Update ZeroTrustTIC3Mapping.csv

This commit is contained in:
TJ Banasik 2021-10-01 10:30:26 -04:00
Родитель b787aaf714
Коммит b0ef0ce2f5
1 изменённых файлов: 20 добавлений и 0 удалений

Просмотреть файл

@ -356,3 +356,23 @@ Adaptive application controls for defining safe applications should be enabled o
VPN gateways should use only Azure Active Directory (Azure AD) authentication for point-to-site users,VPN,Enterprise
Gateway subnets should not be configured with a network security group,VPN,Enterprise
Virtual networks should use specified virtual network gateway,VPN,Enterprise
Storage account public access should be disallowed,Access Control,Data Protection
Transparent Data Encryption on SQL databases should be enabled,Access Control,Data Protection
Azure Defender for SQL should be enabled for unprotected SQL Managed Instances,Access Control,Data Protection
Azure Defender for SQL servers on machines should be enabled,Access Control,Data Protection
Transparent Data Encryption on SQL databases should be enabled,Protections for Data at Rest,Data Protection
Automation account variables should be encrypted,Protections for Data at Rest,Data Protection
Secure transfer to storage accounts should be enabled,Protections for Data in Transit,Data Protection
FTPS should be required in your function App,Protections for Data in Transit,Data Protection
Function App should only be accessible over HTTPS,Protections for Data in Transit,Data Protection
Web Application should only be accessible over HTTPS,Protections for Data in Transit,Data Protection
FTPS should be required in your web App,Protections for Data in Transit,Data Protection
Azure Defender for SQL should be enabled for unprotected SQL Managed Instances,Data Loss Prevention,Data Protection
Azure Defender for SQL servers on machines should be enabled,Data Loss Prevention,Data Protection
Azure Defender for Azure SQL Database servers should be enabled,Data Loss Prevention,Data Protection
Azure Defender for Storage should be enabled,Data Loss Prevention,Data Protection
Sensitive data in your SQL databases should be classified,Data Access and Use Telemetry,Data Protection
Adaptive network hardening recommendations should be applied on internet facing virtual machines,Unified Communications & Collaboration,UCC Data Loss Prevention
Windows web servers should be configured to use secure communication protocols,Unified Communications & Collaboration,UCC Data Loss Prevention
Deploy Workflow Automation for Azure Security Center recommendations,Unified Communications & Collaboration,UCC Data Loss Prevention
Azure HDInsight clusters should use encryption in transit to encrypt communication between Azure HDInsight cluster nodes,Unified Communications & Collaboration,UCC Data Loss Prevention

1 RecommendationDisplayName Capability Family
356 VPN gateways should use only Azure Active Directory (Azure AD) authentication for point-to-site users VPN Enterprise
357 Gateway subnets should not be configured with a network security group VPN Enterprise
358 Virtual networks should use specified virtual network gateway VPN Enterprise
359 Storage account public access should be disallowed Access Control Data Protection
360 Transparent Data Encryption on SQL databases should be enabled Access Control Data Protection
361 Azure Defender for SQL should be enabled for unprotected SQL Managed Instances Access Control Data Protection
362 Azure Defender for SQL servers on machines should be enabled Access Control Data Protection
363 Transparent Data Encryption on SQL databases should be enabled Protections for Data at Rest Data Protection
364 Automation account variables should be encrypted Protections for Data at Rest Data Protection
365 Secure transfer to storage accounts should be enabled Protections for Data in Transit Data Protection
366 FTPS should be required in your function App Protections for Data in Transit Data Protection
367 Function App should only be accessible over HTTPS Protections for Data in Transit Data Protection
368 Web Application should only be accessible over HTTPS Protections for Data in Transit Data Protection
369 FTPS should be required in your web App Protections for Data in Transit Data Protection
370 Azure Defender for SQL should be enabled for unprotected SQL Managed Instances Data Loss Prevention Data Protection
371 Azure Defender for SQL servers on machines should be enabled Data Loss Prevention Data Protection
372 Azure Defender for Azure SQL Database servers should be enabled Data Loss Prevention Data Protection
373 Azure Defender for Storage should be enabled Data Loss Prevention Data Protection
374 Sensitive data in your SQL databases should be classified Data Access and Use Telemetry Data Protection
375 Adaptive network hardening recommendations should be applied on internet facing virtual machines Unified Communications & Collaboration UCC Data Loss Prevention
376 Windows web servers should be configured to use secure communication protocols Unified Communications & Collaboration UCC Data Loss Prevention
377 Deploy Workflow Automation for Azure Security Center recommendations Unified Communications & Collaboration UCC Data Loss Prevention
378 Azure HDInsight clusters should use encryption in transit to encrypt communication between Azure HDInsight cluster nodes Unified Communications & Collaboration UCC Data Loss Prevention