last sync: 2024-Jun-24 18:15:26 UTC

API Management should disable public network access to the service configuration endpoints

Azure BuiltIn Policy definition

Source Azure Portal
Display name API Management should disable public network access to the service configuration endpoints
Id df73bd95-24da-4a4f-96b9-4e8b94b402bd
Version 1.0.1
Details on versioning
Category API Management
Microsoft Learn
Description To improve the security of API Management services, restrict connectivity to service configuration endpoints, like direct access management API, Git configuration management endpoint, or self-hosted gateways configuration endpoint.
Mode Indexed
Type BuiltIn
Preview False
Deprecated False
Effect Default
AuditIfNotExists
Allowed
AuditIfNotExists, Disabled
RBAC role(s) none
Rule aliases IF (1)
Alias Namespace ResourceType Path PathIsDefault DefaultPath Modifiable
Microsoft.ApiManagement/service/sku.name Microsoft.ApiManagement service sku.name True False
THEN-ExistenceCondition (1)
Alias Namespace ResourceType Path PathIsDefault DefaultPath Modifiable
Microsoft.ApiManagement/service/tenant/enabled Microsoft.ApiManagement service/tenant properties.enabled True False
Rule resource types IF (1)
Microsoft.ApiManagement/service
Compliance
The following 1 compliance controls are associated with this Policy definition 'API Management should disable public network access to the service configuration endpoints' (df73bd95-24da-4a4f-96b9-4e8b94b402bd)
Control Domain Control Name MetadataId Category Title Owner Requirements Description Info Policy#
Azure_Security_Benchmark_v3.0 NS-2 Azure_Security_Benchmark_v3.0_NS-2 Microsoft cloud security benchmark NS-2 Network Security Secure cloud services with network controls Shared **Security Principle:** Secure cloud services by establishing a private access point for the resources. You should also disable or restrict access from public network when possible. **Azure Guidance:** Deploy private endpoints for all Azure resources that support the Private Link feature, to establish a private access point for the resources. You should also disable or restrict public network access to services where feasible. For certain services, you also have the option to deploy VNet integration for the service where you can restrict the VNET to establish a private access point for the service. **Implementation and additional context:** Understand Azure Private Link: https://docs.microsoft.com/azure/private-link/private-link-overview n/a link 39
Initiatives usage
Initiative DisplayName Initiative Id Initiative Category State Type
Microsoft cloud security benchmark 1f3afdf9-d0c9-4c3d-847f-89da613e70a8 Security Center GA BuiltIn
Public network access should be disabled for PaaS services Deny-PublicPaaSEndpoints Network GA ALZ
History
Date/Time (UTC ymd) (i) Change type Change detail
2023-03-31 17:44:15 change Patch (1.0.0 > 1.0.1)
2021-08-30 14:27:30 add df73bd95-24da-4a4f-96b9-4e8b94b402bd
JSON compare
compare mode: version left: version right:
JSON
api-version=2021-06-01
EPAC