Azure 存储的 Azure Policy 法规遵从性控制措施Azure Policy Regulatory Compliance controls for Azure Storage

Azure Policy 中的法规符合性为与不同符合性标准相关的“符合域”和“安全控制措施”提供 Azure 创建和管理的计划定义,称为“内置” 。Regulatory Compliance in Azure Policy provides Azure created and managed initiative definitions, known as built-ins, for the compliance domains and security controls related to different compliance standards. 此页列出 Azure 存储的“符合域”和“安全控制措施”。This page lists the compliance domains and security controls for Azure Storage. 可以分别为“安全控件”分配内置项,以帮助 Azure 资源符合特定的标准。You can assign the built-ins for a security control individually to help make your Azure resources compliant with the specific standard.

每个内置策略定义链接(指向 Azure 门户中的策略定义)的标题。The title of each built-in policy definition links to the policy definition in the Azure portal. 使用“策略版本”列中的链接查看 Azure Policy GitHub 存储库上的源。Use the link in the Policy Version column to view the source on the Azure Policy GitHub repo.

重要

下面的每个控件都与一个或多个 Azure Policy 定义关联。Each control below is associated with one or more Azure Policy definitions. 这些策略有助于评估控制的合规性;但是,控制与一个或多个策略之间通常不是一对一或完全匹配。These policies may help you assess compliance with the control; however, there often is not a one-to-one or complete match between a control and one or more policies. 因此,Azure Policy 中的符合性仅引用策略本身;这不确保你完全符合控件的所有要求。As such, Compliant in Azure Policy refers only to the policies themselves; this doesn't ensure you're fully compliant with all requirements of a control. 此外,符合性标准包含目前未由任何 Azure Policy 定义处理的控件。In addition, the compliance standard includes controls that aren't addressed by any Azure Policy definitions at this time. 因此,Azure Policy 中的符合性只是整体符合性状态的部分视图。Therefore, compliance in Azure Policy is only a partial view of your overall compliance status. 这些符合性标准的控制措施和 Azure Policy 法规符合性定义之间的关联可能会随着时间的推移而发生变化。The associations between controls and Azure Policy Regulatory Compliance definitions for these compliance standards may change over time.

Azure 安全基准Azure Security Benchmark

Azure 安全基准提供有关如何在 Azure 上保护云解决方案的建议。The Azure Security Benchmark provides recommendations on how you can secure your cloud solutions on Azure. 若要查看此服务如何完全映射到 Azure 安全基准,请参阅 Azure 安全基准映射文件To see how this service completely maps to the Azure Security Benchmark, see the Azure Security Benchmark mapping files.

Domain 控制 IDControl ID 控制标题Control title 策略Policy
(Azure 门户)(Azure portal)
策略版本Policy version
(GitHub)(GitHub)
网络安全Network Security 1.11.1 在虚拟网络上使用网络安全组或 Azure 防火墙来保护资源Protect resources using Network Security Groups or Azure Firewall on your Virtual Network 应限制对存储帐户的网络访问Storage accounts should restrict network access 1.1.01.1.0
网络安全Network Security 1.11.1 在虚拟网络上使用网络安全组或 Azure 防火墙来保护资源Protect resources using Network Security Groups or Azure Firewall on your Virtual Network 存储帐户应使用虚拟网络服务终结点Storage Accounts should use a virtual network service endpoint 1.0.01.0.0
数据保护Data Protection 4.44.4 加密传输中的所有敏感信息Encrypt all sensitive information in transit 应启用安全传输到存储帐户Secure transfer to storage accounts should be enabled 2.0.02.0.0
清单和资产管理Inventory and Asset Management 6.96.9 只使用已批准的 Azure 服务Use only approved Azure services 存储帐户应迁移到新的 Azure 资源管理器资源Storage accounts should be migrated to new Azure Resource Manager resources 1.0.01.0.0

CIS Azure 基础基准检验CIS Azure Foundations Benchmark

Domain 控制 IDControl ID 控制标题Control title 策略Policy
(Azure 门户)(Azure portal)
策略版本Policy version
(GitHub)(GitHub)
存储帐户Storage Accounts 3.13.1 确保“需要安全传输”设置为“已启用”Ensure that 'Secure transfer required' is set to 'Enabled' 应启用安全传输到存储帐户Secure transfer to storage accounts should be enabled 2.0.02.0.0
存储帐户Storage Accounts 3.73.7 确保将针对存储帐户的默认网络访问规则设置为“拒绝”Ensure default network access rule for Storage Accounts is set to deny 应限制对存储帐户的网络访问Storage accounts should restrict network access 1.1.01.1.0
存储帐户Storage Accounts 3.83.8 确保启用“受信任的 Microsoft 服务”来访问存储帐户Ensure 'Trusted Microsoft Services' is enabled for Storage Account access 存储帐户应允许从受信任的 Microsoft 服务进行访问Storage accounts should allow access from trusted Microsoft services 1.0.01.0.0
日志记录和监视Logging and Monitoring 5.1.65.1.6 确保使用 BYOK(使用自己的密钥)对存储帐户(包含的容器具有活动日志)加密Ensure the storage account containing the container with activity logs is encrypted with BYOK (Use Your Own Key) 必须使用 BYOK 对包含具有活动日志的容器的存储帐户进行加密Storage account containing the container with activity logs must be encrypted with BYOK 1.0.01.0.0

