last sync: 2024-May-27 19:38:21 UTC

Configure Container registries to disable public network access

Azure BuiltIn Policy definition

Source Azure Portal
Display name Configure Container registries to disable public network access
Id a3701552-92ea-433e-9d17-33b7f1208fc9
Version 1.0.0
Details on versioning
Category Container Registry
Microsoft Learn
Description Disable public network access for your Container Registry resource so that it's not accessible over the public internet. This can reduce data leakage risks. Learn more at https://aka.ms/acr/portal/public-network and https://aka.ms/acr/private-link.
Mode Indexed
Type BuiltIn
Preview False
Deprecated False
Effect Default
Modify
Allowed
Modify, Disabled
RBAC role(s)
Role Name Role Id
Contributor b24988ac-6180-42a0-ab88-20f7382dd24c
Rule aliases IF (1)
Alias Namespace ResourceType DefaultPath Modifiable
Microsoft.ContainerRegistry/registries/publicNetworkAccess Microsoft.ContainerRegistry registries properties.publicNetworkAccess true
THEN-Operations (1)
Alias Namespace ResourceType DefaultPath Modifiable
Microsoft.ContainerRegistry/registries/publicNetworkAccess Microsoft.ContainerRegistry registries properties.publicNetworkAccess true
Rule resource types IF (1)
Microsoft.ContainerRegistry/registries
Compliance
The following 2 compliance controls are associated with this Policy definition 'Configure Container registries to disable public network access' (a3701552-92ea-433e-9d17-33b7f1208fc9)
Control Domain Control Name MetadataId Category Title Owner Requirements Description Info Policy#
RMiT_v1.0 10.33 RMiT_v1.0_10.33 RMiT 10.33 Network Resilience Network Resilience - 10.33 Shared n/a A financial institution must design a reliable, scalable and secure enterprise network that is able to support its business activities, including future growth plans. link 28
RMiT_v1.0 11.15 RMiT_v1.0_11.15 RMiT 11.15 Data Loss Prevention (DLP) Data Loss Prevention (DLP) - 11.15 Shared n/a A financial institution must design internal control procedures and implement appropriate technology in all applications and access points to enforce DLP policies and trigger any policy violations. The technology deployed must cover the following: (a) data in-use - data being processed by IT resources; (b) data in-motion - data being transmitted on the network; and (c) data at-rest - data stored in storage mediums such as servers, backup media and databases. link 14
Initiatives usage
Initiative DisplayName Initiative Id Initiative Category State Type
[Preview]: Control the use of Container Registry in a Virtual Enclave b3fe25eb-cdc6-475f-96a5-04ac270f630d VirtualEnclaves Preview BuiltIn
RMIT Malaysia 97a6d4f1-3bed-4cf4-ac5b-0e444c0408d6 Regulatory Compliance GA BuiltIn
History
Date/Time (UTC ymd) (i) Change type Change detail
2021-03-16 16:49:20 add a3701552-92ea-433e-9d17-33b7f1208fc9
JSON compare n/a
JSON
api-version=2021-06-01
EPAC