| Source | Azure Portal | ||||||||||||||
| Display name | Azure Kubernetes Service Clusters should disable Command Invoke | ||||||||||||||
| Id | 89f2d532-c53c-4f8f-9afa-4927b1114a0d | ||||||||||||||
| Version | 1.0.1 Details on versioning |
||||||||||||||
| Versioning |
Versions supported for Versioning: 1 1.0.1 Built-in Versioning [Preview] |
||||||||||||||
| Category | Kubernetes Microsoft Learn |
||||||||||||||
| Description | Disabling command invoke can enhance the security by avoiding bypass of restricted network access or Kubernetes role-based access control | ||||||||||||||
| Cloud environments | AzureCloud = true AzureUSGovernment = true AzureChinaCloud = unknown |
||||||||||||||
| Available in AzUSGov | The Policy is available in AzureUSGovernment cloud. Version: '1.*.*' | ||||||||||||||
| Mode | Indexed | ||||||||||||||
| Type | BuiltIn | ||||||||||||||
| Preview | False | ||||||||||||||
| Deprecated | False | ||||||||||||||
| Effect | Default Audit Allowed Audit, Disabled |
||||||||||||||
| RBAC role(s) | none | ||||||||||||||
| Rule aliases | IF (1)
|
||||||||||||||
| Rule resource types | IF (1) |
||||||||||||||
| Compliance | Not a Compliance control | ||||||||||||||
| Initiatives usage |
|
||||||||||||||
| History |
|
||||||||||||||
| JSON compare |
compare mode:
version left:
version right:
|
||||||||||||||
| JSON |
|