HIPAA HITRUST 9.2HIPAA HITRUST 9.2

Domain 控制 IDControl ID 控制标题Control title 策略Policy
(Azure 门户)(Azure portal)
策略版本Policy version
(GitHub)(GitHub)
网络隔离Segregation in Networks 0805.01m1Organizational.12 - 01.m0805.01m1Organizational.12 - 01.m 组织的安全网关(例如防火墙)强制执行安全策略,并配置为筛选域之间的流量、阻止未经授权的访问。它用于维护内部有线、内部无线和外部网络段(如 Internet,包括 DMZ)之间的隔离,并对每个域强制执行访问控制策略。The organization's security gateways (e.g. firewalls) enforce security policies and are configured to filter traffic between domains, block unauthorized access, and are used to maintain segregation between internal wired, internal wireless, and external network segments (e.g., the Internet) including DMZs and enforce access control policies for each of the domains. 存储帐户应使用虚拟网络服务终结点Storage Accounts should use a virtual network service endpoint 1.0.01.0.0
网络隔离Segregation in Networks 0806.01m2Organizational.12356 - 01.m0806.01m2Organizational.12356 - 01.m 组织网络根据组织要求使用定义的安全外围和一组分级的控制以逻辑方式和物理方式进行分段,包括在逻辑上与内部网络分离的可公开访问的系统组件子网;流量控制基于所需的功能,而数据/系统的分类控制则基于风险评估及其各自的安全要求。The organizations network is logically and physically segmented with a defined security perimeter and a graduated set of controls, including subnetworks for publicly accessible system components that are logically separated from the internal network, based on organizational requirements; and traffic is controlled based on functionality required and classification of the data/systems based on a risk assessment and their respective security requirements. 存储帐户应使用虚拟网络服务终结点Storage Accounts should use a virtual network service endpoint 1.0.01.0.0
网络隔离Segregation in Networks 0894.01m2Organizational.7 - 01.m0894.01m2Organizational.7 - 01.m 将物理服务器、应用程序或数据迁移到虚拟化服务器时,网络会与生产级网络分离。Networks are segregated from production-level networks when migrating physical servers, applications or data to virtualized servers. 存储帐户应使用虚拟网络服务终结点Storage Accounts should use a virtual network service endpoint 1.0.01.0.0
网络连接控制Network Connection Control 0809.01n2Organizational.1234 - 01.n0809.01n2Organizational.1234 - 01.n 通过每个网络访问点或外部电信服务托管接口的防火墙和其他网络相关限制,根据组织的访问控制策略来控制网络流量。Network traffic is controlled in accordance with the organizations access control policy through firewall and other network-related restrictions for each network access point or external telecommunication service's managed interface. 应启用安全传输到存储帐户Secure transfer to storage accounts should be enabled 2.0.02.0.0
网络连接控制Network Connection Control 0810.01n2Organizational.5 - 01.n0810.01n2Organizational.5 - 01.n 传输的信息是安全的,并且至少在开放的公用网络上已加密。Transmitted information is secured and, at a minimum, encrypted over open, public networks. 应启用安全传输到存储帐户Secure transfer to storage accounts should be enabled 2.0.02.0.0
网络连接控制Network Connection Control 0811.01n2Organizational.6 - 01.n0811.01n2Organizational.6 - 01.n 记录流量流策略的例外情况(包括支持性任务/业务需求、例外情况持续时间),并至少每年审查一次;当明确的任务/业务需求不再支持流量流策略例外情况时,该项例外会被删除。Exceptions to the traffic flow policy are documented with a supporting mission/business need, duration of the exception, and reviewed at least annually; traffic flow policy exceptions are removed when no longer supported by an explicit mission/business need. 应启用安全传输到存储帐户Secure transfer to storage accounts should be enabled 2.0.02.0.0
网络连接控制Network Connection Control 0812.01n2Organizational.8 - 01.n0812.01n2Organizational.8 - 01.n 不允许建立非远程连接的远程设备与外部(远程)资源进行通信。Remote devices establishing a non-remote connection are not allowed to communicate with external (remote) resources. 应启用安全传输到存储帐户Secure transfer to storage accounts should be enabled 2.0.02.0.0
网络连接控制Network Connection Control 0814.01n1Organizational.12 - 01.n0814.01n1Organizational.12 - 01.n 根据访问控制策略以及临床和商业应用程序的要求,使用托管接口上的“默认拒绝,出现例外情况时允许”策略来限制用户连接到内部网络的能力。The ability of users to connect to the internal network is restricted using a deny-by-default and allow-by-exception policy at managed interfaces according to the access control policy and the requirements of clinical and business applications. 应启用安全传输到存储帐户Secure transfer to storage accounts should be enabled 2.0.02.0.0
识别与外部各方相关的风险Identification of Risks Related to External Parties 1401.05i1Organizational.1239 - 05.i1401.05i1Organizational.1239 - 05.i 在进行了尽职调查、实施了适当的控制措施,并且签署了反映安全要求的合同/协议(确认外部各方理解并接受其义务)之前,不允许外部各方访问组织信息和系统。Access to the organizations information and systems by external parties is not permitted until due diligence has been conducted, the appropriate controls have been implemented, and a contract/agreement reflecting the security requirements is signed acknowledging they understand and accept their obligations. 应启用安全传输到存储帐户Secure transfer to storage accounts should be enabled 2.0.02.0.0
网络控制Network Controls 0866.09m3Organizational.1516 - 09.m0866.09m3Organizational.1516 - 09.m 组织描述网络组件逻辑管理的组、角色和职责,并确保网络基础结构元素的协调和一致性。The organization describes the groups, roles, and responsibilities for the logical management of network components and ensures coordination of and consistency in the elements of the network infrastructure. 应限制对存储帐户的网络访问Storage accounts should restrict network access 1.1.01.1.0
网络控制Network Controls 0867.09m3Organizational.17 - 09.m0867.09m3Organizational.17 - 09.m 无线访问点位于安全区域中,并在未使用时(例如晚上、周末)处于关闭状态。Wireless access points are placed in secure areas and shut down when not in use (e.g. nights, weekends). 存储帐户应使用虚拟网络服务终结点Storage Accounts should use a virtual network service endpoint 1.0.01.0.0
在线事务On-line Transactions 0943.09y1Organizational.1 - 09.y0943.09y1Organizational.1 - 09.y 检查电子商务和联机事务中涉及的数据,以确定其是否包含涵盖的信息。Data involved in electronic commerce and online transactions is checked to determine if it contains covered information. 应启用安全传输到存储帐户Secure transfer to storage accounts should be enabled 2.0.02.0.0

