diff --git a/fixcompliance/data/benchmark/azure/azure_cis_2_1.json b/fixcompliance/data/benchmark/azure/azure_cis_2_1.json index 757a405..c92c041 100644 --- a/fixcompliance/data/benchmark/azure/azure_cis_2_1.json +++ b/fixcompliance/data/benchmark/azure/azure_cis_2_1.json @@ -13,41 +13,41 @@ "title": "1.1 Security Defaults", "description": "Security Defaults in Azure are designed to provide a simple activation of basic security settings that safeguard against common attacks. These defaults are essential for organizations that are either new to Azure or those with minimal requirements, ensuring foundational security without additional cost.", "checks": [ - "microsoft_entra_security_defaults_enabled", - "microsoft_entra_mfa_status_enabled_privileged_users", - "microsoft_entra_mfa_status_enabled_non_privileged_users", - "microsoft_entra_disable_mfa_remember_trusted_devices" + "azure_entra_security_defaults_enabled", + "azure_entra_mfa_status_enabled_privileged_users", + "azure_entra_mfa_status_enabled_non_privileged_users", + "azure_entra_disable_mfa_remember_trusted_devices" ] }, { "title": "1.2 Conditional Access", "description": "Conditional Access policies are critical for adapting security settings based on the context of user sign-ins. This section discusses the importance of establishing policies that limit user access based on specific conditions such as user location, device state, and sign-in risk levels, enhancing security for Azure environments.", "checks": [ - "microsoft_entra_trusted_named_locations_configured", - "microsoft_entra_exclusionary_geographic_access_policy", - "microsoft_entra_mfa_policy_for_admin_groups", - "microsoft_entra_mfa_policy_for_all_users", - "microsoft_entra_mfa_mfa_for_risky_signins", - "microsoft_entra_mfa_mfa_for_azure_service_management_api", - "microsoft_entra_mfa_mfa_for_microsoft_admin_portals", - "microsoft_entra_restrict_non_admin_users_from_creating_tenants", - "microsoft_entra_review_guest_users", - "microsoft_entra_number_of_methods_required_to_reset", - "microsoft_entra_bad_password_list_enforced", - "microsoft_entra_notify_users_on_password_resets", - "microsoft_entra_notify_admins_on_admin_password_reset", - "microsoft_entra_user_consent_for_applications_disabled", - "microsoft_entra_user_consent_for_applications_verified_publishers", - "microsoft_entra_guest_invite_restrictions_admin_only", - "microsoft_entra_restrict_access_to_microsoft_entra_admin_center", - "microsoft_entra_restrict_user_ability_to_access_groups_features_in_the_access_pane", - "microsoft_entra_users_cannot_create_security_groups_in_azure", - "microsoft_entra_owners_cannot_manage_group_membership_requests_in_access_panel", - "microsoft_entra_users_cannot_create_microsoft_365_groups", - "microsoft_entra_require_mfa_to_register_or_join_devices_with_microsoft_entra_id", - "microsoft_entra_custom_role_for_resource_lock_administration", - "microsoft_entra_restrict_subscription_movement_in_microsoft_entra_id_directory", - "microsoft_entra_limit_global_administrator_assignments" + "azure_entra_trusted_named_locations_configured", + "azure_entra_exclusionary_geographic_access_policy", + "azure_entra_mfa_policy_for_admin_groups", + "azure_entra_mfa_policy_for_all_users", + "azure_entra_mfa_for_risky_signins", + "azure_entra_mfa_for_azure_service_management_api", + "azure_entra_mfa_for_microsoft_admin_portals", + "azure_entra_restrict_non_admin_users_from_creating_tenants", + "azure_entra_review_guest_users", + "azure_entra_number_of_methods_required_to_reset", + "azure_entra_bad_password_list_enforced", + "azure_entra_notify_users_on_password_resets", + "azure_entra_notify_admins_on_admin_password_reset", + "azure_entra_user_consent_for_applications_disabled", + "azure_entra_user_consent_for_applications_verified_publishers", + "azure_entra_guest_invite_restrictions_admin_only", + "azure_entra_restrict_access_to_azure_entra_admin_center", + "azure_entra_restrict_user_ability_to_access_groups_features_in_the_access_pane", + "azure_entra_users_cannot_create_security_groups_in_azure", + "azure_entra_owners_cannot_manage_group_membership_requests_in_access_panel", + "azure_entra_users_cannot_create_microsoft_365_groups", + "azure_entra_require_mfa_to_register_or_join_devices_with_azure_entra_id", + "azure_entra_custom_role_for_resource_lock_administration", + "azure_entra_restrict_subscription_movement_in_azure_entra_id_directory", + "azure_entra_limit_global_administrator_assignments" ] } ]