CCSS (Common Configuration Scoring System) is a set of measures used to determine the severity of the rule.
Each rule is associated with a high-level category. For example IAM, Container, Monitoring, Logging, Network, etc.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsNot capturing the diagnostic setting AuditEvent category for appropriate management activities can lead to missing important alerts.
Set properties.logs.category
to AuditEvent
and properties.logs.enabled
to true
.
{
"$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#",
"contentVersion": "1.0.0.0",
"parameters": {},
"resources": [
{
"type": "Microsoft.Insights/diagnosticSettings",
"apiVersion": "2021-05-01-preview",
"scope": "mykeyvault",
"name": "allowed1",
"properties": {
"workspaceId": "myworkspaceId",
"storageAccountId": "myaccountId",
"eventHubAuthorizationRuleId": "myeventHubAuthorizationRuleId",
"eventHubName": "myeventHubName",
"logs": [
{
"category": "AuditEvent",
"enabled": true
}
],
"metrics": [
{
"category": "AllMetrics",
"enabled": true
}
]
}
}
]
}
Set log.category
to AuditEvent
and log.enabled
to true
.
log.category
to AuditEvent
and log.enabled
to true
. Note the log
attribute was deprecated in v3.63.0.enabled_log.category
to AuditEvent
or enabled_log.category_group
to one of audit
or allLogs
.# For AzureRM provider < v4.0.0
resource "azurerm_monitor_diagnostic_setting" "allowed" {
name = "exampleallowed"
target_resource_id = azurerm_key_vault.example.id
storage_account_id = azurerm_storage_account.example.id
log {
category = "AuditEvent"
enabled = true
}
}
# For AzureRM provider >= v4.0.0
resource "azurerm_monitor_diagnostic_setting" "allowed" {
name = "exampleallowed"
target_resource_id = azurerm_key_vault.example478.id
storage_account_id = azurerm_storage_account.example478.id
enabled_log {
category = "AuditEvent"
}
}
OR
# For AzureRM provider >= v4.0.0
resource "azurerm_monitor_diagnostic_setting" "allowed" {
name = "example478allowed"
target_resource_id = azurerm_key_vault.example478.id
storage_account_id = azurerm_storage_account.example478.id
enabled_log {
category_group = "audit"
}
}