module/ConfigurationProvider/ControlConfigurations/Services/BatchAccounts.json

{
  "FeatureName": "BatchAccounts",
  "Reference": "",
  "IsMaintenanceMode": false,
  "Controls": [
    {
      "ControlID": "Azure_BatchAccounts_Audit_Enable_Resource_Logs_MCSB",
      "Description": "[MCSB] Resource logs in Batch accounts must be enabled",
      "Id": "BatchAccounts100",
      "ControlSeverity": "High",
      "Automated": "Yes",
      "ControlScanSource": "MDC",
      "DisplayName": "[MCSB] Resource logs in Batch accounts must be enabled",
      "Category": "Monitoring must be correctly configured",
      "ControlRequirements": "Monitoring and auditing must be enabled and correctly configured according to prescribed organizational guidance",
      "Rationale": "Audit enabling of resource logs. This enables you to recreate activity trails to use for investigation purposes when a security incident occurs or when your network is compromised.",
      "Recommendation": "To enable resource logs in BatchAccounts please refer: https://learn.microsoft.com/en-us/azure/batch/batch-diagnostics#enable-collection-of-batch-diagnostic-logs",
      "Tags": [
        "SDL",
        "Automated",
        "Baseline",
        "Audit",
        "BatchAccounts"
      ],
      "AssessmentProperties": {
        "AssessmentNames": [
          "32771b45-220c-1a8b-584e-fdd5a2584a66"
        ],
        "AssessmentStatusMappings": [
          {
            "AssessmentStatusCode": "NotApplicable",
            "EffectiveVerificationResult": "Failed",
            "AssessmentStatusCausePatterns": "(.)*OffByPolicy|Exempt(.)*",
            "AppendMessageToStatusReason": "Disabling or exempting the policy from getting evaluated is not recommended. The Control will be marked as Failed."
          }
        ]
      },
      "Enabled": false,
      "CustomTags": [
        "Daily",
        "MCSB"
      ]
    },
    {
      "ControlID": "Azure_BatchAccounts_Audit_Enable_Diagnostic_Settings",
      "Description": "Enable Security Logging in Azure Batch Accounts",
      "Id": "BatchAccounts110",
      "ControlSeverity": "Medium",
      "Automated": "Yes",
      "MethodName": "CheckDiagnosticsSettings",
      "DisplayName": "Enable Security Logging in Azure Batch Accounts",
      "Category": "Monitoring must be correctly configured",
      "ControlRequirements": "Monitoring and auditing must be enabled and correctly configured according to prescribed organizational guidance",
      "Rationale": "Diagnostic logs must be enabled as they provide details for investigation in case of a security breach for threats.",
      "Recommendation": "To Configure 'Diagnostic settings' for Batch Account, go to Azure Portal --> Your Batch Account --> Diagnostic settings --> Enable Service Logs, Audit Logs with a minimum retention period of 90 days.",
      "Tags": [
        "Automated",
        "Audit",
        "Diagnostics",
        "BatchAccounts",
        "Baseline"
      ],
      "ControlEvaluationDetails": {
        "RequiredProperties": [
          "DiagnosticSettings"
        ]
      },
      "Enabled": true,
      "ControlSettings": {
        "DiagnosticForeverRetentionValue": "0",
        "DiagnosticMinRetentionPeriod": "90",
        "DiagnosticLogs": [
          "ServiceLogs",
          "ServiceLog",
          "AuditLog"
        ]
      },
      "CustomTags": [
        "Daily",
        "TenantBaseline",
        "MSD",
        "TBv12",
        "SN:BatchAccounts_Logging"
      ]
    }
  ]
}