Specify the number of days that a key should be active. Keys that are used for an extended period of time increase the probability that an attacker could compromise the key. As a good security practice, make sure that your keys have not been active longer than two years.
Use the filters above each column to filter and limit table data. Advanced searches can be performed by using the following operators: <, <=, >, >=, =, *, !, {, }, ||,&&, [empty], [nonempty], rgx: Learn more
Patch, old suffix: preview (1.0.0-preview > 1.0.1)
2020-10-16 12:27:50
add
c26e4b24-cf98-4c67-b48b-5a25c4c69eb9
JSON compare
compare mode:version left:version right:
1.0.0-preview → 1.0.1RENAMED
@@ -1,13 +1,12 @@
1
{
2
- "displayName": "[Preview]: Keys should not be active for longer than the specified number of days",
3
"policyType": "BuiltIn",
4
"mode": "Microsoft.KeyVault.Data",
5
"description": "Specify the number of days that a key should be active. Keys that are used for an extended period of time increase the probability that an attacker could compromise the key. As a good security practice, make sure that your keys have not been active longer than two years.",
6
"metadata": {
7
- "version": "1.0.0-preview",
8
- "category": "Key Vault",
9
- "preview": true
10
},
11
"parameters": {
12
"maximumValidityInDays": {
13
"type": "Integer",
1
{
2
+ "displayName": "Keys should not be active for longer than the specified number of days",
3
"policyType": "BuiltIn",
4
"mode": "Microsoft.KeyVault.Data",
5
"description": "Specify the number of days that a key should be active. Keys that are used for an extended period of time increase the probability that an attacker could compromise the key. As a good security practice, make sure that your keys have not been active longer than two years.",
displayName: "Keys should not be active for longer than the specified number of days",
policyType: "BuiltIn",
mode: "Microsoft.KeyVault.Data",
description: "Specify the number of days that a key should be active. Keys that are used for an extended period of time increase the probability that an attacker could compromise the key. As a good security practice, make sure that your keys have not been active longer than two years.",
description: "'Audit' allows a non-compliant resource to be created, but flags it as non-compliant. 'Deny' blocks the resource creation. 'Disable' turns off the policy."