Muokkaa

Jaa


Control mapping of the Australian Government ISM PROTECTED blueprint sample

Important

On July 11, 2026, Blueprints (Preview) will be deprecated. Migrate your existing blueprint definitions and assignments to Template Specs and Deployment Stacks. Blueprint artifacts are to be converted to ARM JSON templates or Bicep files used to define deployment stacks. To learn how to author an artifact as an ARM resource, see:

The following article details how the Azure Blueprints Australian Government ISM PROTECTED blueprint sample maps to the ISM PROTECTED controls. For more information about the controls, see ISM PROTECTED.

The following mappings are to the ISM PROTECTED controls. Use the navigation on the right to jump directly to a specific control mapping. Many of the mapped controls are implemented with an Azure Policy initiative. To review the complete initiative, open Policy in the Azure portal and select the Definitions page. Then, find and select the [Preview]: Audit Australian Government ISM PROTECTED controls and deploy specific VM Extensions to support audit requirements built-in policy initiative.

Important

Each control below is associated with one or more Azure Policy definitions. These policies may help you assess compliance with the control; however, there often is not a one-to-one or complete match between a control and one or more policies. As such, Compliant in Azure Policy refers only to the policies themselves; this doesn't ensure you're fully compliant with all requirements of a control. In addition, the compliance standard includes controls that aren't addressed by any Azure Policy definitions at this time. Therefore, compliance in Azure Policy is only a partial view of your overall compliance status. The associations between controls and Azure Policy definitions for this compliance blueprint sample may change over time. To view the change history, see the GitHub Commit History.

Location Constraints

This blueprint helps you restrict the location for the deployment of all resources and resource groups to "Australia Central", "Australia Central2", "Australia East" and "Australia Southeast" by assigning following Azure Policy definitions:

  • Allowed locations (has been hard coded to "Australia Central", "Australia Central2", "Australia East" and "Australia Southeast")
  • Allowed locations for resource groups (has been hard coded to "Australia Central", "Australia Central2", "Australia East" and "Australia Southeast")

Guidelines for Personnel Security - Access to systems and their resources

0414 Personnel granted access to a system and its resources are uniquely identifiable

  • MFA should be enabled on accounts with owner permissions on your subscription
  • MFA should be enabled accounts with write permissions on your subscription
  • MFA should be enabled on accounts with read permissions on your subscription

1503 Standard access to systems, applications and data repositories is limited to that required for personnel to undertake their duties

  • A maximum of 3 owners should be designated for your subscription
  • There should be more than one owner assigned to your subscription
  • Show audit results from Windows VMs in which the Administrators group contains any of the specified members
  • Deploy prerequisites to audit Windows VMs in which the Administrators group contains any of the specified members

1507 Privileged access to systems, applications and data repositories is validated when first requested and revalidated on an annual or more frequent basis

  • Show audit results from Windows VMs in which the Administrators group contains any of the specified members
  • Deploy prerequisites to audit Windows VMs in which the Administrators group contains any of the specified members

1508 Privileged access to systems, applications and data repositories is limited to that required for personnel to undertake their duties

  • A maximum of 3 owners should be designated for your subscription
  • There should be more than one owner assigned to your subscription
  • Show audit results from Windows VMs in which the Administrators group contains any of the specified members
  • Deploy prerequisites to audit Windows VMs in which the Administrators group contains any of the specified members
  • Just-In-Time network access control should be applied on virtual machines

0415 The use of shared user accounts is strictly controlled, and personnel using such accounts are uniquely identifiable

  • Show audit results from Windows VMs in which the Administrators group contains any of the specified members
  • Deploy prerequisites to audit Windows VMs in which the Administrators group contains any of the specified members

0445 Privileged users are assigned a dedicated privileged account to be used solely for tasks requiring privileged access

  • Show audit results from Windows VMs in which the Administrators group contains any of the specified members
  • Deploy prerequisites to audit Windows VMs in which the Administrators group contains any of the specified members

0430 Access to systems, applications and data repositories is removed or suspended on the same day personnel no longer have a legitimate requirement for access

  • Deprecated accounts should be removed from your subscription
  • Deprecated accounts with owner permissions should be removed from your subscription

0441 When personnel are granted temporary access to a system, effective security controls are put in place to restrict their access to only information required for them to undertake their duties

  • External accounts with owner permissions should be removed from your subscription
  • External accounts with write permissions should be removed from your subscription
  • Deprecated accounts should be removed from your subscription
  • Deprecated accounts with owner permissions should be removed from your subscription

