last sync: 2021-Oct-22 15:42:38 UTC

Azure Policy definition

[Preview]: Private endpoint should be configured for Key Vault

Name [Preview]: Private endpoint should be configured for Key Vault
Azure Portal
Id 5f0bc445-3935-4915-9981-011aa2b46147
Version 1.1.0-preview
details on versioning
Category Key Vault
Microsoft docs
Description Private link provides a way to connect Key Vault to your Azure resources without sending traffic over the public internet. Private link provides defense in depth protection against data exfiltration.
Mode Indexed
Type BuiltIn
Preview True
Deprecated FALSE
Effect Default: Audit
Allowed: (Audit, Deny, Disabled)
Used RBAC Role none
History
Date/Time (UTC ymd) (i) Change type Change detail
2021-01-27 16:54:46 change Minor, suffix remains equal (1.0.2-preview > 1.1.0-preview)
2020-12-11 15:42:52 change Patch, suffix remains equal (1.0.1-preview > 1.0.2-preview)
2020-09-09 11:24:03 add 5f0bc445-3935-4915-9981-011aa2b46147
Used in Initiatives
Initiative DisplayName Initiative Id Initiative Category State
[Deprecated]: Azure Security Benchmark v2 bb522ac1-bc39-4957-b194-429bcd3bcb0b Regulatory Compliance Deprecated
[Preview]: NIST SP 800-53 Rev. 5 179d1daa-458f-4e47-8086-2a68d0d6c38f Regulatory Compliance Preview
Azure Security Benchmark 1f3afdf9-d0c9-4c3d-847f-89da613e70a8 Security Center GA
FedRAMP High d5264498-16f4-418a-b659-fa7ef418175f Regulatory Compliance GA
FedRAMP Moderate e95f5a9f-57ad-4d03-bb0b-b1d16db93693 Regulatory Compliance GA
NIST SP 800-53 Rev. 4 cf25b9c1-bd23-4eb6-bd2c-f4f3ac644a5f Regulatory Compliance GA
JSON Changes

JSON
{
  "displayName": "[Preview]: Private endpoint should be configured for Key Vault",
  "policyType": "BuiltIn",
  "mode": "Indexed",
  "description": "Private link provides a way to connect Key Vault to your Azure resources without sending traffic over the public internet. Private link provides defense in depth protection against data exfiltration.",
  "metadata": {
    "version": "1.1.0-preview",
    "category": "Key Vault",
    "preview": true
  },
  "parameters": {
    "effect": {
      "type": "String",
      "metadata": {
        "displayName": "Effect",
        "description": "Enable or disable the execution of the policy"
      },
      "allowedValues": [
        "Audit",
        "Deny",
        "Disabled"
      ],
      "defaultValue": "Audit"
    }
  },
  "policyRule": {
    "if": {
      "allOf": [
        {
          "field": "type",
          "equals": "Microsoft.KeyVault/vaults"
        },
        {
          "anyOf": [
            {
              "field": "Microsoft.KeyVault/vaults/privateEndpointConnections",
              "exists": "false"
            },
            {
              "count": {
                "field": "Microsoft.KeyVault/vaults/privateEndpointConnections[*]"
              },
              "equals": 0
            }
          ]
        }
      ]
    },
    "then": {
      "effect": "[parameters('effect')]"
    }
  }
}