last sync: 2021-Jul-23 16:37:57 UTC

Azure Policy definition

Logic Apps should be deployed into Integration Service Environment

Name Logic Apps should be deployed into Integration Service Environment
Azure Portal
Id dc595cb1-1cde-45f6-8faf-f88874e1c0e1
Version 1.0.0
details on versioning
Category Logic Apps
Microsoft docs
Description Deploying Logic Apps into Integration Service Environment in a virtual network unlocks advanced Logic Apps networking and security features and provides you with greater control over your network configuration. Learn more at: https://aka.ms/integration-service-environment. Deploying into Integration Service Environment also allows encryption with customer-managed keys which provides enhanced data protection by allowing you to manage your encryption keys. This is often to meet compliance requirements.
Mode Indexed
Type BuiltIn
Preview FALSE
Deprecated FALSE
Effect Default: Audit
Allowed: (Audit, Deny, Disabled)
Used RBAC Role none
History
Date/Time (UTC ymd) (i) Change type Change detail
2021-03-09 14:37:41 add dc595cb1-1cde-45f6-8faf-f88874e1c0e1
Used in Initiatives none
JSON
{
  "properties": {
    "displayName": "Logic Apps should be deployed into Integration Service Environment",
    "policyType": "BuiltIn",
    "mode": "Indexed",
    "description": "Deploying Logic Apps into Integration Service Environment in a virtual network unlocks advanced Logic Apps networking and security features and provides you with greater control over your network configuration. Learn more at: https://aka.ms/integration-service-environment. Deploying into Integration Service Environment also allows encryption with customer-managed keys which provides enhanced data protection by allowing you to manage your encryption keys. This is often to meet compliance requirements.",
    "metadata": {
      "version": "1.0.0",
      "category": "Logic Apps"
    },
    "parameters": {
      "effect": {
        "type": "String",
        "metadata": {
          "displayName": "Effect",
          "description": "Enable or disable the execution of the policy"
        },
        "allowedValues": [
          "Audit",
          "Deny",
          "Disabled"
        ],
        "defaultValue": "Audit"
      }
    },
    "policyRule": {
      "if": {
        "allOf": [
          {
            "field": "type",
            "equals": "Microsoft.Logic/workflows"
          },
          {
            "field": "Microsoft.Logic/workflows/integrationServiceEnvironment",
            "exists": "false"
          }
        ]
      },
      "then": {
      "effect": "[parameters('effect')]"
      }
    }
  },
  "id": "/providers/Microsoft.Authorization/policyDefinitions/dc595cb1-1cde-45f6-8faf-f88874e1c0e1",
  "type": "Microsoft.Authorization/policyDefinitions",
  "name": "dc595cb1-1cde-45f6-8faf-f88874e1c0e1"
}