last sync: 2020-Oct-01 14:15:17 UTC

Azure Policy

Vulnerabilities in Azure Container Registry images should be remediated

Policy DisplayName Vulnerabilities in Azure Container Registry images should be remediated
Policy Id 5f0f936f-2f01-4bf5-b6be-d423792fa562
Policy Category Security Center
Policy Description Container image vulnerability assessment scans your registry for security vulnerabilities on each pushed container image and exposes detailed findings for each image (powered by Qualys). Resolving the vulnerabilities can greatly improve your containers' security posture and protect them from attacks.
Policy Mode All
Policy Type BuiltIn
Policy in Preview FALSE
Policy Deprecated FALSE
Policy Effect Default: AuditIfNotExists
Allowed: (AuditIfNotExists,Disabled)
Roles used none
Policy Changes
Date/Time (UTC ymd) (i) Change Change detail
2020-08-19 13:49:29 add: Policy 5f0f936f-2f01-4bf5-b6be-d423792fa562
Used in Policy Initiative(s)
Initiative DisplayName Initiative Id
Enable Monitoring in Azure Security Center 1f3afdf9-d0c9-4c3d-847f-89da613e70a8
Policy Rule
{
  "properties": {
    "displayName": "Vulnerabilities in Azure Container Registry images should be remediated",
    "policyType": "BuiltIn",
    "mode": "All",
    "description": "Container image vulnerability assessment scans your registry for security vulnerabilities on each pushed container image and exposes detailed findings for each image (powered by Qualys). Resolving the vulnerabilities can greatly improve your containers' security posture and protect them from attacks.",
    "metadata": {
      "version": "1.0.0",
      "category": "Security Center"
    },
    "parameters": {
      "effect": {
        "type": "String",
        "metadata": {
          "displayName": "Effect",
          "description": "Enable or disable the execution of the policy"
        },
        "allowedValues": [
          "AuditIfNotExists",
          "Disabled"
        ],
        "defaultValue": "AuditIfNotExists"
      }
    },
    "policyRule": {
      "if": {
        "field": "type",
        "equals": "Microsoft.ContainerRegistry/registries"
      },
      "then": {
      "effect": "[parameters('effect')]",
        "details": {
          "type": "Microsoft.Security/assessments",
          "name": "dbd0cb49-b563-45e7-9724-889e799fa648",
          "existenceCondition": {
            "field": "Microsoft.Security/assessments/status.code",
            "equals": "Healthy"
          }
        }
      }
    }
  },
  "id": "/providers/Microsoft.Authorization/policyDefinitions/5f0f936f-2f01-4bf5-b6be-d423792fa562",
  "type": "Microsoft.Authorization/policyDefinitions",
  "name": "5f0f936f-2f01-4bf5-b6be-d423792fa562"
}