More Info:

Monitoring for ‘Delete Network Security Group’ events gives insight into network access changes and may reduce the time it takes to detect suspicious activity.

Risk Level

Low

Address

Security, Operational Maturity

Compliance Standards

CISAZURE, CBP, SOC2, ISO27001, HIPAA, HITRUST, NISTCSF

Triage and Remediation

Remediation

Sure, here are the step-by-step instructions to remediate the misconfiguration “Ensure Activity Log Alert exists for Delete Network Security Group” for Azure using the Azure console:

  1. Log in to the Azure portal (https://portal.azure.com/).
  2. Click on “Monitor” from the left-hand menu.
  3. Click on “Activity log” from the “Monitor” menu.
  4. Click on the “Alerts” tab.
  5. Click on the “New alert rule” button.
  6. In the “Create rule” page, select the “Resource Manager” option.
  7. In the “Condition” section, select “Delete Network Security Group” from the “Event name” drop-down menu.
  8. In the “Actions” section, select “Create action group” and click on the “OK” button.
  9. In the “Create action group” page, provide a name for the action group, select the “Email/SMS/Push/Voice” option, and enter the email address or phone number to receive the alert.
  10. Click on the “OK” button to create the action group.
  11. In the “Create rule” page, provide a name for the alert rule, select the action group you just created, and click on the “Create alert rule” button.

You have now successfully remediated the misconfiguration “Ensure Activity Log Alert exists for Delete Network Security Group” for Azure using the Azure console. Now, whenever a network security group is deleted, an alert will be sent to the specified email address or phone number.

Additional Reading: