Plugin Title | Log Container Public Access |
Cloud | AZURE |
Category | Storage Accounts |
Description | Ensures that the Activity Log Container does not have public read access |
More Info | The container used to store Activity Log data should not be exposed publicly to avoid data exposure of sensitive activity logs. |
AZURE Link | https://docs.microsoft.com/en-us/azure/storage/blobs/storage-manage-access-to-resources |
Recommended Action | Ensure the access level for the storage account containing Activity Log data is set to private. |
- Log into the Microsoft Azure Management Console.
- Select the "Search resources, services, and docs" option at the top and search for Storage accounts.
- Select the "Storage account" by clicking on the "Name" as a link to access the configuration.
- On the "Storage accounts- test12diag647" page, select the "Containers" option.
- On the "Containers" page select the "Activity Log Container" and check the "Public Access" column. If it's not set to "Private" then the Activity Log Container have public read access.
- Repeat steps number 2 - 5 to verify "Activity Logs" for other Azure accounts.
- Navigate to the "Storage accounts", select the "Storage account" by clicking on the "Name", select the "Containers" option.
- Select the "Actvity Log Container" which needs to set to priavte. Click on the "Change Access Level" option at the top.
- On the "Change Access Level" page, click on the dropdown menu under "Public access level" and select the "Priavet (no anonymous access)" option and click on the "OK" button the make the changes.
- Repeat steps number 2 - 9 to ensure the access level for the storage account containing Activity Log data is set to private.