last sync: 2022-May-23 16:32:10 UTC

Azure Policy definition

Azure Batch account should use customer-managed keys to encrypt data

Name Azure Batch account should use customer-managed keys to encrypt data
Azure Portal
Id 99e9ccd8-3db9-4592-b0d1-14b1715a4d8a
Version 1.0.1
details on versioning
Category Batch
Microsoft docs
Description Use customer-managed keys to manage the encryption at rest of your Batch account's data. By default, customer data is encrypted with service-managed keys, but customer-managed keys are commonly required to meet regulatory compliance standards. Customer-managed keys enable the data to be encrypted with an Azure Key Vault key created and owned by you. You have full control and responsibility for the key lifecycle, including rotation and management. Learn more at
Mode Indexed
Type BuiltIn
Preview FALSE
Deprecated FALSE
Effect Default: Audit
Allowed: (Audit, Deny, Disabled)
Used RBAC Role none
Rule Aliases IF (1)
Alias Namespace ResourceType DefaultPath Modifiable
Microsoft.Batch/batchAccounts/encryption.keySource Microsoft.Batch batchAccounts properties.encryption.keySource false
Rule ResourceTypes IF (1)
Date/Time (UTC ymd) (i) Change type Change detail
2021-02-10 14:43:58 change Patch (1.0.0 > 1.0.1) *changes on text case sensitivity are not tracked
2021-01-05 16:06:49 add 99e9ccd8-3db9-4592-b0d1-14b1715a4d8a
Used in Initiatives
Initiative DisplayName Initiative Id Initiative Category State Type
Deny or Audit resources without Encryption with a customer-managed key (CMK) Enforce-Encryption-CMK Encryption GA ESLZ
FedRAMP High d5264498-16f4-418a-b659-fa7ef418175f Regulatory Compliance GA BuiltIn
FedRAMP Moderate e95f5a9f-57ad-4d03-bb0b-b1d16db93693 Regulatory Compliance GA BuiltIn
NIST SP 800-171 Rev. 2 03055927-78bd-4236-86c0-f36125a10dc9 Regulatory Compliance GA BuiltIn
NIST SP 800-53 Rev. 4 cf25b9c1-bd23-4eb6-bd2c-f4f3ac644a5f Regulatory Compliance GA BuiltIn
NIST SP 800-53 Rev. 5 179d1daa-458f-4e47-8086-2a68d0d6c38f Regulatory Compliance GA BuiltIn
JSON Changes