Ensure that a Microsoft Azure activity log alert is fired whenever a "Delete Key Vault" event is triggered inside your Azure cloud account. An activity log alert fires each time the action event that matches the condition specified in the alert configuration is triggered. The alert condition that this conformity rule checks for is "Whenever the Activity Log has an event with Category='Administrative', Signal name='Delete Key Vault (vaults)'".
This rule resolution is part of the Cloud Conformity Security & Compliance tool for Azure
Using Microsoft Azure Monitor service to detect "Delete Key Vault" events will help you reduce the time required to mitigate any accidental or intentional deletion of Key Vaults available within your Azure cloud account and improve the Key Vault resources security and management.
To determine if there is an activity log alert created for "Delete Key Vault" events in your Microsoft Azure cloud account, perform the following actions:
Remediation / Resolution
To implement a Microsoft Azure activity log alert for "Delete Key Vault (Microsoft.KeyVault/vaults)" events, perform the following actions:
- Azure Official Documentation
- Create, view, and manage activity log alerts by using Azure Monitor
- Create, view, and manage log alerts using Azure Monitor
- Action rules (preview)
Unlock the Remediation Steps
Free 30-day Trial
Automatically audit your configurations with Conformity
and gain access to our cloud security platform.
You are auditing:
Create Alert for "Delete Key Vault" Events
Risk level: High