NIST SP 800-171 R2NIST SP 800-171 R2

Domain 控制 IDControl ID 控制标题Control title 策略Policy
(Azure 门户)(Azure portal)
策略版本Policy version
(GitHub)(GitHub)
访问控制Access Control 3.1.13.1.1 限制对授权用户、代表授权用户执行的进程以及设备(包括其他系统)的系统访问。Limit system access to authorized users, processes acting on behalf of authorized users, and devices (including other systems). 应限制对存储帐户的网络访问Storage accounts should restrict network access 1.1.01.1.0
访问控制Access Control 3.1.123.1.12 监视和控制远程访问会话。Monitor and control remote access sessions. 应限制对存储帐户的网络访问Storage accounts should restrict network access 1.1.01.1.0
系统和通信保护System and Communications Protection 3.13.13.13.1 监视、控制和保护组织系统的外部边界和关键内部边界的通信(即组织系统传输或接收的信息)。Monitor, control, and protect communications (i.e., information transmitted or received by organizational systems) at the external boundaries and key internal boundaries of organizational systems. 应启用安全传输到存储帐户Secure transfer to storage accounts should be enabled 2.0.02.0.0
系统和通信保护System and Communications Protection 3.13.13.13.1 监视、控制和保护组织系统的外部边界和关键内部边界的通信(即组织系统传输或接收的信息)。Monitor, control, and protect communications (i.e., information transmitted or received by organizational systems) at the external boundaries and key internal boundaries of organizational systems. 应限制对存储帐户的网络访问Storage accounts should restrict network access 1.1.01.1.0
系统和通信保护System and Communications Protection 3.13.53.13.5 为物理上或逻辑上与内部网络分离的可公开访问的系统组件实现子网。Implement subnetworks for publicly accessible system components that are physically or logically separated from internal networks. 应限制对存储帐户的网络访问Storage accounts should restrict network access 1.1.01.1.0
系统和通信保护System and Communications Protection 3.13.83.13.8 除非另有其他物理安全措施进行保护,否则实现加密机制以防止在传输过程中未经授权泄露 CUI。Implement cryptographic mechanisms to prevent unauthorized disclosure of CUI during transmission unless otherwise protected by alternative physical safeguards. 应启用安全传输到存储帐户Secure transfer to storage accounts should be enabled 2.0.02.0.0

NIST SP 800-53 R4NIST SP 800-53 R4

Domain 控制 IDControl ID 控制标题Control title 策略Policy
(Azure 门户)(Azure portal)
策略版本Policy version
(GitHub)(GitHub)
访问控制Access Control AC-17 (1)AC-17 (1) 远程访问 | 自动监视/控制Remote Access | Automated Monitoring / Control 应限制对存储帐户的网络访问Storage accounts should restrict network access 1.1.01.1.0
系统和通信保护System and Communications Protection SC-7SC-7 边界保护Boundary Protection 应限制对存储帐户的网络访问Storage accounts should restrict network access 1.1.01.1.0
系统和通信保护System and Communications Protection SC-8 (1)SC-8 (1) 传输保密性和完整性 | 加密或备用物理保护Transmission Confidentiality and Integrity | Cryptographic or Alternate Physical Protection 应启用安全传输到存储帐户Secure transfer to storage accounts should be enabled 2.0.02.0.0

后续步骤Next steps