQL migration with Azure Migrate |
Tue, Nov 18/ 4:30 PM – 5:45 PM PST Wed, Nov 19/ 3:45 PM – 5:00 PM PST Thu, Nov 20/ 9:00 AM – 10:15 AM PST |