-
Notifications
You must be signed in to change notification settings - Fork 146
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add Centralized Log Analytics Workspace and add Security Center #438
Conversation
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
validating a deployment, but in the meantime some nits w/r/t style and conventions
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Deployed and configured successfully. 👍
If there are any steps not documented to clean-up after a deployment that provisions Security Center let's document that somewhere.
Had left over tagging changes used for testing conflicting with most up to date main.
…e#438) - Add solutions (consolidated solutions removing separate sentinel module) - Security - Security Insights (Sentinel which is optional) - Activity log - VM Insights - Container Insights - Key Vault Insights - ServiceMap (dependency agent for network monitoring) - Add option to lock LAWS - Add diagnostic settings for LAWS to LAWS and operations Storage Account - Add policy assignments for DINE agents on VMs - Add extensions to VMs manually for initial deployment of jumpboxes - Add remediation for DINE agent policies - (Optional parameter to enable) - Required a role assignment for managed identity to contributor of RG - Add role assignments for IL5/CMMC/NIST policies - Add option to enable ASC - pricing &Azure#39;standard&Azure#39; (defender) - Enable auto provision - redirect to ops LAWS - Option add Email contact to ASC - Enable notifications - Enable recommendations - Add azure private link for Azure Monitor for VM agents to communicate - Scopes for Azure Monitor - DNS entries for monitor - NSG entries for monitor Co-authored-by: github-actions <[email protected]>
Description
For the purposes of understand security and compliance posture of a landing zone the following changes will the use of Azure Security Center, Policy, and VM monitoring to gain insights and control.
Start of a Centralized LAWS
Issue reference
The issue this PR will close: #413
Checklist
Please make sure you've completed the relevant tasks for this PR out of the following list: