Security Center default policy setting 'Monitor Disk Encryption' is not enabled Affecting Security Center service in Azure


0.0
medium
0
10
    Severity Framework Snyk CCSS
    Rule category Monitoring / Data

Is your enviroment affected by this misconfiguration?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
    Frameworks
    CIS-Azure CIS-Controls CSA-CCM GDPR HIPAA SOC-2
  • Snyk ID SNYK-CC-00667
  • credit Snyk Research Team

Description

This policy setting recommends enabling disk encryption in all virtual machines to enhance data protection at rest.

How to fix?

Set policy_definition_id to /providers/Microsoft.Authorization/policyDefinitions/0961003e-5a0a-4549-abde-af6a37f2724d, and set enforce to true or remove the attribute.

Example Configuration

{
    "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#",
    "contentVersion": "1.0.0.0",
    "resources": [
        "type": "Microsoft.Authorization/policyAssignments",
            "apiVersion": "2022-06-01",
            "name": "allowed",
            "location": "[resourceGroup().location]",
            "identity": {
                "type": "SystemAssigned"
            },
            "properties": {
                "description": "By default, a virtual machine's OS and data disks are encrypted-at-rest using platform-managed keys. Temp disks, data caches and data flowing between compute and storage aren't encrypted",
                "displayName": "Virtual machines should encrypt temp disks, caches, and data flows between Compute and Storage resources",
                "enforcementMode": "Default",
                "metadata": {},
                "parameters": {},
                "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/0961003e-5a0a-4549-abde-af6a37f2724d"
            }
    ]
}