You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
| monitoring-check-1 | Monitor audit profile should log all activities |
59
-
| monitoring-check-2 | Monitor audit profile should log all activities |
60
-
| monitoring-check-3 | Security Center default policy setting ‘Monitor Endpoint Protection’ should be enabled |
61
-
| monitoring-check-4 | Monitor log profile should be created |
62
-
| monitoring-check-14 | SQL Server auditing should be enabled |
63
-
| networking-check-1 | Virtual Network security groups should not permit ingress from ‘0.0.0.0/0’ to TCP port 3389 (RDP) |
64
-
| networking-check-2 | Virtual Network security groups attached to SQL Server instances should not permit ingress from 0.0.0.0/0 to all ports and protocols |
65
-
| networking-check-3 | Virtual Network security groups should not permit ingress from '0.0.0.0/0' to TCP/UDP port 22 (SSH) |
| encryption-check-1 | App Service web apps should have 'HTTPS only' enabled |
59
+
| encryption-check-2 | MySQL Database server 'enforce SSL connection' should be enabled |
60
+
| encryption-check-3 | PostgreSQL Database server 'enforce SSL connection' should be enabled |
61
+
| encryption-check-4 | Storage Accounts 'Secure transfer required' should be enabled |
62
+
| monitoring-check-1 | Monitor audit profile should log all activities |
63
+
| monitoring-check-2 | Monitor audit profile should log all activities |
64
+
| monitoring-check-3 | Security Center default policy setting ‘Monitor Endpoint Protection’ should be enabled |
65
+
| monitoring-check-4 | Monitor log profile should be created |
66
+
| monitoring-check-5 | Monitor Activity Log Alert should exist for Create or Update Network Security Group |
67
+
| monitoring-check-6 | Monitor Activity Log Alert should exist for Create or Update Network Security Group Rule |
68
+
| monitoring-check-7 | Monitor Activity Log Alert should exist for Create or Update or Delete SQL Server Firewall Rule |
69
+
| monitoring-check-8 | Monitor Activity Log Alert should exist for Create or Update Security Solution |
70
+
| monitoring-check-9 | Monitor Activity Log Alert should exist for Create Policy Assignment |
71
+
| monitoring-check-10 | Monitor Activity Log Alert should exist for Delete Network Security Group |
72
+
| monitoring-check-11 | Monitor Activity Log Alert should exist for Delete Network Security Group Rule |
73
+
| monitoring-check-12 | Monitor Activity Log Alert should exist for Delete Security Solution |
74
+
| monitoring-check-13 | Monitor log profile should have activity logs for global services and all regions |
75
+
| monitoring-check-14 | SQL Server auditing should be enabled |
76
+
| network-access-check-1 | MySQL Database server firewall rules should not permit start and end IP addresses to be 0.0.0.0 |
77
+
| network-access-check-2 | PostgreSQL Database server firewall rules should not permit start and end IP addresses to be 0.0.0.0 |
78
+
| network-access-check-3 | SQL Server firewall rules should not permit start and end IP addresses to be 0.0.0.0 |
79
+
| network-access-check-4 | Ensure default network access rule for Storage Accounts is set to deny |
80
+
| networking-check-1 | Virtual Network security groups should not permit ingress from ‘0.0.0.0/0’ to TCP port 3389 (RDP) |
81
+
| networking-check-2 | Virtual Network security groups attached to SQL Server instances should not permit ingress from 0.0.0.0/0 to all ports and protocols |
82
+
| networking-check-3 | Virtual Network security groups should not permit ingress from '0.0.0.0/0' to TCP/UDP port 22 (SSH) |
83
+
| policy-version-check-1 | App Service web apps should have 'Minimum TLS Version' set to '1.2' |
84
+
| user-check-1 | Active Directory custom subscription owner roles should not be created |
title: 'Encryption Check 1: App Service web apps should have \'HTTPS only\' enabled',
5
+
6
+
description: 'Azure Web Apps allows sites to run under both HTTP and HTTPS by default. Web apps can be accessed by anyone using non-secure HTTP links by default. Non-secure HTTP requests can be restricted and all HTTP requests redirected to the secure HTTPS port. It is recommended to enforce HTTPS-only traffic.',
7
+
8
+
audit: `**From Azure Console**
9
+
10
+
1. Login to Azure Portal using https://portal.azure.com
11
+
2. Go to App Services
12
+
3. Click on each App
13
+
4. Under Setting section, Click on SSL settings
14
+
5. Ensure that HTTPS Only set to On under Protocol Settings
15
+
16
+
**Using Azure Command Line Interface**
17
+
To check HTTPS-only traffic value for an existing app, run the following command,
18
+
19
+
az webapp show --resource-group <RESOURCE_GROUP_NAME> --name <APP_NAME> --query httpsOnly
20
+
21
+
The output should return true if HTTPS-only traffic value is set to On.`,
22
+
23
+
rationale: 'Enabling HTTPS-only traffic will redirect all non-secure HTTP request to HTTPS ports. HTTPS uses the SSL/TLS protocol to provide a secure connection, which is both encrypted and authenticated. So it is important to support HTTPS for the security benefits.',
24
+
25
+
remediation: `**From Azure Console**
26
+
27
+
1. Login to Azure Portal using https://portal.azure.com
28
+
2. Go to App Services
29
+
3. Click on each App
30
+
4. Under Setting section, Click on SSL settings
31
+
5. Set HTTPS Only to On under Protocol Settings section
32
+
33
+
Using Azure Command Line Interface To set HTTPS-only traffic value for an existing app, run the following command:
34
+
35
+
az webapp update --resource-group <RESOURCE_GROUP_NAME> --name <APP_NAME> --set httpsOnly=true`,
0 commit comments