Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Enable diagnostic logging of Azure Activity to central (T1) log analytics workspace #373

Closed
shawngib opened this issue Aug 27, 2021 · 0 comments · Fixed by #412
Closed
Assignees
Labels
NIST Policy Issues related NIST 800-53 compliance

Comments

@shawngib
Copy link
Member

Benefit/Result/Outcome

  • To meet SCCA requirements admins will need the ability to ensure/audit central logging capabilities of all MLZ resources and resource groups including activity logs*

Description
Azure activities are a record of what and who acted against resources in Azure which is required by SCCA. SCCA also requires central logging be enabled, while Activity Logs are central to a subscription they are not inclusive of all other logs so it is yet a separate view/data store into required logs. Using diagnostic settings that are set/audited via policy to send these logs to the T1 LA workspace which also will hold all other logs will centralize logging. This can also include sending to storage for warm access to telemetry and eventually off-loaded to on prem which is a requirement of SCCA for cold storage.

Acceptance Criteria

  • Policy added to deployment which creates the activity log diagnostic setting
  • Policy assigned
  • Remediation created for policy which will run the deploy if not exist task on existing activity log.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
NIST Policy Issues related NIST 800-53 compliance
Projects
None yet
2 participants