HIGH
Source
CloudSploit
ID
log-container-public-access

Log Container Public Access

Ensures that the Activity Log Container does not have public read access

The container used to store Activity Log data should not be exposed publicly to avoid data exposure of sensitive activity logs.

Follow the appropriate remediation steps below to resolve the issue.

  1. Log in to the Microsoft Azure Management Console.

  2. Select the “Search resources, services, and docs” option at the top and search for “Storage accounts”. Step

  3. Select the “Storage account” by clicking on its “Name” to get into its configuration page.Step

  4. On the “Storage accounts” page, select the “Containers” under “Data storage”. Step

  5. On the “Containers” page, select the “Activity Log Container” and check the “Public Access” column. If it’s not set to “Private” then the Activity Log Container has public read access.Step

  6. Select the “Actvity Log Container” which needs to be set to private. Click on the “Change access level” option at the top.

  7. On the “Change access level” page, click on the dropdown menu under “Public access level” and select the “Private (no anonymous access)” option.

  8. Click on the “OK” button to save the changes.

  9. Repeat steps number 2 - 8 to ensure the access level for the storage account containing Activity Log data is set to private.