last sync: 2024-Mar-01 17:50:27 UTC

API Management calls to API backends should be authenticated

Azure BuiltIn Policy definition

Source Azure Portal
Display name API Management calls to API backends should be authenticated
Id c15dcc82-b93c-4dcb-9332-fbf121685b54
Version 1.0.1
Details on versioning
Category API Management
Microsoft Learn
Description Calls from API Management to backends should use some form of authentication, whether via certificates or credentials. Does not apply to Service Fabric backends.
Mode All
Type BuiltIn
Preview False
Deprecated False
Effect Default
Audit
Allowed
Audit, Disabled, Deny
RBAC role(s) none
Rule aliases IF (6)
Alias Namespace ResourceType DefaultPath Modifiable
Microsoft.ApiManagement/service/backends/credentials.authorization.parameter Microsoft.ApiManagement service/backends properties.credentials.authorization.parameter false
Microsoft.ApiManagement/service/backends/credentials.authorization.scheme Microsoft.ApiManagement service/backends properties.credentials.authorization.scheme false
Microsoft.ApiManagement/service/backends/credentials.certificate Microsoft.ApiManagement service/backends properties.credentials.certificate false
Microsoft.ApiManagement/service/backends/credentials.certificate[*] Microsoft.ApiManagement service/backends properties.credentials.certificate[*] false
Microsoft.ApiManagement/service/backends/protocol Microsoft.ApiManagement service/backends properties.protocol false
Microsoft.ApiManagement/service/backends/url Microsoft.ApiManagement service/backends properties.url false
Rule resource types IF (1)
Microsoft.ApiManagement/service/backends
Compliance
The following 1 compliance controls are associated with this Policy definition 'API Management calls to API backends should be authenticated' (c15dcc82-b93c-4dcb-9332-fbf121685b54)
Control Domain Control Name MetadataId Category Title Owner Requirements Description Info Policy#
Azure_Security_Benchmark_v3.0 IM-4 Azure_Security_Benchmark_v3.0_IM-4 Microsoft cloud security benchmark IM-4 Identity Management Authenticate server and services Shared **Security Principle:** Authenticate remote servers and services from your client side to ensure you are connecting to trusted server and services. The most common server authentication protocol is Transport Layer Security (TLS), where the client-side (often a browser or client device) verifies the server by verifying the server’s certificate was issued by a trusted certificate authority. Note: Mutual authentication can be used when both the server and the client authenticate one-another. **Azure Guidance:** Many Azure services support TLS authentication by default. For the services supporting TLS enable/disable switch by the user, ensure it's always enabled to support the server/service authentication. Your client application should also be designed to verify server/service identity (by verifying the server’s certificate issued by a trusted certificate authority) in the handshake stage. **Implementation and additional context:** Enforce Transport Layer Security (TLS) for a storage account: https://docs.microsoft.com/azure/storage/common/transport-layer-security-configure-minimum-version?tabs=portal#use-azure-policy-to-enforce-the-minimum-tls-version n/a link 4
Initiatives usage
Initiative DisplayName Initiative Id Initiative Category State Type
Microsoft cloud security benchmark 1f3afdf9-d0c9-4c3d-847f-89da613e70a8 Security Center GA BuiltIn
History
Date/Time (UTC ymd) (i) Change type Change detail
2022-07-08 16:32:07 change Patch (1.0.0 > 1.0.1)
2022-06-17 16:31:08 add c15dcc82-b93c-4dcb-9332-fbf121685b54
JSON compare
compare mode: version left: version right:
JSON
api-version=2021-06-01
EPAC