last sync: 2024-Oct-03 17:51:34 UTC

[Deprecated]: Azure Cache for Redis should reside within a virtual network

Azure BuiltIn Policy definition

Source Azure Portal
Display name [Deprecated]: Azure Cache for Redis should reside within a virtual network
Id 7d092e0a-7acd-40d2-a975-dca21cae48c4
Version 1.0.3-deprecated
Details on versioning
Versioning Versions supported for Versioning: 1
1.0.3 (1.0.3-deprecated)
Built-in Versioning [Preview]
Category Cache
Microsoft Learn
Description Azure Virtual Network deployment provides enhanced security and isolation for your Azure Cache for Redis, as well as subnets, access control policies, and other features to further restrict access.When an Azure Cache for Redis instance is configured with a virtual network, it is not publicly addressable and can only be accessed from virtual machines and applications within the virtual network.
Mode Indexed
Type BuiltIn
Preview False
Deprecated True
Effect Default
Audit
Allowed
Audit, Deny, Disabled
RBAC role(s) none
Rule aliases IF (1)
Alias Namespace ResourceType Path PathIsDefault DefaultPath Modifiable
Microsoft.Cache/Redis/subnetId Microsoft.Cache Redis properties.subnetId True True
Rule resource types IF (1)
Microsoft.Cache/redis
Compliance
The following 1 compliance controls are associated with this Policy definition '[Deprecated]: Azure Cache for Redis should reside within a virtual network' (7d092e0a-7acd-40d2-a975-dca21cae48c4)
Control Domain Control Name MetadataId Category Title Owner Requirements Description Info Policy#
Azure_Security_Benchmark_v2.0 NS-2 Azure_Security_Benchmark_v2.0_NS-2 Azure Security Benchmark NS-2 Network Security Connect private networks together Customer Use Azure ExpressRoute or Azure virtual private network (VPN) to create private connections between Azure datacenters and on-premises infrastructure in a colocation environment. ExpressRoute connections do not go over the public internet , and they offer more reliability, faster speeds, and lower latencies than typical internet connections. For point-to-site VPN and site-to-site VPN, you can connect on-premises devices or networks to a virtual network using any combination of these VPN options and Azure ExpressRoute. To connect two or more virtual networks in Azure together, use virtual network peering or Private Link. Network traffic between peered virtual networks is private and is kept on the Azure backbone network. What are the ExpressRoute connectivity models: https://docs.microsoft.com/azure/expressroute/expressroute-connectivity-models Azure VPN overview: https://docs.microsoft.com/azure/vpn-gateway/vpn-gateway-about-vpngateways Virtual network peering: https://docs.microsoft.com/azure/virtual-network/virtual-network-peering-overview Azure Private Link: https://docs.microsoft.com/azure/private-link/private-link-service-overview n/a link 15
Initiatives usage
Initiative DisplayName Initiative Id Initiative Category State Type
[Deprecated]: Azure Security Benchmark v2 bb522ac1-bc39-4957-b194-429bcd3bcb0b Regulatory Compliance Deprecated BuiltIn
History
Date/Time (UTC ymd) (i) Change type Change detail
2022-04-15 17:17:14 change Version remains equal, new suffix: deprecated (1.0.3 > 1.0.3-deprecated)
2021-02-10 14:43:58 change Patch (1.0.2 > 1.0.3)
2020-12-11 15:42:52 change Patch (1.0.1 > 1.0.2)
2020-05-21 16:06:38 add 7d092e0a-7acd-40d2-a975-dca21cae48c4
JSON compare
compare mode: version left: version right:
JSON
api-version=2021-06-01
EPAC