Azure-Sentinel/Solutions/MaturityModelForEventLogMan...
v-amolpatil 033c10aec3 updated solutions which were having Is1PConnector true 2024-06-19 12:13:04 +05:30
..
Analytic Rules update solution Maturity Model For Event Log Management M2131 2022-08-22 16:00:52 +05:30
Hunting Queries Updating Workbook version, Solution Preview Image, Analytics/Hunting rules adjusted to datatables to remove externaldata tables which are not functional in GOV clouds. 2022-05-23 17:13:26 -04:00
Package Repackaging- MaturityModelForEventLogManagementM2131 2024-01-31 15:38:09 +05:30
Playbooks Updating Playbooks with same name in solutions 2023-06-13 15:25:32 +05:30
Workbooks Repackaging - Rebranding Changes 2023-11-09 21:32:57 +05:30
data updated solutions which were having Is1PConnector true 2024-06-19 12:13:04 +05:30
ReleaseNotes.md Repackaging solution 2024-01-31 15:43:39 +05:30
SolutionMetadata.json Updating maintempate and UI for workbook 2023-03-10 16:42:40 +05:30
readme.md Updates 2022-04-30 20:51:41 -04:00

readme.md

Overview


Microsoft Sentinel: Maturity Model for Event Log Management (M-21-31) Solution

This solution is designed to enable Cloud Architects, Security Engineers, and Governance Risk Compliance Professionals to increase visibility before, during, and after a cybersecurity incident. The solution includes (1) workbook, (4) hunting queries, (8) analytics rules, and (3) playbooks providing a comprehensive approach to design, build, monitoring, and response in logging architectures. Information from logs on information systems1 (for both on-premises systems and connections hosted by third parties, such as cloud services providers (CSPs) is invaluable in the detection, investigation, and remediation of cyber threats. "Executive Order 14028, Improving the Nation's Cybersecurity, directs decisive action to improve the Federal Governments investigative and remediation capabilities. This memorandum was developed in accordance with and addresses the requirements in section 8 of the Executive Order for logging, log retention, and log management, with a focus on ensuring centralized access and visibility for the highest-level enterprise security operations center (SOC) of each agency. In addition, this memorandum establishes requirements for agencies3 to increase the sharing of such information, as needed and appropriate, to accelerate incident response efforts and to enable more effective defense of Federal information and executive branch departments and agencies." For more information, see 💡Improving the Federal Governments Investigative and Remediation Capabilities Related to Cybersecurity Incidents (M-21-31).

Try on Portal

You can deploy the solution by clicking on the buttons below:

Workbook Overview

Getting Started

The Microsoft Sentinel: Maturity Model for Event Log Management (M-21-31) Solution leverages Azure Policy, Azure Resource Graph, and Azure Log Analytics to align directly with the requirements outlined in the Executive Office of the President: Office of Management & Budget Memorandum (M-21-31): Improving the Federal Government's Investigative and Remediation Capabilities Related to Cybersecurity Incidents. This solution provides the capability to design, build, monitor, and remediate event log management. The Solution includes (1) Workbook for reporting, (8) Analytics Rules for monitoring, (4) Hunting Queries for assessment, and (3) Playbooks for response/remediation. The documentation below provides getting started recommendations for centralizing log analytics data and enabling Microsoft Defender for Cloud Continuous Export. This offering includes telemetry from 25+ Microsoft and Third Party products. Common use cases include conducting M-21-31 assessments via custom reporting, time filtering, subscription filtering, workspace filtering, and guides. The report is exportable for print or PDF with the Print Workbook feature. The workbook is organized by Event Logging Tiers (1-3) which highlight maturity from basic to advanced levels. There are multiple requirements within each Event Logging Tier, each covered by a Control Card. Control Cards include requirements summary, reference documentation links, recommendations for build/design, technology mapping, telemetry over time, and product/portal pages.
For more information, see 💡Improving the Federal Governments Investigative and Remediation Capabilities Related to Cybersecurity Incidents (M-21-31)

Roles Rights
Security Reader View Workbooks, Analytics, Hunting, Security Recommendations
Security Contributor Deploy/Modify Workbooks, Analytics, Hunting Queries, Apply Security Recommendations
Automation Contributor Deploy/Modify Playbooks & Automation Rules
Owner Assign Regulatory Compliance Initiatives

Onboarding Prerequisites

1 Design Log Management Architecture
2 Onboard Microsoft Sentinel
3 Connect & Ingest Data Sources
4 Extend Microsoft Sentinel Across Workspaces and Tenants
5 Configure 12 Months Hot Path Storage with Data Retention
6 Configure 18 Months Cold Path Storage with Azure Data Explorer & Configure Basic Logs
7 Onboard Microsoft Defender for Cloud
8 Add the Azure Security Benchmark and NIST SP 800-53 R4 Assessments to Your Dashboard
9 Continuously Export Microsoft Defender for Cloud Security Recommendations to Microsoft Sentinel

Print/Export Report

1 Set Background Theme: Settings > Appearance > Theme: Azure > Apply
2 Print/Export Report: More Content Actions (...) > Print Content
3 Settings: Layout (Landscape), Pages (All), Print (One Sided), Scale (60), Pages Per Sheet (1), Quality (1,200 DPI), Margins (None) > Print

Workbook

The Microsoft Sentinel: Maturity Model for Event Log Management (M-21-31) workbook provides a dashboard for viewing log queries, azure resource graph, metrics, and policies aligned to logging requirements across the Microsoft portfolio including Azure, Microsoft 365, Multi-Cloud, Hybrid, and On-Premises workloads. This workbook enables Security Architects, Engineers, SecOps Analysts, Managers, and IT Pros to gain situational awareness visibility for the security posture of cloud workloads. There are also recommendations for selecting, designing, deploying, and configuring Microsoft offerings for alignment with respective M-21-31 requirements and practices.

Hunting Queries

This alert audits your logging architecture for recommended data tables aligned to Event Logging (EL0) of the Maturity Model for Event Log Management (M-21-31) standard. The alert triggers when recommended data tables in EL0 are not present.

This alert audits your logging architecture for recommended data tables aligned to Basic Event Logging (EL1) of the Maturity Model for Event Log Management (M-21-31) standard. The alert triggers when recommended data tables in EL1 are not present.

This alert audits your logging architecture for recommended data tables aligned to Intermediate Event Logging (EL2) of the Maturity Model for Event Log Management (M-21-31) standard. The alert triggers when recommended data tables in EL2 are not present.

This alert audits your logging architecture for recommended data tables aligned to Advanced Event Logging (EL3) of the Maturity Model for Event Log Management (M-21-31) standard. The alert triggers when recommended data tables in EL3 are not present.

Analytics

This alert is designed to monitor recommended data tables aligned to the Maturity Model for Event Log Management (M-21-31) standard. The alert triggers when a recommended data table hasn't been observed in over 48 hours.

2) M2131_Data Connector Added or Removed

This alert is designed to monitor data connector configurations. This alert is triggered when a data connector is added, updated, or deleted.

3) M2131_Asset Stopped Logging (heartbeat)

This alert is designed to monitor assets within the Maturity Model for Event Log Management (M-21-31) standard. The alert triggers when a monitored asset fails to provide a heartbeat within 24 hours.

4) M2131_Log Analytics Workspace: Active Storage is less than 12 Months

This alert is designed to monitor log retention within the Maturity Model for Event Log Management (M-21-31) standard. The alert triggers when a log analytics workspace in active storage is configured for less than 1 year.

5) M2131_Event Log Management Posture Changed (Event Logging EL0)

This alert is designed to monitor Azure policies aligned with the Maturity Model for Event Log Management (M-21-31) standard. The alert triggers when EL0 policy compliance falls below 70% within a 1 week time-frame.

6) M2131_Event Log Management Posture Changed (Basic Event Logging EL1)

This alert is designed to monitor Azure policies aligned with the Maturity Model for Event Log Management (M-21-31) standard. The alert triggers when EL1 policy compliance falls below 70% within a 1 week time-frame.

7) M2131_Event Log Management Posture Changed (Intermediate Event Logging EL2)

This alert is designed to monitor Azure policies aligned with the Maturity Model for Event Log Management (M-21-31) standard. The alert triggers when EL2 policy compliance falls below 70% within a 1 week time-frame.

8) M2131_Event Log Management Posture Changed (Advanced Event Logging EL3)

This alert is designed to monitor Azure policies aligned with the Maturity Model for Event Log Management (M-21-31) standard. The alert triggers when EL3 policy compliance falls below 70% within a 1 week time-frame.

Playbooks

1) Notify Log Management Team

This Security Orchestration, Automation, & Response (SOAR) capability is designed for configuration with the solution's analytics rules. When analytics rules trigger this automation notifies the log management team of respective details via Teams chat and exchange email. this automation reduces requirements to manually monitor the workbook or analytics rules while increasing response times.

2) Open DevOps Task based on Recommendation

This Security Orchestration, Automation, & Response (SOAR) capability is designed to create an Azure DevOps Task when an ASC recommendation is triggered. This automation enables a consistent response when resources become unhealthy relative to a predefined recommendation, enabling teams to focus on remediation and improving response times.

3) Open JIRA Ticket based on Recommendation

This Security Orchestration, Automation, & Response (SOAR) capability is designed to open a Jira issue when an recommendation is unhealthy in Microsoft Defender for Cloud. This automation improves time to response by providing consistent notifications when resources become unhealthy relative to a predefined recommendation.

Disclaimer

The Microsoft Sentinel Maturity Model for Event Log Management (M-21-31) Solution demonstrates best practice guidance, but Microsoft does not guarantee nor imply compliance. All accreditation requirements and decisions are governed by the 💡 Office of Management and Budget as outlined in the Improving the Federal Government's Investigative and Remediation Capabilities Related to Cybersecurity Incidents Memorandum (M-21-31). This solution provides visibility and situational awareness for control requirements delivered with Microsoft technologies in predominantly cloud-based environments. Customer experience will vary by user and some panels may require additional configurations and query modification for operation. Recommendations do not imply coverage of respective controls as they are often one of several courses of action for approaching requirements which is unique to each customer. Recommendations should be considered a starting point for planning full or partial coverage of respective control requirements.