Loading source
Pulling the file list, source metadata, and syntax-aware rendering for this listing.
Source from repo
Audit Azure resources for compliance, security best practices, and Key Vault expiration monitoring
Files
Skill
Size
Entrypoint
Format
Open file
Syntax-highlighted preview of this file as included in the skill package.
references/azure-quick-review.md
1# Azure Quick Review Compliance Assessment23This skill enables comprehensive Azure compliance assessments using Azure Quick Review (azqr), analyzing findings against Azure best practices, and providing actionable remediation guidance.45## Prerequisites67- **Azure authentication** - Logged in via Azure CLI (`az login`) or using Service Principal/Managed Identity8- **Reader permissions** - Minimum Reader role on target subscription or management group910## Assessment Workflow1112### Step 1: Determine Scan Scope1314Ask the user or detect from context:1516| Scope | Use Case | Required Info |17|-------|----------|---------------|18| Subscription | Full subscription assessment | Subscription ID |19| Resource Group | Targeted assessment | Subscription ID + Resource Group name |20| Management Group | Enterprise-wide assessment | Management Group ID |21| Specific Service | Deep-dive on one resource type | Subscription ID + Service abbreviation |2223### Step 2: Run Compliance Scan2425Use the Azure MCP tool to run the scan:2627```28mcp_azure_mcp_extension_azqr29subscription: <subscription-id>30resource-group: <optional-rg-name>31```3233### Step 3: Analyze Scan Results3435The scan produces an Excel file with these sheets:3637| Sheet | Contents | Priority |38|-------|----------|----------|39| **Recommendations** | All recommendations with impacted resource count | High |40| **ImpactedResources** | Resources with specific issues to address | High |41| **Inventory** | All scanned resources with SKU, Tier, SLA details | Medium |42| **Advisor** | Azure Advisor recommendations | Medium |43| **DefenderRecommendations** | Microsoft Defender for Cloud findings | High |44| **Azure Policy** | Non-compliant resources per Azure Policy | Medium |45| **Costs** | 3-month cost history by subscription | Low |46| **Defender** | Defender plan status and tiers | Medium |47| **OutOfScope** | Resources not scanned | Low |4849**Focus analysis on:**501. High-severity recommendations from ImpactedResources512. Defender recommendations (security-critical)523. Advisor recommendations (reliability/performance)534. Policy non-compliance (governance)5455### Step 4: Categorize Findings5657Group findings by category for prioritized remediation:5859| Category | Examples | Severity |60|----------|----------|----------|61| **Security** | Public endpoints, missing encryption, no private endpoints | Critical |62| **Reliability** | No zone redundancy, single instance, no backup | High |63| **Performance** | Undersized SKUs, missing caching, no CDN | Medium |64| **Cost** | Orphaned resources, oversized SKUs, unused reservations | Medium |65| **Operations** | Missing diagnostics, no alerts, no tags | Low |6667### Step 5: Generate Remediation Guidance6869For each high-priority finding:701. Explain the risk in plain language712. Provide remediation options (Portal, CLI, Bicep)723. Estimate effort and impact7374See [azqr-remediation-patterns.md](azqr-remediation-patterns.md) for common fix templates.7576### Step 6: Present Summary7778Provide a structured summary:7980```markdown81## Compliance Assessment Summary8283**Scope:** [Subscription/RG/MG name]84**Scanned:** [Date/Time]85**Resources Analyzed:** [Count]8687### Key Findings8889| Severity | Count | Top Issues |90|----------|-------|------------|91| Critical | X | [List top 3] |92| High | X | [List top 3] |93| Medium | X | [List top 3] |9495### Recommended Actions96971. **[Issue]** - [Brief remediation]982. **[Issue]** - [Brief remediation]993. **[Issue]** - [Brief remediation]100101### Next Steps102- [ ] Address critical security findings103- [ ] Review and remediate high-severity items104- [ ] Schedule follow-up scan to verify fixes105```106107## Supported Azure Services108109azqr supports 70+ Azure resource types including:110111- Azure Kubernetes Service (AKS)112- API Management113- App Configuration114- App Service115- Container Apps116- Cosmos DB117- Container Registry118- Key Vault119- Load Balancer120- Azure Database for MySQL121- Azure Database for PostgreSQL122- Azure Cache for Redis123- Service Bus124- Azure SQL Database125- Storage Accounts126- Virtual Machines127- Virtual Networks128129## Tools Used130131| Tool | Purpose |132|------|---------|133| `mcp_azure_mcp_extension_azqr` | Run azqr scans via Azure MCP |134| `mcp_azure_mcp_subscription_list` | List available subscriptions |135| `mcp_azure_mcp_group_list` | List resource groups in subscription |136137## Troubleshooting138139| Issue | Symptom | Solution |140|-------|---------|----------|141| Permission denied | 403 errors during scan | Verify Reader role on scope |142| Not authenticated | `AADSTS` errors | Run `az login` first |143| Slow scan | Scan takes very long | Use resource group scope |144145## Example Prompts146147- "Check my Azure subscription for compliance issues"148- "Run azqr on my production resource group"149- "What Azure resources don't follow best practices?"150- "Assess my storage accounts for security issues"151152## Reference Documentation153154- [Recommendation Categories](azqr-recommendations.md)155- [Remediation Patterns](azqr-remediation-patterns.md)156- [Azure Quick Review Documentation](https://azure.github.io/azqr/docs/)157- [Azure Proactive Resiliency Library](https://aka.ms/aprl)158