Source | Azure Portal | ||||||||||||||||||||||
Display name | Azure SignalR Service should disable public network access | ||||||||||||||||||||||
Id | 21a9766a-82a5-4747-abb5-650b6dbba6d0 | ||||||||||||||||||||||
Version | 1.2.0 Details on versioning |
||||||||||||||||||||||
Versioning |
Versions supported for Versioning: 2 1.2.0 1.1.0 Built-in Versioning [Preview] |
||||||||||||||||||||||
Category | SignalR Microsoft Learn |
||||||||||||||||||||||
Description | To improve the security of Azure SignalR Service resource, ensure that it isn't exposed to the public internet and can only be accessed from a private endpoint. Disable the public network access property as described in https://aka.ms/asrs/networkacls. This option disables access from any public address space outside the Azure IP range, and denies all logins that match IP or virtual network-based firewall rules. This reduces data leakage risks. | ||||||||||||||||||||||
Cloud environments | AzureCloud = true AzureUSGovernment = unknown AzureChinaCloud = unknown |
||||||||||||||||||||||
Available in AzUSGov | Unknown, no evidence if Policy definition is/not available in AzureUSGovernment | ||||||||||||||||||||||
Mode | Indexed | ||||||||||||||||||||||
Type | BuiltIn | ||||||||||||||||||||||
Preview | False | ||||||||||||||||||||||
Deprecated | False | ||||||||||||||||||||||
Effect | Default Audit Allowed Audit, Deny, Disabled |
||||||||||||||||||||||
RBAC role(s) | none | ||||||||||||||||||||||
Rule aliases | IF (1)
|
||||||||||||||||||||||
Rule resource types | IF (1) |
||||||||||||||||||||||
Compliance |
The following 1 compliance controls are associated with this Policy definition 'Azure SignalR Service should disable public network access' (21a9766a-82a5-4747-abb5-650b6dbba6d0)
| ||||||||||||||||||||||
Initiatives usage |
|
||||||||||||||||||||||
History |
|
||||||||||||||||||||||
JSON compare |
compare mode:
version left:
version right:
|
||||||||||||||||||||||
JSON |
|