last sync: 2023-Dec-05 19:46:27 UTC

Azure Policy definition

Certificates should use allowed key types

Source Azure Portal
Display name Certificates should use allowed key types
Id 1151cede-290b-4ba0-8b38-0ad145ac888f
Version 2.1.0
Details on versioning
Category Key Vault
Microsoft Learn
Description Manage your organizational compliance requirements by restricting the key types allowed for certificates.
Mode Microsoft.KeyVault.Data
Type BuiltIn
Preview False
Deprecated False
Effect Default
audit, Audit, deny, Deny, disabled, Disabled
RBAC role(s) none
Rule aliases none
Rule resource types none
The following 1 compliance controls are associated with this Policy definition 'Certificates should use allowed key types' (1151cede-290b-4ba0-8b38-0ad145ac888f)
Control Domain Control Name MetadataId Category Title Owner Requirements Description Info Policy#
RBI_ITF_NBFC_v2017 3.8 RBI_ITF_NBFC_v2017_3.8 RBI IT Framework 3.8 Information and Cyber Security Digital Signatures-3.8 n/a A Digital Signature Certificate authenticates entity???s identity electronically. It also provides a high level of security for online transactions by ensuring absolute privacy of the information exchanged using a Digital Signature Certificate. NBFCs may consider use of Digital signatures to protect the authenticity and integrity of important electronic documents and also for high value fund transfer. link 7
Initiatives usage
Initiative DisplayName Initiative Id Initiative Category State Type
[Preview]: Reserve Bank of India - IT Framework for NBFC 7f89f09c-48c1-f28d-1bd5-84f3fb22f86c Regulatory Compliance Preview BuiltIn
Date/Time (UTC ymd) (i) Change type Change detail
2022-04-01 20:29:14 change Minor (2.0.1 > 2.1.0)
2021-08-30 14:27:30 change Patch, old suffix: preview (2.0.0-preview > 2.0.1)
2020-09-02 14:03:46 change Previous DisplayName: [Preview]: Manage allowed certificate key types
2019-11-19 11:26:09 change Previous DisplayName: [Preview]: Certificates should have the specified key types
JSON compare
compare mode: version left: version right: