Skip to content

Commit 7c9a2a8

Browse files
robgaAzure Policy Bot
and
Azure Policy Bot
authoredFeb 28, 2025
Built-in Policy Release 964b8894 (#1429)
Co-authored-by: Azure Policy Bot <[email protected]>
1 parent a8512e1 commit 7c9a2a8

10 files changed

+117
-100
lines changed
 

‎built-in-policies/policyDefinitions/App Service/App_Slot_VNetIntegrationEnabled_Audit.json

+13-4
Original file line numberDiff line numberDiff line change
@@ -5,10 +5,10 @@
55
"mode": "Indexed",
66
"description": "Injecting App Service Apps in a virtual network unlocks advanced App Service networking and security features and provides you with greater control over your network security configuration. Learn more at: https://docs.microsoft.com/azure/app-service/web-sites-integrate-with-vnet.",
77
"metadata": {
8-
"version": "1.0.0",
8+
"version": "1.1.0",
99
"category": "App Service"
1010
},
11-
"version": "1.0.0",
11+
"version": "1.1.0",
1212
"parameters": {
1313
"effect": {
1414
"type": "string",
@@ -32,8 +32,16 @@
3232
"equals": "Microsoft.Web/sites/slots"
3333
},
3434
{
35-
"field": "Microsoft.Web/sites/slots/virtualNetworkSubnetId",
36-
"equals": ""
35+
"anyOf": [
36+
{
37+
"field": "Microsoft.Web/sites/slots/virtualNetworkSubnetId",
38+
"exists": "false"
39+
},
40+
{
41+
"field": "Microsoft.Web/sites/slots/virtualNetworkSubnetId",
42+
"equals": ""
43+
}
44+
]
3745
}
3846
]
3947
},
@@ -42,6 +50,7 @@
4250
}
4351
},
4452
"versions": [
53+
"1.1.0",
4554
"1.0.0"
4655
]
4756
},

‎built-in-policies/policyDefinitions/App Service/App_VNetIntegrationEnabled_Audit.json

+13-4
Original file line numberDiff line numberDiff line change
@@ -5,10 +5,10 @@
55
"mode": "Indexed",
66
"description": "Injecting App Service Apps in a virtual network unlocks advanced App Service networking and security features and provides you with greater control over your network security configuration. Learn more at: https://docs.microsoft.com/azure/app-service/web-sites-integrate-with-vnet.",
77
"metadata": {
8-
"version": "3.0.0",
8+
"version": "3.1.0",
99
"category": "App Service"
1010
},
11-
"version": "3.0.0",
11+
"version": "3.1.0",
1212
"parameters": {
1313
"effect": {
1414
"type": "string",
@@ -32,8 +32,16 @@
3232
"equals": "Microsoft.Web/sites"
3333
},
3434
{
35-
"field": "Microsoft.Web/sites/virtualNetworkSubnetId",
36-
"equals": ""
35+
"anyOf": [
36+
{
37+
"field": "Microsoft.Web/sites/virtualNetworkSubnetId",
38+
"exists": "false"
39+
},
40+
{
41+
"field": "Microsoft.Web/sites/virtualNetworkSubnetId",
42+
"equals": ""
43+
}
44+
]
3745
}
3846
]
3947
},
@@ -42,6 +50,7 @@
4250
}
4351
},
4452
"versions": [
53+
"3.1.0",
4554
"3.0.0"
4655
]
4756
},

‎built-in-policies/policyDefinitions/Azure Government/Security Center/ASC_EnableRBAC_KubernetesService_Audit.json