Guidelines for System Hardening - Operating system hardening

1407 The latest version (N), or N-1 version, of an operating system is used for Standard Operating Environments (SOEs)

  • System updates should be installed on your machines
  • System updates on virtual machine scale sets should be installed

0380 Unneeded operating system accounts, software, components, services and functionality are removed or disabled

  • Deprecated accounts should be removed from your subscription
  • Deprecated accounts with owner permissions should be removed from your subscription

1490 An application allow listing solution is implemented on all servers to restrict the execution of executables, software libraries, scripts and installers to an approved set

  • Adaptive Application Controls should be enabled on virtual machines

1417 Antivirus software is implemented on workstations and servers and configured with: signature-based detection enabled and set to a high level, heuristic-based detection enabled and set to a high level, detection signatures checked for currency and updated on at least a daily basis, automatic and regular scanning configured for all fixed disks and removable media

  • Microsoft IaaSAntimalware extension should be deployed on Windows servers
  • Endpoint protection solution should be installed on virtual machine scale sets
  • Monitor missing Endpoint Protection in Azure Security Center

Guidelines for System Hardening - Authentication hardening

1546 Users are authenticated before they are granted access to a system and its resources

  • Audit unrestricted network access to storage accounts
  • Service Fabric clusters should only use Azure Active Directory for client authentication
  • Show audit results from Linux VMs that allow remote connections from accounts without passwords
  • Deploy prerequisites to audit Linux VMs that allow remote connections from accounts without passwords
  • Show audit results from Linux VMs that have accounts without passwords
  • Deploy prerequisites to audit Linux VMs that have accounts without passwords

0974 Multi-factor authentication is used to authenticate standard users

  • MFA should be enabled on accounts with read permissions on your subscription

1173 Multi-factor authentication is used to authenticate all privileged users and any other positions of trust

  • MFA should be enabled on accounts with owner permissions on your subscription
  • MFA should be enabled accounts with write permissions on your subscription

0421 Passphrases used for single-factor authentication are a minimum of 14 characters with complexity, ideally as 4 random words

  • Show audit results from Windows VMs configurations in 'Security Settings - Account Policies'
  • Deploy prerequisites to audit Windows VMs configurations in 'Security Settings - Account Policies'

Guidelines for System Management - System administration

1384 Multi-factor authentication is used to authenticate users each time they perform privileged actions

  • MFA should be enabled on accounts with owner permissions on your subscription
  • MFA should be enabled accounts with write permissions on your subscription
  • MFA should be enabled on accounts with read permissions on your subscription

1386 Management traffic is only allowed to originate from network zones that are used to administer systems and applications

  • Just-In-Time network access control should be applied on virtual machines
  • Remote debugging should be turned off for API Apps
  • Remote debugging should be turned off for Function Apps
  • Remote debugging should be turned off for Web Applications

Guidelines for System Management - System patching

1144 Security vulnerabilities in applications and drivers assessed as extreme risk are patched, updated or mitigated within 48 hours of the security vulnerabilities being identified by vendors, independent third parties, system managers or users

  • Vulnerabilities on your SQL databases should be remediated
  • Vulnerability assessment should be enabled on your SQL servers
  • Vulnerability assessment should be enabled on your SQL managed instances
  • Vulnerability Assessment should be enabled on Machines
  • Vulnerabilities in security configuration on your virtual machine scale sets should be remediated
  • Vulnerabilities should be remediated by a Vulnerability Assessment solution
  • Vulnerabilities in security configuration on your machines should be remediated
  • Vulnerabilities in container security configurations should be remediated
  • Vulnerability Assessment settings for SQL server should contain an email address to receive scan reports

0940 Security vulnerabilities in applications and drivers assessed as high risk are patched, updated or mitigated within two weeks of the security vulnerability being identified by vendors, independent third parties, system managers or users

  • Vulnerabilities on your SQL databases should be remediated
  • Vulnerability assessment should be enabled on your SQL servers
  • Vulnerability assessment should be enabled on your SQL managed instances
  • Vulnerability Assessment should be enabled on Virtual Machines
  • Vulnerabilities in security configuration on your virtual machine scale sets should be remediated
  • Vulnerabilities should be remediated by a Vulnerability Assessment solution
  • Vulnerabilities in security configuration on your machines should be remediated
  • Vulnerabilities in container security configurations should be remediated
  • Vulnerability Assessment settings for SQL server should contain an email address to receive scan reports

1472 Security vulnerabilities in applications and drivers assessed as moderate or low risk are patched, updated or mitigated within one month of the security vulnerability being identified by vendors, independent third parties, system managers or users

