Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Storage accounts should have infrastructure encryption with CMK / Private Endpoints / Restrict network #330

Closed
shawngib opened this issue Aug 4, 2021 · 0 comments
Labels
documentation Improvements or additions to documentation draft Issues that are being authored, not ready for adding to a release. NIST Policy Issues related NIST 800-53 compliance

Comments

@shawngib
Copy link
Member

shawngib commented Aug 4, 2021

Benefit/Result/Outcome

  • Enable infrastructure encryption for higher level of assurance that the data is secure. When infrastructure encryption is enabled.
  • Secure your storage account with greater flexibility using customer-managed keys. When you specify a customer-managed key
  • Azure Private Link lets you connect your virtual network to Azure services without a public IP address at the source or destination. The Private Link platform handles the connectivity between the consumer and services over the Azure backbone network. By mapping private endpoints to your storage account
  • Network access to storage accounts should be restricted. Configure network rules so only applications from allowed networks can access the storage account. To allow connections from specific internet or on-premises clients
  • Protect your storage accounts from potential threats using virtual network rules as a preferred method instead of IP-based filtering. Disabling IP-based filtering prevents public IPs from accessing your storage accounts*

Description
Since the only storage currently deployed is used for diagnostic settings this should be considered as part of 'central diagnostic logging issue' For the purposes of MLZ this requirements should be documented as to how to enable it and it should be.

Acceptance Criteria

  • Document policy requirement and setting encryption instructions. It does not appear to be setting in terraform azurerm.
  • Document policy requirement and setting customer-managed key for encryption. It does not appear to be setting in terraform azurerm
  • Document policy requirement and setting Storage accounts should use private link instructions.
  • Document policy for network settings - Restricted access and private link.
@shawngib shawngib added documentation Improvements or additions to documentation needs triage NIST Policy Issues related NIST 800-53 compliance labels Aug 4, 2021
@shawngib shawngib changed the title [NIST] Storage accounts should have infrastructure encryption [NIST] Storage accounts should have infrastructure encryption with CMK / Private Endpoints / Restrict network Aug 4, 2021
@brooke-hamilton brooke-hamilton changed the title [NIST] Storage accounts should have infrastructure encryption with CMK / Private Endpoints / Restrict network Storage accounts should have infrastructure encryption with CMK / Private Endpoints / Restrict network Aug 14, 2021
@brooke-hamilton brooke-hamilton added draft Issues that are being authored, not ready for adding to a release. and removed needs triage labels Feb 3, 2022
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
documentation Improvements or additions to documentation draft Issues that are being authored, not ready for adding to a release. NIST Policy Issues related NIST 800-53 compliance
Projects
None yet
Development

No branches or pull requests

3 participants