1. Docs
  2. Reference
  3. Pre-built Policy Packs
  4. HITRUST
  5. Azure

HITRUST CSF 11.5 - Azure

    This page lists all 87 policies in the HITRUST CSF 11.5 pack for Azure.

    Policy NameDescriptionFramework ReferenceFramework Specification
    sql-server-azure-ad-authenticationRequire Azure SQL Server to have Azure AD administrators configured01.a Access Control PolicyAll users shall have a unique identifier for their personal and sole use so that users can be linked to and made responsible for their actions.
    web-app-auth-settingsRequire WebApp to have proper authentication settings configured01.a Access Control PolicyAll users shall have a unique identifier for their personal and sole use so that users can be linked to and made responsible for their actions.
    aks-azure-ad-integrationRequire AKS clusters to use Azure AD integration01.a Access Control PolicyAll users shall have a unique identifier for their personal and sole use so that users can be linked to and made responsible for their actions.
    key-vault-access-policiesRequire proper access controls for Key Vault access policies01.a Access Control PolicyAll users shall have a unique identifier for their personal and sole use so that users can be linked to and made responsible for their actions.
    custom-role-definition-least-privilegeEnsure custom role definitions follow least privilege principles01.a Access Control PolicyAll users shall have a unique identifier for their personal and sole use so that users can be linked to and made responsible for their actions.
    sql-database-least-privilegeEnsure SQL databases use appropriate SQL-specific roles instead of broad management roles01.a Access Control PolicyAll users shall have a unique identifier for their personal and sole use so that users can be linked to and made responsible for their actions.
    keyvault-rbac-least-privilegeEnsure Key Vaults using RBAC use appropriate Key Vault-specific roles instead of broad management roles01.a Access Control PolicyAll users shall have a unique identifier for their personal and sole use so that users can be linked to and made responsible for their actions.
    rbac-least-privilegeEnforce least privilege access control by prohibiting overly broad RBAC role assignments01.c Privilege ManagementThe allocation and use of privileges shall be restricted and controlled. The use of privileged utility programs shall be restricted and tightly controlled.
    storage-account-least-privilegeEnsure storage accounts use appropriate storage-specific roles instead of broad management roles01.v Information Access RestrictionAccess to systems and applications shall be restricted in accordance with the access control policy.
    key-vault-purge-protectionRequire Key Vault to have purge protection enabled06.ad04.01 Data Retention and DisposalCovered information shall be protected against unauthorized disclosure, modification and destruction. For the purpose of this control, covered information includes protected health information, cardholder data, and other sensitive information.
    vm-requires-managed-disksRequire VMs to use managed disks only06.d Data Protection and Privacy of Covered InformationCovered information shall be protected against unauthorized disclosure, modification and destruction. For the purpose of this control, covered information includes protected health information, cardholder data, and other sensitive information.
    blob-service-lifecycleRequire BlobServiceProperties to have versioning, change feed, and retention policies enabled06.d Data Protection and Privacy of Covered InformationCovered information shall be protected against unauthorized disclosure, modification and destruction. For the purpose of this control, covered information includes protected health information, cardholder data, and other sensitive information.
    sql-database-tde-enabledRequire Azure SQL databases to have Transparent Data Encryption (TDE) enabled06.d Data Protection and Privacy of Covered InformationCovered information shall be protected against unauthorized disclosure, modification and destruction. For the purpose of this control, covered information includes protected health information, cardholder data, and other sensitive information.
    aks-secret-encryptionRequire AKS clusters to have secret encryption enabled06.d Data Protection and Privacy of Covered InformationCovered information shall be protected against unauthorized disclosure, modification and destruction. For the purpose of this control, covered information includes protected health information, cardholder data, and other sensitive information.
    event-hubs-retentionRequire Event Hubs to have proper retention policies configured06.d Data Protection and Privacy of Covered InformationCovered information shall be protected against unauthorized disclosure, modification and destruction. For the purpose of this control, covered information includes protected health information, cardholder data, and other sensitive information.
    key-vault-soft-deleteRequire Key Vault to have soft delete enabled with appropriate retention06.d Data Protection and Privacy of Covered InformationCovered information shall be protected against unauthorized disclosure, modification and destruction. For the purpose of this control, covered information includes protected health information, cardholder data, and other sensitive information.
    log-analytics-retentionRequire Log Analytics workspace to have appropriate retention policies06.d Data Protection and Privacy of Covered InformationCovered information shall be protected against unauthorized disclosure, modification and destruction. For the purpose of this control, covered information includes protected health information, cardholder data, and other sensitive information.
    prohibit-hardcoded-secretsProhibit hardcoded secrets in code and configuration06.d Data Protection and Privacy of Covered InformationCovered information shall be protected against unauthorized disclosure, modification and destruction. For the purpose of this control, covered information includes protected health information, cardholder data, and other sensitive information.
    storage-account-files-encryptionRequire Files to have encryption enabled06.d Data Protection and Privacy of Covered InformationCovered information shall be protected against unauthorized disclosure, modification and destruction. For the purpose of this control, covered information includes protected health information, cardholder data, and other sensitive information.
    resources-cost-management-tagsRequire all resources to have cost management tags07.a Inventory of AssetsAll assets shall be accounted for and have a nominated owner.
    api-management-tlsRequire API Management to have secure TLS/SSL configuration09.ac10.01 Cryptographic ControlsCryptographic controls shall be used in compliance with all relevant agreements, legislation and regulations, and risk assessments shall consider the organization’s business requirements.
    app-service-https-onlyRequire App Service to enforce HTTPS only connections09.ac10.01 Encryption In TransitCryptographic controls shall be used in compliance with all relevant agreements, legislation and regulations, and risk assessments shall consider the organization’s business requirements.
    application-gateway-tlsRequire Application Gateway to have secure TLS configuration09.ac10.01 Encryption In TransitCryptographic controls shall be used in compliance with all relevant agreements, legislation and regulations, and risk assessments shall consider the organization’s business requirements.
    resources-change-tracking-tagsRequire all Azure resources to have proper tagging for change tracking09.b Change ManagementChanges to systems, applications and supporting infrastructure shall be controlled.
    resources-environment-tagsRequire all resources to have environment tags09.d Separation of Development Test and Operational EnvironmentsDevelopment, testing and production environments shall be separated.
    vm-scale-set-no-public-ipRequire VM Scale Sets to have no public IP addresses09.m Network ControlsNetworks shall be managed and controlled in order to protect the organization from threats and to maintain security for the systems and applications using the network, including information in transit.
    storage-account-public-accessRequire Storage Accounts to disable public blob access09.m Network ControlsNetworks shall be managed and controlled in order to protect the organization from threats and to maintain security for the systems and applications using the network, including information in transit.
    storage-account-public-network-accessRequire Storage Accounts to disable public network access09.m Network ControlsNetworks shall be managed and controlled in order to protect the organization from threats and to maintain security for the systems and applications using the network, including information in transit.
    storage-account-firewallRequire Storage Accounts to have firewall rules configured09.m Network ControlsNetworks shall be managed and controlled in order to protect the organization from threats and to maintain security for the systems and applications using the network, including information in transit.
    sql-server-disable-public-accessRequire Azure SQL Server to disable public network access09.m Network ControlsNetworks shall be managed and controlled in order to protect the organization from threats and to maintain security for the systems and applications using the network, including information in transit.
    sql-server-private-endpointsRequire Azure SQL databases to use private endpoints with proper network isolation09.m Network ControlsNetworks shall be managed and controlled in order to protect the organization from threats and to maintain security for the systems and applications using the network, including information in transit.
    postgresql-private-endpointsRequire PostgreSQL databases to use private endpoints09.m Network ControlsNetworks shall be managed and controlled in order to protect the organization from threats and to maintain security for the systems and applications using the network, including information in transit.
    mysql-private-endpointsRequire MySQL databases to use private endpoints09.m Network ControlsNetworks shall be managed and controlled in order to protect the organization from threats and to maintain security for the systems and applications using the network, including information in transit.
    cosmos-db-private-endpointsRequire Cosmos DB account to have public network access disabled (indicating private endpoint usage)09.m Network ControlsNetworks shall be managed and controlled in order to protect the organization from threats and to maintain security for the systems and applications using the network, including information in transit.
    aks-private-clustersRequire AKS clusters to be private clusters09.m Network ControlsNetworks shall be managed and controlled in order to protect the organization from threats and to maintain security for the systems and applications using the network, including information in transit.
    aks-network-policiesRequire AKS clusters to have network policies enabled09.m Network ControlsNetworks shall be managed and controlled in order to protect the organization from threats and to maintain security for the systems and applications using the network, including information in transit.
    network-interface-no-public-ipRequire Network Interfaces to have no public IP address associations09.m Network ControlsNetworks shall be managed and controlled in order to protect the organization from threats and to maintain security for the systems and applications using the network, including information in transit.
    nsg-strict-rulesRequire strict Network Security Group rules with explicit allow/deny configuration09.m Network ControlsNetworks shall be managed and controlled in order to protect the organization from threats and to maintain security for the systems and applications using the network, including information in transit.
    nsg-http-restrictionRequire Network Security Groups to disallow inbound HTTP traffic09.m Network ControlsNetworks shall be managed and controlled in order to protect the organization from threats and to maintain security for the systems and applications using the network, including information in transit.
    application-gateway-wafRequire Application Gateway to have Web Application Firewall enabled09.m Network ControlsNetworks shall be managed and controlled in order to protect the organization from threats and to maintain security for the systems and applications using the network, including information in transit.
    vnet-ddos-protectionRequire Virtual Networks to have DDoS Protection Standard enabled09.m Network ControlsNetworks shall be managed and controlled in order to protect the organization from threats and to maintain security for the systems and applications using the network, including information in transit.
    key-vault-network-accessRequire Key Vault to have network access controls configured09.m Network ControlsNetworks shall be managed and controlled in order to protect the organization from threats and to maintain security for the systems and applications using the network, including information in transit.
    redis-cache-private-endpointsRequire Redis Cache to use private endpoints09.m Network ControlsNetworks shall be managed and controlled in order to protect the organization from threats and to maintain security for the systems and applications using the network, including information in transit.
    nsg-disallow-public-internet-ingressRequire Network Security Groups to disallow public internet ingress09.m Network ControlsNetworks shall be managed and controlled in order to protect the organization from threats and to maintain security for the systems and applications using the network, including information in transit.
    app-service-disable-ftpRequire App Service to block insecure FTP access09.m Network ControlsNetworks shall be managed and controlled in order to protect the organization from threats and to maintain security for the systems and applications using the network, including information in transit.
    sql-server-audit-loggingRequire Azure SQL Server to have audit logging enabled09.z Publicly Available InformationPublicly available information shall be protected against unauthorized modification or deletion.
    flow-log-configurationRequire proper Flow Log configuration for network monitoring09.z Publicly Available InformationPublicly available information shall be protected against unauthorized modification or deletion.
    managed-disk-customer-managed-keysRequire managed disks to use customer-managed encryption keys10.f Policy on the Use of Cryptographic ControlsCryptographic controls shall be used in compliance with all relevant agreements, legislation and regulations, and risk assessments shall consider the organization’s business requirements.
    vm-scale-set-require-managed-disksRequire VM Scale Sets to use managed disks only10.f Policy on the Use of Cryptographic ControlsCryptographic controls shall be used in compliance with all relevant agreements, legislation and regulations, and risk assessments shall consider the organization’s business requirements.
    storage-account-uses-customer-managed-keysRequire Storage Accounts to use customer-managed keys for encryption10.f Policy on the Use of Cryptographic ControlsCryptographic controls shall be used in compliance with all relevant agreements, legislation and regulations, and risk assessments shall consider the organization’s business requirements.
    storage-account-https-onlyRequire Storage Accounts to enforce HTTPS-only traffic10.f Policy on the Use of Cryptographic ControlsCryptographic controls shall be used in compliance with all relevant agreements, legislation and regulations, and risk assessments shall consider the organization’s business requirements.
    sql-database-customer-managed-keysRequire Azure SQL databases to use customer-managed keys for transparent data encryption10.f Policy on the Use of Cryptographic ControlsCryptographic controls shall be used in compliance with all relevant agreements, legislation and regulations, and risk assessments shall consider the organization’s business requirements.
    sql-server-encrypted-connectionsRequire Azure SQL Server to have encrypted connections with minimum TLS 1.210.f Policy on the Use of Cryptographic ControlsCryptographic controls shall be used in compliance with all relevant agreements, legislation and regulations, and risk assessments shall consider the organization’s business requirements.
    postgresql-customer-managed-keysRequire PostgreSQL flexible servers to use customer-managed keys10.f Policy on the Use of Cryptographic ControlsCryptographic controls shall be used in compliance with all relevant agreements, legislation and regulations, and risk assessments shall consider the organization’s business requirements.
