Aqua CSPM

Monitor VM Vulnerability

Quick Info

Plugin TitleMonitor VM Vulnerability
CloudAZURE
CategorySecurity Center
DescriptionEnsures that Monitor Vulnerability Assessment is enabled in Security Center.
More InfoWhen this setting is enabled, Security Center will monitor virtual machines for detected vulnerabilities.
AZURE Linkhttps://docs.microsoft.com/en-us/azure/security-center/security-center-policy-definitions
Recommended ActionEnsure VM Vulnerability monitoring is configured for virtual machines from the Azure Security Center.

Detailed Remediation Steps

  1. Log into the Microsoft Azure Management Console.
  2. Select the “Search resources, services, and docs” option at the top and search for Security Center.
  3. Scroll down the “Security Center” and select the “Security policy” option under “Management” in the left navigation panel.
  4. On the “Policy Management” page under “Name” column select the “Subscription Name” that needs to be verified.
  5. In the “Security Policy” page scroll down and click on the “Azure Security Benchmark”.
  6. In the “Azure Security Benchmark” click on the Next button.
  7. In the “Azure Security Benchmark”, check for the “Vulnerabilities in security configuration on your virtual machine scale sets should be remediated” Parameter and if it’s set to “Disable” then the encryption is not enabled.
  8. Repeat steps number 2 - 7 to check other “Subscriptions” under the “Security Center."
  9. Navigate to the “Security Center”, select the “Security policy” and under “Policy Management” seelct the “Subscription” that needs to enable the “Vulnerability Assessment."
  10. Select the “Subscription” link under the “Security policy” at the top to get into the configuration settings.
  11. Scroll down the page and under “Parameter” choose the “Vulnerabilities in security configuration on your virtual machine scale sets should be remediated” and select the “AuditIfNotExists” option from the dropdown menu and click on the “Save” button at the bottom to make the necessary changes.
  12. Repeat steps number 9 - 11 to ensure “Vulnerability Assessment” is enabled in Security Center.