Ensure that an Azure activity log alert is used to detect "Delete Network Security Group Rule" events in your Microsoft Azure cloud account. Activity log alerts get activated when a new activity log event that matches the condition specified in the alert occurs. In this case the condition used is 'Whenever the Administrative Activity Log "Delete Security Rule (networkSecurityGroups/securityRules)" has "any" level with "any" status and event is initiated by "any"'.
This rule resolution is part of the Conformity Security & Compliance tool for Azure.
Monitoring your Azure cloud account for "Delete Network Security Group Rule" events can provide insights into changes done at the Azure Network Security Group (NSG) level and can help reduce the time it takes to detect unsolicited delete requests for NSG rules.
Audit
To determine if there is an activity log alert created for "Delete Network Security Group Rule" events in your Azure cloud account, perform the following actions:
Remediation / Resolution
To create a Microsoft Azure activity log alert for detecting "Delete Network Security Group Rule" events within your Azure cloud account, perform the following actions:
References
- Azure Official Documentation
- Create, view, and manage activity log alerts by using Azure Monitor
- Action rules (preview)
- CIS Microsoft Azure Foundations
- Azure Command Line Interface (CLI) Documentation
- az monitor log-profiles
- az monitor activity-log alert list
- az monitor activity-log alert show
- az monitor activity-log alert create
Unlock the Remediation Steps
Free 30-day Trial
Automatically audit your configurations with Conformity
and gain access to our cloud security platform.
You are auditing:
Create Alert for "Delete Network Security Group Rule" Events
Risk Level: High