Skip to content

Compliance Matrix

Compliance AreaCoverageStatusNotes
Network Security90%✅ CompliantNSG deny-all, Firewall option
Data Protection85%✅ CompliantKey Vault deployed for secrets
Access Control85%✅ CompliantAzure AD-only, no public IPs
Monitoring & Audit85%✅ CompliantLog Analytics, Defender Free
Incident Response60%⚠️ PartialManual runbooks only
Overall83%✅ CompliantSuitable for SMB workloads
Control IDRequirementImplementationStatus
NS-1Network segmentationHub-spoke topology, VNet peering✅ Compliant
NS-2Cloud-native firewallAzure Firewall (optional)✅ Compliant
NS-3Network Security GroupsNSG on all subnets, deny-all default✅ Compliant
NS-4DDoS ProtectionBasic (free) only⚠️ Partial
NS-5Private endpoint for PaaSPrivate DNS Zone + Key Vault PE✅ Compliant
NS-6No public endpointsPolicy: no public IPs on VMs✅ Compliant
NS-7Traffic encryptionTLS 1.2+ enforced via policy✅ Compliant
Control IDRequirementImplementationStatus
DP-1Data classificationTags (Environment, Owner)⚠️ Partial
DP-2Encryption at restAzure default (PMK)✅ Compliant
DP-3Customer-managed keysKey Vault deployed for future CMK⚠️ Partial
DP-4Encryption in transitHTTPS-only policy✅ Compliant
DP-5Data backupAzure Backup with auto-enrollment✅ Compliant
DP-6Secure key managementAzure Key Vault (Standard, RBAC)✅ Compliant
Control IDRequirementImplementationStatus
IM-1Centralized identityAzure AD✅ Compliant
IM-2Managed identitiesRecommended pattern✅ Compliant
IM-3Azure AD-only authSQL policy enforced✅ Compliant
PA-1Privileged access protectionAzure Bastion, no public IPs✅ Compliant
PA-2Just-in-time accessNot implemented❌ Gap
PA-3Emergency accessNot implemented⚠️ Partial
Control IDRequirementImplementationStatus
LT-1Centralized loggingLog Analytics workspace✅ Compliant
LT-2Log retention30 days (configurable)✅ Compliant
LT-3Security event collectionDefender for Cloud (Free)⚠️ Partial
LT-4Alert on security eventsNot pre-configured❌ Gap
AM-1Asset inventoryAzure Resource Graph✅ Compliant
AM-2Tag managementRequired tags policy (Deny)✅ Compliant
Control IDRequirementImplementationStatus
IR-1Incident response planOperations Runbook✅ Compliant
IR-2Incident detectionDefender for Cloud alerts⚠️ Partial
IR-3Incident containmentManual (NSG modification)⚠️ Partial
IR-4Post-incident reviewNot implemented❌ Gap
GapControlRiskRemediationTimeline
G-1DP-3 (CMK)MediumAdd Key Vault + CMK for storageFuture
G-2PA-2 (JIT)MediumEnable Defender JIT accessFuture
G-3LT-4 (Alerts)LowConfigure alert rulesCustomer responsibility
G-4NS-4 (DDoS)LowUpgrade to DDoS Protection StandardCustomer decision
G-5IR-4 (Review)LowEstablish post-incident processCustomer responsibility

The Azure Policies provide automated compliance enforcement:

CategoryDenyAuditTotal
Compute246
Network145
Storage325
Identity044
Key Vault077
Tagging202
Monitoring011
Backup022
Governance101
Sub-scope101
Total102434

See the full Policy Catalog for details on each policy.