Source | Azure Portal | ||||||||||||
Display name | Secrets should have more than the specified number of days before expiration | ||||||||||||
Id | b0eb591a-5e70-4534-a8bf-04b9c489584a | ||||||||||||
Version | 1.0.1 Details on versioning |
||||||||||||
Versioning |
Versions supported for Versioning: 1 1.0.1 Built-in Versioning [Preview] |
||||||||||||
Category | Key Vault Microsoft Learn |
||||||||||||
Description | If a secret is too close to expiration, an organizational delay to rotate the secret may result in an outage. Secrets should be rotated at a specified number of days prior to expiration to provide sufficient time to react to a failure. | ||||||||||||
Cloud environments | AzureCloud = true AzureUSGovernment = true AzureChinaCloud = unknown |
||||||||||||
Available in AzUSGov | The Policy is available in AzureUSGovernment cloud. Version: '1.0.1' Repository: Azure-Policy b0eb591a-5e70-4534-a8bf-04b9c489584a |
||||||||||||
Mode | Microsoft.KeyVault.Data | ||||||||||||
Type | BuiltIn | ||||||||||||
Preview | False | ||||||||||||
Deprecated | False | ||||||||||||
Effect | Default Audit Allowed Audit, Deny, Disabled |
||||||||||||
RBAC role(s) | none | ||||||||||||
Rule aliases | none | ||||||||||||
Rule resource types | none | ||||||||||||
Compliance | Not a Compliance control | ||||||||||||
Initiatives usage |
|
||||||||||||
History |
|
||||||||||||
JSON compare |
compare mode:
version left:
version right:
|
||||||||||||
JSON |
|