| Source | Azure Portal | ||
| Display name | Microsoft Managed Control 1063 - Remote Access | Managed Access Control Points | ||
| Id | 593ce201-54b2-4dd0-b34f-c308005d7780 | ||
| Version | 1.0.0 Details on versioning |
||
| Versioning |
Versions supported for Versioning: 0 Built-in Versioning [Preview] |
||
| Category | Regulatory Compliance Microsoft Learn |
||
| Description | Microsoft implements this Access Control control | ||
| Cloud environments | AzureCloud = true AzureUSGovernment = true AzureChinaCloud = unknown |
||
| Available in AzUSGov | The Policy is available in AzureUSGovernment cloud. Version: '1.0.0' Repository: Azure-Policy 593ce201-54b2-4dd0-b34f-c308005d7780 |
||
| Additional metadata |
Name/Id: ACF1063 / Microsoft Managed Control 1063 Category: Access Control Title: Remote Access | Managed Access Control Points Ownership: Customer Description: The information system routes all remote accesses through pools of Jumpboxes per Azure datacenter managed network access control points. Requirements: Azure leverages AD to control access to Azure assets. Azure is protected using Microsoft-controlled AD security groups and requires multifactor authentication via smart cards at security boundaries, including at the VPN, Jumpboxes, Debug Servers, and Network Hop Boxes. |
||
| Mode | Indexed | ||
| Type | Static | ||
| Preview | False | ||
| Deprecated | False | ||
| Effect | Fixed audit |
||
| RBAC role(s) | none | ||
| Rule aliases | none | ||
| Rule resource types | IF (2) |
||
| Compliance | Not a Compliance control | ||
| Initiatives usage | none | ||
| History | none | ||
| JSON compare | n/a | ||
| JSON |
|