+9-12
Original file line numberDiff line numberDiff line change
@@ -5,10 +5,10 @@
55
"mode": "All",
66
"description": "To provide granular filtering on the actions that users can perform, use Role-Based Access Control (RBAC) to manage permissions in Kubernetes Service Clusters and configure relevant authorization policies.",
77
"metadata": {
8-
"version": "1.0.4",
8+
"version": "1.1.0",
99
"category": "Security Center"
1010
},
11-
"version": "1.0.4",
11+
"version": "1.1.0",
1212
"parameters": {
1313
"effect": {
1414
"type": "string",
@@ -31,16 +31,12 @@
3131
"equals": "Microsoft.ContainerService/managedClusters"
3232
},
3333
{
34-
"anyOf": [
35-
{
36-
"field": "Microsoft.ContainerService/managedClusters/enableRBAC",
37-
"exists": "false"
38-
},
39-
{
40-
"field": "Microsoft.ContainerService/managedClusters/enableRBAC",
41-
"equals": "false"
42-
}
43-
]
34+
"field": "Microsoft.ContainerService/managedClusters/enableRBAC",
35+
"exists": "true"
36+
},
37+
{
38+
"field": "Microsoft.ContainerService/managedClusters/enableRBAC",
39+
"equals": "false"
4440
}
4541
]
4642
},
@@ -49,6 +45,7 @@
4945
}
5046
},
5147
"versions": [
48+
"1.1.0",
5249
"1.0.4",
5350
"1.0.3"
5451
]
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,53 @@
1+
{
2+
"properties": {
3+
"displayName": "[Preview]: Azure Backup should be enabled on Azure file shares",
4+
"policyType": "BuiltIn",
5+
"mode": "All",
6+
"description": "Ensure protection of your Azure file shares by enabling Azure Backup. Azure Backup is a secure and cost effective data protection solution for Azure.",
7+
"metadata": {
8+
"version": "1.0.0-preview",
9+
"category": "Backup",
10+
"preview": true
11+
},
12+
"version": "1.0.0-preview",
13+
"parameters": {
14+
"effect": {
15+
"type": "String",
16+
"metadata": {
17+
"displayName": "Effect",
18+
"description": "Enable or disable the execution of the policy"
19+
},
20+
"allowedValues": [
21+
"AuditIfNotExists",
22+
"Disabled"
23+
],
24+
"defaultValue": "AuditIfNotExists"
25+
}
26+
},
27+
"policyRule": {
28+
"if": {
29+
"allOf": [
30+
{
31+
"field": "type",
32+
"equals": "Microsoft.Storage/storageAccounts/fileServices/shares"
33+
},
34+
{
35+
"field": "Microsoft.Storage/storageAccounts/fileServices/shares/enabledProtocols",
36+
"equals": "SMB"
37+
}
38+
]
39+
},
40+
"then": {
41+
"effect": "[parameters('effect')]",
42+
"details": {
43+
"type": "Microsoft.RecoveryServices/backupprotecteditems"
44+
}
45+
}
46+
},
47+
"versions": [
48+
"1.0.0-PREVIEW"
49+
]
50+
},
51+
"id": "/providers/Microsoft.Authorization/policyDefinitions/cfc5190a-3b19-4a23-b563-a4c719b666e4",
52+
"name": "cfc5190a-3b19-4a23-b563-a4c719b666e4"
53+
}

‎built-in-policies/policyDefinitions/Kubernetes/AKS_EnableKMS.json

+3-6
Original file line numberDiff line numberDiff line change
@@ -5,10 +5,10 @@
55
"mode": "Indexed",
66
"description": "Use Key Management Service (KMS) to encrypt secret data at rest in etcd for Kubernetes cluster security. Learn more at: https://aka.ms/aks/kmsetcdencryption.",
77
"metadata": {
8-
"version": "1.0.0",
8+
"version": "1.1.0",
99
"category": "Kubernetes"
1010
},
11-
"version": "1.0.0",
11+
"version": "1.1.0",
1212
"parameters": {
1313
"effect": {
1414
"type": "String",
@@ -31,10 +31,6 @@
3131
"field": "type",
3232
"equals": "Microsoft.ContainerService/managedClusters"
3333
},
34-
{
35-
"field": "identity.type",
36-
"notEquals": "SystemAssigned"
37-
},
3834
{
3935
"field": "Microsoft.ContainerService/managedClusters/securityProfile.azureKeyVaultKms.enabled",
4036
"notEquals": true
@@ -46,6 +42,7 @@
4642
}
4743
},
4844
"versions": [
45+
"1.1.0",
4946
"1.0.0"
5047
]
5148
},

‎built-in-policies/policyDefinitions/Security Center/ASC_EnableRBAC_KubernetesService_Audit.json

+9-12
Original file line numberDiff line numberDiff line change
@@ -5,10 +5,10 @@
55
"mode": "All",
66
"description": "To provide granular filtering on the actions that users can perform, use Role-Based Access Control (RBAC) to manage permissions in Kubernetes Service Clusters and configure relevant authorization policies.",
77
"metadata": {
8-
"version": "1.0.4",
8+
"version": "1.1.0",
99
"category": "Security Center"
1010
},
11-
"version": "1.0.4",
11+
"version": "1.1.0",
1212
"parameters": {
1313
"effect": {
1414
"type": "string",
@@ -31,16 +31,12 @@
3131
"equals": "Microsoft.ContainerService/managedClusters"
3232
},
3333
{
34-
"anyOf": [
35-
{
36-
"field": "Microsoft.ContainerService/managedClusters/enableRBAC",
37-
"exists": "false"
38-
},
39-
{
40-
"field": "Microsoft.ContainerService/managedClusters/enableRBAC",
41-
"equals": "false"
42-
}
43-
]
34+
"field": "Microsoft.ContainerService/managedClusters/enableRBAC",
35+
"exists": "true"
36+
},
37+
{
38+
"field": "Microsoft.ContainerService/managedClusters/enableRBAC",
39+
"equals": "false"
4440
}
4541
]
4642
},
@@ -49,6 +45,7 @@
4945
}
5046
},
5147
"versions": [
48+
"1.1.0",
5249
"1.0.4",
5350
"1.0.3"
5451
]

‎built-in-policies/policySetDefinitions/Regulatory Compliance/CMMC_L3.json

+5-16
Original file line numberDiff line numberDiff line change
@@ -4,10 +4,10 @@
44
"policyType": "BuiltIn",
55
"description": "This initiative includes policies that address a subset of Cybersecurity Maturity Model Certification (CMMC) Level 3 requirements. Additional policies will be added in upcoming releases. For more information, visit https://aka.ms/cmmc-initiative.",
66
"metadata": {
7-
"version": "11.11.0",
7+
"version": "11.12.0",
88
"category": "Regulatory Compliance"
99
},
10-
"version": "11.11.0",
10+
"version": "11.12.0",
1111
"policyDefinitionGroups": [
1212
{
1313
"name": "CMMC_L3_AC.1.001",
@@ -1950,7 +1950,8 @@
19501950
],
19511951
"metadata": {
19521952
"displayName": "Effect for policy: Deploy Advanced Threat Protection on Storage Accounts",
1953-
"description": "For more information about effects, visit https://aka.ms/policyeffects"
1953+
"description": "For more information about effects, visit https://aka.ms/policyeffects",
1954+
"deprecated": true
19541955
}
19551956
},
19561957
"effect-b5f04e03-92a3-4b09-9410-2cc5e5047656": {
@@ -4579,19 +4580,6 @@
45794580
"CMMC_L3_SI.2.216"
45804581
]
45814582
},
4582-
{
4583-
"policyDefinitionReferenceId": "361c2074-3595-4e5d-8cab-4f21dffc835c",
4584-
"policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/361c2074-3595-4e5d-8cab-4f21dffc835c",
4585-
"definitionVersion": "1.*.*",
4586-
"parameters": {
4587-
"effect": {
4588-
"value": "[parameters('effect-361c2074-3595-4e5d-8cab-4f21dffc835c')]"
4589-
}
4590-
},
4591-
"groupNames": [
4592-
"CMMC_L3_IR.2.093"
4593-
]
4594-
},
45954583
{
45964584
"policyDefinitionReferenceId": "b5f04e03-92a3-4b09-9410-2cc5e5047656",
45974585
"policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/b5f04e03-92a3-4b09-9410-2cc5e5047656",
@@ -6095,6 +6083,7 @@
60956083
}
60966084
],
60976085
"versions": [
6086+
"11.12.0",
60986087
"11.11.0",
60996088
"11.10.0",
61006089
"11.9.0",

‎built-in-policies/policySetDefinitions/Regulatory Compliance/MCfS_Sovereignty_Baseline_Confidential_Policies.json

+4-2
Original file line numberDiff line numberDiff line change
@@ -4,10 +4,10 @@
44
"policyType": "BuiltIn",
55
"description": "The Microsoft Cloud for Sovereignty recommends confidential policies to help organizations achieve their sovereignty goals by default denying the creation of resources outside of approved regions, denying resources that are not backed by Azure Confidential Computing, and denying data storage resources that are not using Customer-Managed Keys. More details can be found here: https://aka.ms/SovereigntyBaselinePolicies",
66
"metadata": {
7-
"version": "1.1.0",
7+
"version": "1.1.1",
88
"category": "Regulatory Compliance"
99
},
10-
"version": "1.1.0",
10+
"version": "1.1.1",
1111
"policyDefinitionGroups": [
1212
{
1313
"additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/MCfS_Sovereignty_Baseline_Policy_SO.1",
@@ -355,6 +355,7 @@
355355
},
356356
"listOfAllowedLocations": {
357357
"allowedValues": [
358+
"australia",
358359
"australiacentral",
359360
"australiacentral2",
360361
"australiaeast",
@@ -676,6 +677,7 @@
676677
}
677678
],
678679
"versions": [
680+
"1.1.1",
679681
"1.1.0",
680682
"1.0.1-PREVIEW",
681683
"1.0.0-PREVIEW"

‎built-in-policies/policySetDefinitions/Regulatory Compliance/RMIT_Malaysia.json

+5-16
Original file line numberDiff line numberDiff line change
@@ -4,10 +4,10 @@
44
"policyType": "BuiltIn",
55
"description": "This initiative includes policies that address a subset of RMIT requirements. Additional policies will be added in upcoming releases. For more information, visit aka.ms/rmit-initiative.",
66
"metadata": {
7-
"version": "9.14.0",
7+
"version": "9.15.0",
88
"category": "Regulatory Compliance"
99
},
10-
"version": "9.14.0",
10+
"version": "9.15.0",
1111
"policyDefinitionGroups": [
1212
{
1313
"name": "RMiT_v1.0_10.1",
@@ -2115,7 +2115,8 @@
21152115
],
21162116
"metadata": {
21172117
"displayName": "Effect for policy: Deploy Advanced Threat Protection on storage accounts",
2118-
"description": "The effect determines what happens when the policy rule is evaluated to match; for more information about effects, visit https://aka.ms/policyeffects."
2118+
"description": "The effect determines what happens when the policy rule is evaluated to match; for more information about effects, visit https://aka.ms/policyeffects.",
2119+
"deprecated": true
21192120
}
21202121
},
21212122
"effect-404c3081-a854-4457-ae30-26a93ef643f9": {
@@ -4685,19 +4686,6 @@
46854686
"RMiT_v1.0_11.15"
46864687
]
46874688
},
4688-
{
4689-
"policyDefinitionReferenceId": "361c2074-3595-4e5d-8cab-4f21dffc835c",
4690-
"policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/361c2074-3595-4e5d-8cab-4f21dffc835c",
4691-
"definitionVersion": "1.*.*",
4692-
"parameters": {
4693-
"effect": {
4694-
"value": "[parameters('effect-361c2074-3595-4e5d-8cab-4f21dffc835c')]"
4695-
}
4696-
},
4697-
"groupNames": [
4698-
"RMiT_v1.0_11.5"
4699-
]
4700-
},
47014689
{
47024690
"policyDefinitionReferenceId": "404c3081-a854-4457-ae30-26a93ef643f9",
47034691
"policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/404c3081-a854-4457-ae30-26a93ef643f9",
@@ -4770,6 +4758,7 @@
47704758
}
47714759
],
47724760
"versions": [
4761+
"9.15.0",
47734762
"9.14.0",
47744763
"9.13.0",
47754764
"9.12.0",

0 commit comments

Comments
 (0)
Please sign in to comment.