last sync: 2021-Oct-22 15:42:38 UTC

Azure Policy definition

[Preview]: Azure Recovery Services vaults should use customer-managed keys for encrypting backup data

Name [Preview]: Azure Recovery Services vaults should use customer-managed keys for encrypting backup data
Azure Portal
Id 2e94d99a-8a36-4563-bc77-810d8893b671
Version 1.0.0-preview
details on versioning
Category Backup
Microsoft docs
Description Use customer-managed keys to manage the encryption at rest of your backup data. By default, customer data is encrypted with service-managed keys, but customer-managed keys are commonly required to meet regulatory compliance standards. Customer-managed keys enable the data to be encrypted with an Azure Key Vault key created and owned by you. You have full control and responsibility for the key lifecycle, including rotation and management. Learn more at https://aka.ms/AB-CmkEncryption.
Mode Indexed
Type BuiltIn
Preview True
Deprecated FALSE
Effect Default: Audit
Allowed: (Audit, Deny, Disabled)
Used RBAC Role none
History
Date/Time (UTC ymd) (i) Change type Change detail
2021-04-21 13:28:46 add 2e94d99a-8a36-4563-bc77-810d8893b671
Used in Initiatives
Initiative DisplayName Initiative Id Initiative Category State
[Preview]: NIST SP 800-53 Rev. 5 179d1daa-458f-4e47-8086-2a68d0d6c38f Regulatory Compliance Preview
FedRAMP High d5264498-16f4-418a-b659-fa7ef418175f Regulatory Compliance GA
FedRAMP Moderate e95f5a9f-57ad-4d03-bb0b-b1d16db93693 Regulatory Compliance GA
NIST SP 800-53 Rev. 4 cf25b9c1-bd23-4eb6-bd2c-f4f3ac644a5f Regulatory Compliance GA
JSON
{
  "displayName": "[Preview]: Azure Recovery Services vaults should use customer-managed keys for encrypting backup data",
  "policyType": "BuiltIn",
  "mode": "Indexed",
  "description": "Use customer-managed keys to manage the encryption at rest of your backup data. By default, customer data is encrypted with service-managed keys, but customer-managed keys are commonly required to meet regulatory compliance standards. Customer-managed keys enable the data to be encrypted with an Azure Key Vault key created and owned by you. You have full control and responsibility for the key lifecycle, including rotation and management. Learn more at https://aka.ms/AB-CmkEncryption.",
  "metadata": {
    "version": "1.0.0-preview",
    "preview": true,
    "category": "Backup"
  },
  "parameters": {
    "effect": {
      "type": "String",
      "metadata": {
        "displayName": "Effect",
        "description": "Enable or disable the execution of the policy."
      },
      "allowedValues": [
        "Audit",
        "Deny",
        "Disabled"
      ],
      "defaultValue": "Audit"
    },
    "enableDoubleEncryption": {
      "type": "Boolean",
      "metadata": {
        "displayName": "Double encryption should be enabled on Recovery Services vaults for Backup",
        "description": "Check if double encryption is enabled on Recovery Services vaults for Backup.  For more details refer to https://aka.ms/AB-InfraEncryption."
      },
      "allowedValues": [
        true,
        false
      ],
      "defaultValue": false
    }
  },
  "policyRule": {
    "if": {
      "allOf": [
        {
          "field": "type",
          "equals": "Microsoft.RecoveryServices/vaults"
        },
        {
          "anyOf": [
            {
              "field": "Microsoft.RecoveryServices/vaults/encryption.keyVaultProperties.keyUri",
              "exists": "false"
            },
            {
              "allOf": [
                {
                  "value": "[parameters('enableDoubleEncryption')]",
                  "equals": true
                },
                {
                  "field": "Microsoft.RecoveryServices/vaults/encryption.infrastructureEncryption",
                  "notEquals": "Enabled"
                }
              ]
            }
          ]
        }
      ]
    },
    "then": {
      "effect": "[parameters('effect')]"
    }
  }
}