last sync: 2021-Jan-25 16:07:05 UTC

Azure Policy definition

Service Fabric clusters should have the ClusterProtectionLevel property set to EncryptAndSign

Name Service Fabric clusters should have the ClusterProtectionLevel property set to EncryptAndSign
Azure Portal
Id 617c02be-7f02-4efd-8836-3180d47b6c68
Version 1.1.0
details on versioning
Category Service Fabric
Microsoft docs
Description Service Fabric provides three levels of protection (None, Sign and EncryptAndSign) for node-to-node communication using a primary cluster certificate. Set the protection level to ensure that all node-to-node messages are encrypted and digitally signed
Mode Indexed
Type BuiltIn
Preview FALSE
Deprecated FALSE
Effect Default: Audit
Allowed: (Audit, Deny, Disabled)
Used RBAC Role none
History none
Used in Initiatives
Initiative DisplayName Initiative Id Initiative Category State
[Deprecated]: Azure Security Benchmark v1 42a694ed-f65e-42b2-aa9e-8052e9740a92 Regulatory Compliance Deprecated
[Deprecated]: Azure Security Benchmark v2 bb522ac1-bc39-4957-b194-429bcd3bcb0b Regulatory Compliance Deprecated
[Preview]: CMMC Level 3 b5629c75-5c77-4422-87b9-2509e680f8de Regulatory Compliance Preview
Enable Monitoring in Azure Security Center 1f3afdf9-d0c9-4c3d-847f-89da613e70a8 Security Center GA
ISO 27001:2013 89c6cddc-1c73-4ac1-b19c-54d1a15a42f2 Regulatory Compliance GA
PCI v3.2.1:2018 496eeda9-8f2f-4d5e-8dfd-204f0a92ed41 Regulatory Compliance GA
UK OFFICIAL and UK NHS 3937f550-eedd-4639-9c5e-294358be442e Regulatory Compliance GA
Json
{
  "properties": {
    "displayName": "Service Fabric clusters should have the ClusterProtectionLevel property set to EncryptAndSign",
    "policyType": "BuiltIn",
    "mode": "Indexed",
    "description": "Service Fabric provides three levels of protection (None, Sign and EncryptAndSign) for node-to-node communication using a primary cluster certificate. Set the protection level to ensure that all node-to-node messages are encrypted and digitally signed",
    "metadata": {
      "version": "1.1.0",
      "category": "Service Fabric"
    },
    "parameters": {
      "effect": {
        "type": "String",
        "metadata": {
          "displayName": "Effect",
          "description": "The effect determines what happens when the policy rule is evaluated to match"
        },
        "allowedValues": [
          "Audit",
          "Deny",
          "Disabled"
        ],
        "defaultValue": "Audit"
      }
    },
    "policyRule": {
      "if": {
        "allOf": [
          {
            "field": "type",
            "equals": "Microsoft.ServiceFabric/clusters"
          },
          {
            "anyOf": [
              {
              "field": "Microsoft.ServiceFabric/clusters/fabricSettings[*].name",
                "notEquals": "Security"
              },
              {
              "field": "Microsoft.ServiceFabric/clusters/fabricSettings[*].parameters[*].name",
                "notEquals": "ClusterProtectionLevel"
              },
              {
              "field": "Microsoft.ServiceFabric/clusters/fabricSettings[*].parameters[*].value",
                "notEquals": "EncryptAndSign"
              }
            ]
          }
        ]
      },
      "then": {
      "effect": "[parameters('effect')]"
      }
    }
  },
  "id": "/providers/Microsoft.Authorization/policyDefinitions/617c02be-7f02-4efd-8836-3180d47b6c68",
  "type": "Microsoft.Authorization/policyDefinitions",
  "name": "617c02be-7f02-4efd-8836-3180d47b6c68"
}