Observe Azure Resource Activity

In this guide you will learn how Guardrails detects and reacts to events in your Azure subscription. You will manually create and modify an Azure storage account and explore how to view that activity in the Guardrails console.

This is the third guide in the Getting started with Azure series.

Prerequisites

  • Completion of the previous guides in this series.
  • Access to the Guardrails console with administrative privileges.
  • Console access to an Azure subscription and the ability to create and modify storage accounts.
Note

We will use storage account names like guardrailsazurestorage1 in this guide

Step 1: Create an Azure storage account

Navigate to Home > Storage accounts, select Create, assign a name, and select Review + create.

On the next screen, select Create.

Step 2: Resource Activities report

Select Reports from the top navigation bar. Search for the word "resource" and select Resource Activities.

Step 3: Filter by type

From the filter bar, expand the Resource Type dropdown.

Set the filter to Azure > Storage > Storage Account. You can do this by typing azure storage account into the search box, as shown here. When you see Azure > Storage > Storage Account appear in the list, select the checkbox next to it.

Step 4: Observe activity

You can scope the resource activity report to a specific storage account by searching for the name of your storage account. To do this, type its name into the search field. Guardrails will show all notifications related to the storage account. In the screen below, the RESOURCE CREATED activity represents Guardrails discovery of the storage account and RESOURCE UPDATED indicates that Guardrails has updated the CMDB entry with additional details about it.

Step 5: Downgrade to TLS 1.0

Azure storage accounts default to TLS 1.2. Select the link Version 1.2 to open the configuration screen.

Choose TLS 1.0 and select Save.

Step 6: Observe events

Switch back to the Guardrails console browser tab. Guardrails’ event processing system will detect the change once Azure emits the events and they are processed. A new RESOURCE UPDATED notification will then appear in the Activities list. Select the new notification from the list.

Step 7: Audit resource change

On the notifications detail page, you can see metadata about the change and even audit the changes in configuration between the previous known state and the observed change. Scroll down in the DIFF section to observe the changes that Guardrails has recorded.

Step 8: Review

In this guide you changed the TLS property of an Azure storage account and observed how Guardrails recorded the change.

Next Steps

Next we’ll explore how to enable a policy pack that requires storage account to use TLS 1.2.

Progress tracker

  • Prepare an Azure Subscription for Import to Guardrails
  • Connect an Azure Subscription to Guardrails
  • Observe Azure Resource Activity
  • Enable Your First Guardrails Policy Pack
  • Review Subscription-Wide Governance
  • Create a Static Exception to a Guardrails Azure Policy
  • Create a Calculated Exception to a Guardrails Azure Policy
  • Send an Alert to Email
  • Apply a Quick Action
  • Enable Automatic Enforcement