Source | Azure Portal | ||||||
Display name | Microsoft Managed Control 1068 - Wireless Access Restrictions | ||||||
Id | 2d045bca-a0fd-452e-9f41-4ec33769717c | ||||||
Version | 1.0.1 Details on versioning |
||||||
Versioning |
Versions supported for Versioning: 0 Built-in Versioning [Preview] |
||||||
Category | Regulatory Compliance Microsoft Learn |
||||||
Description | Microsoft implements this Access Control control | ||||||
Cloud environments | AzureCloud = true AzureUSGovernment = true AzureChinaCloud = unknown |
||||||
Available in AzUSGov | The Policy is available in AzureUSGovernment cloud. Version: '1.0.0' Repository: Azure-Policy 2d045bca-a0fd-452e-9f41-4ec33769717c |
||||||
Additional metadata |
Name/Id: ACF1068 / Microsoft Managed Control 1068 Category: Access Control Title: Wireless Access - Prior Authorization Ownership: Microsoft Description: The organization: Authorizes wireless access to the information system prior to allowing such connections. Requirements: Azure regularly scans for rogue wireless signals on at least a quarterly basis within the Azure datacenters. Results are logged and documented by the Security Response Team. Any rogue signals are investigated and removed. Azure has implemented a solution to continuously monitor and alarm on detection of rogue wireless signals. This system has been deployed to Azure authorization boundary Azure datacenters in a phased deployment. This system allows for wireless scan data to be monitored continuously by the Azure Security Incident and Event Monitoring tool. |
||||||
Mode | Indexed | ||||||
Type | Static | ||||||
Preview | False | ||||||
Deprecated | False | ||||||
Effect | Fixed audit |
||||||
RBAC role(s) | none | ||||||
Rule aliases | none | ||||||
Rule resource types | IF (2) |
||||||
Compliance | Not a Compliance control | ||||||
Initiatives usage | none | ||||||
History |
|
||||||
JSON compare |
compare mode:
version left:
version right:
|
||||||
JSON |
|