Source | Azure Portal | ||||||||||||||||||||||
Display name | [Deprecated]: Azure Cache for Redis should reside within a virtual network | ||||||||||||||||||||||
Id | 7d092e0a-7acd-40d2-a975-dca21cae48c4 | ||||||||||||||||||||||
Version | 1.0.3-deprecated Details on versioning |
||||||||||||||||||||||
Versioning |
Versions supported for Versioning: 1 1.0.3 (1.0.3-deprecated) Built-in Versioning [Preview] |
||||||||||||||||||||||
Category | Cache Microsoft Learn |
||||||||||||||||||||||
Description | Azure Virtual Network deployment provides enhanced security and isolation for your Azure Cache for Redis, as well as subnets, access control policies, and other features to further restrict access.When an Azure Cache for Redis instance is configured with a virtual network, it is not publicly addressable and can only be accessed from virtual machines and applications within the virtual network. | ||||||||||||||||||||||
Cloud environments | AzureCloud = true AzureUSGovernment = true AzureChinaCloud = unknown |
||||||||||||||||||||||
Available in AzUSGov | The Policy is available in AzureUSGovernment cloud. Version: '1.*.*' | ||||||||||||||||||||||
Assessment(s) |
Assessments count: 1 Assessment Id: be264018-593c-1162-bd5e-b74a39396652 DisplayName: Azure Cache for Redis should reside within a virtual network Description: Deploying Azure Cache for Redis within a Virtual Network (VNet) enhances security by providing isolation and restricting access. This setup ensures that the cache instance is not publicly addressable and can only be accessed from within the VNet. This includes access from virtual machines and applications. Without this configuration, the cache instance could be exposed to potential threats and unauthorized access. Therefore, for optimal security, we recommend housing Azure Cache for Redis within a VNet . Remediation description: Injection into your custom Virtual Network/Subnet can only be done at cache creation time, so take these steps to mitigate: 1. Create and configure a new VNet-injected cache into your custom subnet for the Azure Cache for Redis. 2. Either embed your client application into the same virtual network or allow access for your client application to communicate with the cache instance within your subnet using NSG rules. Follow the guidance here: https://aka.ms/redis/vnet-faq 3. If necessary, export the data from your instance and import it into the new Azure Cache for Redis instance. Learn more about the import/export feature here: https://aka.ms/redis/import-export. Categories: Data Severity: Medium preview: True |
||||||||||||||||||||||
Mode | Indexed | ||||||||||||||||||||||
Type | BuiltIn | ||||||||||||||||||||||
Preview | False | ||||||||||||||||||||||
Deprecated | True | ||||||||||||||||||||||
Effect | Default Audit Allowed Audit, Deny, Disabled |
||||||||||||||||||||||
RBAC role(s) | none | ||||||||||||||||||||||
Rule aliases | IF (1)
|
||||||||||||||||||||||
Rule resource types | IF (1) |
||||||||||||||||||||||
Compliance |
The following 1 compliance controls are associated with this Policy definition '[Deprecated]: Azure Cache for Redis should reside within a virtual network' (7d092e0a-7acd-40d2-a975-dca21cae48c4)
| ||||||||||||||||||||||
Initiatives usage |
|
||||||||||||||||||||||
History |
|
||||||||||||||||||||||
JSON compare |
compare mode:
version left:
version right:
|
||||||||||||||||||||||
JSON |
|