  • Vulnerabilities on your SQL databases should be remediated
  • Vulnerability assessment should be enabled on your SQL servers
  • Vulnerability assessment should be enabled on your SQL managed instances
  • Vulnerability Assessment should be enabled on Virtual Machines
  • Vulnerabilities in security configuration on your virtual machine scale sets should be remediated
  • Vulnerabilities should be remediated by a Vulnerability Assessment solution
  • Vulnerabilities in security configuration on your machines should be remediated
  • Vulnerabilities in container security configurations should be remediated
  • Vulnerability Assessment settings for SQL server should contain an email address to receive scan reports

1494 Security vulnerabilities in operating systems and firmware assessed as extreme risk are patched, updated or mitigated within 48 hours of the security vulnerabilities being identified by vendors, independent third parties, system managers or users

  • Vulnerabilities on your SQL databases should be remediated
  • Vulnerability assessment should be enabled on your SQL servers
  • Vulnerability assessment should be enabled on your SQL managed instances
  • Vulnerability Assessment should be enabled on Virtual Machines
  • Vulnerabilities in security configuration on your virtual machine scale sets should be remediated
  • Vulnerabilities should be remediated by a Vulnerability Assessment solution
  • Vulnerabilities in security configuration on your machines should be remediated
  • Vulnerabilities in container security configurations should be remediated
  • Vulnerability Assessment settings for SQL server should contain an email address to receive scan reports

1495 Security vulnerabilities in operating systems and firmware assessed as high risk are patched, updated or mitigated within two weeks of the security vulnerability being identified by vendors, independent third parties, system managers or users

  • Vulnerabilities on your SQL databases should be remediated
  • Vulnerability assessment should be enabled on your SQL servers
  • Vulnerability assessment should be enabled on your SQL managed instances
  • Vulnerability Assessment should be enabled on Virtual Machines
  • Vulnerabilities in security configuration on your virtual machine scale sets should be remediated
  • Vulnerabilities should be remediated by a Vulnerability Assessment solution
  • Vulnerabilities in security configuration on your machines should be remediated
  • Vulnerabilities in container security configurations should be remediated
  • Vulnerability Assessment settings for SQL server should contain an email address to receive scan reports

1496 Security vulnerabilities in operating systems and firmware assessed as moderate or low risk are patched, updated or mitigated within one month of the security vulnerability being identified by vendors, independent third parties, system managers or users

  • Vulnerabilities on your SQL databases should be remediated
  • Vulnerability assessment should be enabled on your SQL servers
  • Vulnerability assessment should be enabled on your SQL managed instances
  • Vulnerability Assessment should be enabled on Virtual Machines
  • Vulnerabilities in security configuration on your virtual machine scale sets should be remediated
  • Vulnerabilities should be remediated by a Vulnerability Assessment solution
  • Vulnerabilities in security configuration on your machines should be remediated
  • Vulnerabilities in container security configurations should be remediated
  • Vulnerability Assessment settings for SQL server should contain an email address to receive scan reports

Guidelines for System Management - Data backup and restoration

1511 Backups of important information, software and configuration settings are performed at least daily

  • Audit virtual machines without disaster recovery configured

Guidelines for System Monitoring - Event logging and auditing

1405 A centralised logging facility is implemented and systems are configured to save event logs to the centralised logging facility as soon as possible after each event occurs

  • Azure subscriptions should have a log profile for Activity Log

0582 The following events are logged for operating systems: access to important data and processes, application crashes and any error messages, attempts to use special privileges, changes to accounts, changes to security policy, changes to system configurations, Domain Name System (DNS) and Hypertext Transfer Protocol (HTTP) requests, failed attempts to access data and system resources, service failures and restarts, system startup and shutdown, transfer of data to external media, user or group management, use of special privileges

  • [Preview]: Audit Log Analytics Agent Deployment - VM Image (OS) unlisted
  • Audit Log Analytics Agent Deployment in VMSS - VM Image (OS) unlisted
  • Audit Log Analytics Workspace for VM - Report Mismatch
  • Audit diagnostic setting

1537 The following events are logged for databases: access to particularly important information, addition of new users, especially privileged users, any query containing comments, any query containing multiple embedded queries, any query or database alerts or failures, attempts to elevate privileges, attempted access that is successful or unsuccessful, changes to the database structure, changes to user roles or database permissions, database administrator actions, database logons and logoffs, modifications to data, use of executable commands

  • Advanced data security should be enabled on your SQL servers
  • Audit diagnostic setting
  • Advanced data security should be enabled on your SQL managed instances

