Skip to main content
Version: 2.1.1-preview

CISA.MS.AAD.4.1 - Security logs SHALL be sent to the agency's security operations center for monitoring.

Overviewโ€‹

Security logs SHALL be sent to the agency's security operations center for monitoring.

Rationale: The security risk of not having visibility into cyber attacks is reduced by collecting logs in the agencyโ€™s centralized security detection infrastructure. This makes security events available for auditing, query, and incident response.

Note: The following logs (configured in Entra diagnostic settings), are required: AuditLogs, SignInLogs, RiskyUsers, UserRiskEvents, NonInteractiveUserSignInLogs, ServicePrincipalSignInLogs, ADFSSignInLogs, RiskyServicePrincipals, ServicePrincipalRiskEvents, EnrichedOffice365AuditLogs, MicrosoftGraphActivityLogs. If managed identities are used for Azure resources, also send the ManagedIdentitySignInLogs log type. If the Entra ID Provisioning Service is used to provision users to software-as-a-service (SaaS) apps or other systems, also send the ProvisioningLogs log type.

Note: Agencies can benefit from security detection capabilities offered by the CISA Cloud Log Aggregation Warehouse (CLAW) system. Agencies are urged to send the logs to CLAW. Contact CISA at [email protected] to request integration instructions.

Remediation action:โ€‹

Follow the configuration instructions unique to the products and integration patterns at your organization to send the security logs to the security operations center for monitoring.

Test Metadataโ€‹

FieldValue
Test IDCISA.MS.AAD.4.1
SeverityHigh
SuiteCISA
CategoryEntra ID P1
PowerShell testTest-MtCisaDiagnosticSettings
TagsCISA, CISA.MS.AAD.4.1, Entra ID P1, MS.AAD, MS.AAD.4.1

Sourceโ€‹

  • Pester test: tests/cisa/entra/Test-MtCisaDiagnosticSettings.Tests.ps1
  • PowerShell source: powershell/public/cisa/entra/Test-MtCisaDiagnosticSettings.ps1