    postgresql-ssl-enforcementRequire PostgreSQL databases to have SSL enforcement enabled10.f Policy on the Use of Cryptographic ControlsCryptographic controls shall be used in compliance with all relevant agreements, legislation and regulations, and risk assessments shall consider the organization’s business requirements.
    mysql-customer-managed-keysRequire MySQL flexible servers to use customer-managed keys10.f Policy on the Use of Cryptographic ControlsCryptographic controls shall be used in compliance with all relevant agreements, legislation and regulations, and risk assessments shall consider the organization’s business requirements.
    mysql-ssl-enforcementRequire MySQL databases to have SSL enforcement enabled10.f Policy on the Use of Cryptographic ControlsCryptographic controls shall be used in compliance with all relevant agreements, legislation and regulations, and risk assessments shall consider the organization’s business requirements.
    cosmos-db-customer-managed-keysRequire Cosmos DB to use customer-managed keys10.f Policy on the Use of Cryptographic ControlsCryptographic controls shall be used in compliance with all relevant agreements, legislation and regulations, and risk assessments shall consider the organization’s business requirements.
    container-registry-customer-managed-keysRequire Container Registry to use customer-managed keys10.f Policy on the Use of Cryptographic ControlsCryptographic controls shall be used in compliance with all relevant agreements, legislation and regulations, and risk assessments shall consider the organization’s business requirements.
    function-app-customer-managed-keysRequire Function Apps to use customer-managed keys10.f Policy on the Use of Cryptographic ControlsCryptographic controls shall be used in compliance with all relevant agreements, legislation and regulations, and risk assessments shall consider the organization’s business requirements.
    nsg-ssh-rdp-restrictionRequire Network Security Groups to restrict SSH and RDP access10.f Policy on the Use of Cryptographic ControlsCryptographic controls shall be used in compliance with all relevant agreements, legislation and regulations, and risk assessments shall consider the organization’s business requirements.
    service-bus-customer-managed-keysRequire Service Bus namespace to use customer-managed keys for encryption10.f Policy on the Use of Cryptographic ControlsCryptographic controls shall be used in compliance with all relevant agreements, legislation and regulations, and risk assessments shall consider the organization’s business requirements.
    event-hubs-customer-managed-keysRequire Event Hub namespace to use customer-managed keys for encryption10.f Policy on the Use of Cryptographic ControlsCryptographic controls shall be used in compliance with all relevant agreements, legislation and regulations, and risk assessments shall consider the organization’s business requirements.
    key-vault-key-rotationRequire Key Vault keys to have rotation policies configured10.f Policy on the Use of Cryptographic ControlsCryptographic controls shall be used in compliance with all relevant agreements, legislation and regulations, and risk assessments shall consider the organization’s business requirements.
    key-vault-key-configurationRequire proper Key Vault key creation and configuration10.f Policy on the Use of Cryptographic ControlsCryptographic controls shall be used in compliance with all relevant agreements, legislation and regulations, and risk assessments shall consider the organization’s business requirements.
    key-vault-key-lifecycleRequire proper Key Vault key deletion and lifecycle management10.f Policy on the Use of Cryptographic ControlsCryptographic controls shall be used in compliance with all relevant agreements, legislation and regulations, and risk assessments shall consider the organization’s business requirements.
    key-vault-lifecycleRequire proper Key Vault deletion protection and lifecycle management10.f Policy on the Use of Cryptographic ControlsCryptographic controls shall be used in compliance with all relevant agreements, legislation and regulations, and risk assessments shall consider the organization’s business requirements.
    front-door-tlsRequire Front Door custom domains to use secure TLS configuration10.f Policy on the Use of Cryptographic ControlsCryptographic controls shall be used in compliance with all relevant agreements, legislation and regulations, and risk assessments shall consider the organization’s business requirements.
    redis-cache-non-ssl-portRequire Redis Cache to disable non-SSL port access10.f Policy on the Use of Cryptographic ControlsCryptographic controls shall be used in compliance with all relevant agreements, legislation and regulations, and risk assessments shall consider the organization’s business requirements.
    data-factory-customer-managed-keysRequire Data Factory to use customer-managed keys for encryption10.f Policy on the Use of Cryptographic ControlsCryptographic controls shall be used in compliance with all relevant agreements, legislation and regulations, and risk assessments shall consider the organization’s business requirements.
    synapse-workspace-customer-managed-keysRequire Synapse Analytics workspaces to use customer-managed keys for encryption10.f Policy on the Use of Cryptographic ControlsCryptographic controls shall be used in compliance with all relevant agreements, legislation and regulations, and risk assessments shall consider the organization’s business requirements.
    vm-approved-imagesRequire pre-approved hardened VM images from trusted publishers10.h Control of Operational SoftwareThe installation of software on operational systems shall be controlled.
    custom-image-validationValidate custom managed images meet governance and security requirements10.h Control of Operational SoftwareThe installation of software on operational systems shall be controlled.
    vm-scale-set-automatic-os-upgradesRequire VM Scale Sets to have automatic OS upgrades enabled10.k Change Control ProceduresChanges to systems within the development lifecycle shall be controlled by the use of formal change control procedures.
    aks-auto-upgradeRequire AKS clusters to have auto-upgrade enabled10.k Change Control ProceduresChanges to systems within the development lifecycle shall be controlled by the use of formal change control procedures.
    azure-firewall-threat-intelligenceRequire Azure Firewall to have threat intelligence enabled10.m Control of Technical VulnerabilitiesInformation about technical vulnerabilities of information systems being used shall be obtained in a timely fashion, the organization’s exposure to such vulnerabilities evaluated and appropriate measures taken to address the associated risk.
    vm-scale-set-multi-azRequire VM Scale Sets to span multiple availability zones12.a Including Information Security in the Business Continuity ManagementInformation security shall be a central part of the organization’s business continuity management. Business continuity management shall include information security processes to ensure the required level of information security during adverse situations.
    storage-account-geo-replicationRequire Storage Accounts to have geo-replication enabled for business continuity12.a Including Information Security in the Business Continuity ManagementInformation security shall be a central part of the organization’s business continuity management. Business continuity management shall include information security processes to ensure the required level of information security during adverse situations.
    sql-database-backup-retentionRequire Azure SQL Database to have backup retention configured with redundant storage12.a Including Information Security in the Business Continuity ManagementInformation security shall be a central part of the organization’s business continuity management. Business continuity management shall include information security processes to ensure the required level of information security during adverse situations.
    sql-database-high-availabilityRequire Azure SQL Database to have high availability configuration12.a Including Information Security in the Business Continuity ManagementInformation security shall be a central part of the organization’s business continuity management. Business continuity management shall include information security processes to ensure the required level of information security during adverse situations.
    cosmos-db-backup-policiesRequire Cosmos DB account to have backup policies configured12.a Including Information Security in the Business Continuity ManagementInformation security shall be a central part of the organization’s business continuity management. Business continuity management shall include information security processes to ensure the required level of information security during adverse situations.
    aks-node-pools-vm-scale-setsRequire AKS node pools to use VM Scale Sets12.a Including Information Security in the Business Continuity ManagementInformation security shall be a central part of the organization’s business continuity management. Business continuity management shall include information security processes to ensure the required level of information security during adverse situations.
    application-gateway-multi-azRequire Application Gateway to be configured across multiple availability zones12.a Including Information Security in the Business Continuity ManagementInformation security shall be a central part of the organization’s business continuity management. Business continuity management shall include information security processes to ensure the required level of information security during adverse situations.
    application-gateway-has-health-probesRequire Application Gateway to enable health probes12.a Including Information Security in the Business Continuity ManagementInformation security shall be a central part of the organization’s business continuity management. Business continuity management shall include information security processes to ensure the required level of information security during adverse situations.
    load-balancer-multi-azRequire Load Balancer to be configured across multiple availability zones12.a Including Information Security in the Business Continuity ManagementInformation security shall be a central part of the organization’s business continuity management. Business continuity management shall include information security processes to ensure the required level of information security during adverse situations.
    load-balancer-health-probesRequire Load Balancer to enable health probes12.a Including Information Security in the Business Continuity ManagementInformation security shall be a central part of the organization’s business continuity management. Business continuity management shall include information security processes to ensure the required level of information security during adverse situations.
    service-bus-dead-letter-queueValidate Service Bus queues have proper dead letter queue configuration12.a Including Information Security in the Business Continuity ManagementInformation security shall be a central part of the organization’s business continuity management. Business continuity management shall include information security processes to ensure the required level of information security during adverse situations.
      Neo just got smarter about infrastructure policy automation