More Info:

Monitoring for ‘Delete Security Policy’ events gives insight into changes to security policy and may reduce the time it takes to detect suspicious activity.

Risk Level

Low

Address

Security, Operational Maturity

Compliance Standards

Triage and Remediation

Remediation

To remediate the misconfiguration “Ensure Activity Log Alert exists for Delete Security Policy” in Azure using the Azure console, follow these steps:

  1. Log in to the Azure portal (https://portal.azure.com/).
  2. Click on “Resource groups” in the left-hand menu and select the resource group containing the affected security policy.
  3. Click on the security policy that needs to be remediated.
  4. In the left-hand menu, click on “Activity log”.
  5. Click on “Alerts” in the top menu bar.
  6. Click on the “New alert rule” button.
  7. In the “Basics” tab, give the alert rule a name and description.
  8. In the “Condition” tab, select the “Event count” signal type and set the threshold to greater than 0.
  9. Scroll down to the “Custom log search” section and click on “Edit”.
  10. In the query editor, paste the following query:
ResourceType=Microsoft.Network/networkSecurityGroups
OperationName=Microsoft.Network/networkSecurityGroups/delete
  1. Click on “Done” to save the query.
  2. In the “Actions” tab, select the action you want to take when the alert is triggered (e.g. send an email notification).
  3. Click on “Create alert rule” to save the alert.

Once the alert rule is created, you will receive a notification whenever the specified security policy is deleted, allowing you to take appropriate action to remediate the issue.

Additional Reading: