last sync: 2021-May-10 15:04:35 UTC

Azure Policy definition

Azure SignalR Service should disable public network access

Name Azure SignalR Service should disable public network access
Azure Portal
Id 21a9766a-82a5-4747-abb5-650b6dbba6d0
Version 1.0.0
details on versioning
Category SignalR
Microsoft docs
Description To improve the security of Azure SignalR Service resource, ensure that it isn't exposed to the public internet and can only be accessed from a private endpoint. Disable the public network access property as described in https://aka.ms/asrs/networkacls. This option disables access from any public address space outside the Azure IP range, and denies all logins that match IP or virtual network-based firewall rules. This reduces data leakage risks.
Mode Indexed
Type BuiltIn
Preview FALSE
Deprecated FALSE
Effect Default: Audit
Allowed: (Audit, Deny, Disabled)
Used RBAC Role none
History
Date/Time (UTC ymd) (i) Change type Change detail
2021-03-09 14:37:41 add 21a9766a-82a5-4747-abb5-650b6dbba6d0
Used in Initiatives none
JSON
{
  "properties": {
    "displayName": "Azure SignalR Service should disable public network access",
    "policyType": "BuiltIn",
    "mode": "Indexed",
    "description": "To improve the security of Azure SignalR Service resource, ensure that it isn't exposed to the public internet and can only be accessed from a private endpoint. Disable the public network access property as described in https://aka.ms/asrs/networkacls. This option disables access from any public address space outside the Azure IP range, and denies all logins that match IP or virtual network-based firewall rules. This reduces data leakage risks.",
    "metadata": {
      "version": "1.0.0",
      "category": "SignalR"
    },
    "parameters": {
      "effect": {
        "type": "String",
        "metadata": {
          "displayName": "Effect",
          "description": "Enable or disable the execution of the policy"
        },
        "allowedValues": [
          "Audit",
          "Deny",
          "Disabled"
        ],
        "defaultValue": "Audit"
      }
    },
    "policyRule": {
      "if": {
        "allOf": [
          {
            "field": "type",
            "equals": "Microsoft.SignalRService/SignalR"
          },
          {
            "anyOf": [
              {
                "field": "Microsoft.SignalRService/SignalR/networkACLs.defaultAction",
                "equals": "Allow"
              },
              {
                "field": "Microsoft.SignalRService/SignalR/networkACLs.publicNetwork.allow",
                "exists": false
              },
              {
                "count": {
                "field": "Microsoft.SignalRService/SignalR/networkACLs.publicNetwork.allow[*]"
                },
                "greater": 0
              }
            ]
          }
        ]
      },
      "then": {
      "effect": "[parameters('effect')]"
      }
    }
  },
  "id": "/providers/Microsoft.Authorization/policyDefinitions/21a9766a-82a5-4747-abb5-650b6dbba6d0",
  "type": "Microsoft.Authorization/policyDefinitions",
  "name": "21a9766a-82a5-4747-abb5-650b6dbba6d0"
}