last sync: 2024-Jul-26 18:17:39 UTC

Modify - Configure Azure File Sync to disable public network access

Azure BuiltIn Policy definition

Source Azure Portal
Display name Modify - Configure Azure File Sync to disable public network access
Id 0e07b2e9-6cd9-4c40-9ccb-52817b95133b
Version 1.0.0
Details on versioning
Category Storage
Microsoft Learn
Description The Azure File Sync's internet-accessible public endpoint are disabled by your organizational policy. You may still access the Storage Sync Service via its private endpoint(s).
Mode Indexed
Type BuiltIn
Preview False
Deprecated False
Effect Default
Modify
Allowed
Modify, Disabled
RBAC role(s)
Role Name Role Id
Contributor b24988ac-6180-42a0-ab88-20f7382dd24c
Rule aliases IF (1)
Alias Namespace ResourceType Path PathIsDefault DefaultPath Modifiable
Microsoft.StorageSync/storageSyncServices/incomingTrafficPolicy Microsoft.StorageSync storageSyncServices properties.incomingTrafficPolicy True True
THEN-Operations (1)
Alias Namespace ResourceType Path PathIsDefault DefaultPath Modifiable
Microsoft.StorageSync/storageSyncServices/incomingTrafficPolicy Microsoft.StorageSync storageSyncServices properties.incomingTrafficPolicy True True
Rule resource types IF (1)
Microsoft.StorageSync/storageSyncServices
Compliance
The following 2 compliance controls are associated with this Policy definition 'Modify - Configure Azure File Sync to disable public network access' (0e07b2e9-6cd9-4c40-9ccb-52817b95133b)
Control Domain Control Name MetadataId Category Title Owner Requirements Description Info Policy#
RMiT_v1.0 10.33 RMiT_v1.0_10.33 RMiT 10.33 Network Resilience Network Resilience - 10.33 Shared n/a A financial institution must design a reliable, scalable and secure enterprise network that is able to support its business activities, including future growth plans. link 27
RMiT_v1.0 11.15 RMiT_v1.0_11.15 RMiT 11.15 Data Loss Prevention (DLP) Data Loss Prevention (DLP) - 11.15 Shared n/a A financial institution must design internal control procedures and implement appropriate technology in all applications and access points to enforce DLP policies and trigger any policy violations. The technology deployed must cover the following: (a) data in-use - data being processed by IT resources; (b) data in-motion - data being transmitted on the network; and (c) data at-rest - data stored in storage mediums such as servers, backup media and databases. link 14
Initiatives usage
Initiative DisplayName Initiative Id Initiative Category State Type
Enforce recommended guardrails for Storage Account Enforce-Guardrails-Storage Storage GA ALZ
RMIT Malaysia 97a6d4f1-3bed-4cf4-ac5b-0e444c0408d6 Regulatory Compliance GA BuiltIn
History
Date/Time (UTC ymd) (i) Change type Change detail
2021-03-02 15:11:40 add 0e07b2e9-6cd9-4c40-9ccb-52817b95133b
JSON compare n/a
JSON
api-version=2021-06-01
EPAC