Guidelines for System Monitoring - Vulnerability management

0911 Vulnerability assessments and penetration tests are conducted by suitably skilled personnel before a system is deployed, after a significant change to a system, and at least annually or as specified by the system owner

  • Vulnerabilities on your SQL databases should be remediated
  • Vulnerability assessment should be enabled on your SQL servers
  • Vulnerability assessment should be enabled on your SQL managed instances
  • Vulnerability Assessment should be enabled on Virtual Machines
  • Vulnerabilities in security configuration on your virtual machine scale sets should be remediated
  • Vulnerabilities should be remediated by a Vulnerability Assessment solution
  • Vulnerabilities in security configuration on your machines should be remediated
  • Vulnerabilities in container security configurations should be remediated

Guidelines for Database Systems Management - Database servers

1425 Hard disks of database servers are encrypted using full disk encryption

  • Disk encryption should be applied on virtual machines
  • Transparent Data Encryption on SQL databases should be enabled

1277 Information communicated between database servers and web applications is encrypted

  • Only secure connections to your Redis Cache should be enabled
  • Secure transfer to storage accounts should be enabled
  • Show audit results from Windows web servers that are not using secure communication protocols
  • Deploy prerequisites to audit Windows web servers that are not using secure communication protocols

Guidelines for Database Systems Management - Database management system software

1260 Default database administrator accounts are disabled, renamed or have their passphrases changed

  • An Azure Active Directory administrator should be provisioned for SQL servers

1262 Database administrators have unique and identifiable accounts

  • An Azure Active Directory administrator should be provisioned for SQL servers

1261 Database administrator accounts are not shared across different databases

  • An Azure Active Directory administrator should be provisioned for SQL servers

1263 Database administrator accounts are used exclusively for administrative tasks, with standard database accounts used for general purpose interactions with database

  • An Azure Active Directory administrator should be provisioned for SQL servers

1264 Database administrator access is restricted to defined roles rather than accounts with default administrative permissions, or all permissions

  • An Azure Active Directory administrator should be provisioned for SQL servers

Guidelines for Using Cryptography - Cryptographic fundamentals

0459 Encryption software used for data at rest implements full disk encryption, or partial encryption where access controls will only allow writing to the encrypted partition

  • Disk encryption should be applied on virtual machines

Guidelines for Using Cryptography - Transport Layer Security

1139 Only the latest version of TLS is used

  • Latest TLS version should be used in your API App
  • Latest TLS version should be used in your Web App
  • Latest TLS version should be used in your Function App
  • Deploy prerequisites to audit Windows web servers that are not using secure communication protocols
  • Show audit results from Windows web servers that are not using secure communication protocols

Guidelines for Data Transfers and Content Filtering - Content filtering

1288 Antivirus scanning, using multiple different scanning engines, is performed on all content

  • Microsoft IaaSAntimalware extension should be deployed on Windows servers
  • Endpoint protection solution should be installed on virtual machine scale sets
  • Monitor missing Endpoint Protection in Azure Security Center

Guidelines for Data Transfers and Content Filtering - Web application development

1552 All web application content is offered exclusively using HTTPS

  • Function App should only be accessible over HTTPS
  • API App should only be accessible over HTTPS
  • Web Application should only be accessible over HTTPS
  • Only secure connections to your Redis Cache should be enabled

1424 Web browser-based security controls are implemented for web applications in order to help protect both web applications and their users

  • CORS should not allow every resource to access your Web Applications

Guidelines for Network Management - Network design and configuration

0520 Network access controls are implemented on networks to prevent the connection of unauthorised network devices

  • Audit unrestricted network access to storage accounts

1182 Network access controls are implemented to limit traffic within and between network segments to only those that are required for business purposes

  • Internet-facing virtual machines should be protected with Network Security Groups
  • Audit unrestricted network access to storage accounts
  • Adaptive Network Hardening recommendations should be applied on internet facing virtual machines

Guidelines for Network Management - Service continuity for online services

1431 Denial-of-service attack prevention and mitigation strategies are discussed with service providers, specifically: their capacity to withstand denial-of-service attacks, any costs likely to be incurred by customers resulting from denial-of-service attacks, thresholds for notifying customers or turning off their online services during denial-of-service attacks, pre-approved actions that can be undertaken during denial-of-service attacks, denial-of-service attack prevention arrangements with upstream providers to block malicious traffic as far upstream as possible

  • DDoS Protection should be enabled

Note

Availability of specific Azure Policy definitions may vary in Azure Government and other national clouds.

Next steps

Additional articles about blueprints and how to use them: