module/ConfigurationProvider/ControlConfigurations/Services/StreamAnalyticsJobs.json
{
"FeatureName": "StreamAnalyticsJobs", "Reference": "", "IsMaintenanceMode": false, "Controls": [ { "ControlID": "Azure_StreamAnalyticsJobs_Audit_Enable_Resource_Logs_MCSB", "Description": "[MCSB] Resource logs in Azure Stream Analytics must be enabled", "Id": "StreamAnalyticsJobs100", "ControlSeverity": "High", "Automated": "Yes", "ControlScanSource": "MDC", "DisplayName": "[MCSB] Resource logs in Azure Stream Analytics must be enabled", "Category": "Monitoring must be correctly configured", "ControlRequirements": "Monitoring and auditing must be enabled and correctly configured according to prescribed organizational guidance", "Rationale": "Audit enabling of resource logs. This enables you to recreate activity trails to use for investigation purposes when a security incident occurs or when your network is compromised.", "Recommendation": "To enable resource logs in Stream Analytics Jobs please refer: https://learn.microsoft.com/en-us/azure/stream-analytics/stream-analytics-job-diagnostic-logs#send-diagnostics-to-azure-monitor-logs.", "Tags": [ "Automated", "Baseline", "Audit", "StreamAnalyticsJobs" ], "AssessmentProperties": { "AssessmentNames": [ "f11b27f2-8c49-5bb4-eff5-e1e5384bf95e" ], "AssessmentStatusMappings": [ { "AssessmentStatusCode": "NotApplicable", "EffectiveVerificationResult": "Failed", "AssessmentStatusCausePatterns": "(.)*OffByPolicy|Exempt(.)*", "AppendMessageToStatusReason": "Disabling or exempting the policy from getting evaluated is not recommended. The Control will be marked as Failed." } ] }, "Enabled": false, "CustomTags": [ "Daily", "MCSB" ] }, { "ControlID": "Azure_StreamAnalytics_Audit_Enable_Diagnostic_Settings", "Description": "Enable Security Logging in Azure Stream Analytics", "Id": "StreamAnalyticsJobs110", "ControlSeverity": "Medium", "Automated": "Yes", "MethodName": "CheckDiagnosticsSettings", "DisplayName": "Enable Security Logging in Azure Stream Analytics", "Category": "Monitoring must be correctly configured", "ControlRequirements": "Monitoring and auditing must be enabled and correctly configured according to prescribed organizational guidance", "Rationale": "Diagnostic logs must be enabled as they provide details for investigation in case of a security breach for threats.", "Recommendation": "To Configure 'Diagnostic settings' for Stream Analytics, go to Azure Portal --> Your Stream Analytics Resource --> Diagnostic settings --> Enable Execution and Authoring Logs with a minimum retention period of 90 days.", "Tags": [ "Automated", "Audit", "Diagnostics", "StreamAnalyticsJobs", "Baseline" ], "ControlEvaluationDetails": { "RequiredProperties": [ "DiagnosticSettings" ] }, "Enabled": true, "ControlSettings": { "DiagnosticForeverRetentionValue": "0", "DiagnosticMinRetentionPeriod": "90", "DiagnosticLogs": [ "Execution", "Authoring" ] }, "CustomTags": [ "Daily", "TenantBaseline", "MSD", "TBv12", "SN:StreamAnalytics_Logging" ] } ] } |