last sync: 2024-Mar-01 17:50:27 UTC

Azure Machine Learning compute instances should be recreated to get the latest software updates

Azure BuiltIn Policy definition

Source Azure Portal
Display name Azure Machine Learning compute instances should be recreated to get the latest software updates
Id f110a506-2dcb-422e-bcea-d533fc8c35e2
Version 1.0.3
Details on versioning
Category Machine Learning
Microsoft Learn
Description Ensure Azure Machine Learning compute instances run on the latest available operating system. Security is improved and vulnerabilities reduced by running with the latest security patches. For more information, visit
Mode All
Type BuiltIn
Preview False
Deprecated False
Effect Fixed
RBAC role(s) none
Rule aliases IF (2)
Alias Namespace ResourceType DefaultPath Modifiable
Microsoft.MachineLearningServices/workspaces/computes/computeType Microsoft.MachineLearningServices workspaces/computes properties.computeType false
Microsoft.MachineLearningServices/workspaces/computes/osImageMetadata.isLatestOsImageVersion Microsoft.MachineLearningServices workspaces/computes false
Rule resource types IF (1)
The following 2 compliance controls are associated with this Policy definition 'Azure Machine Learning compute instances should be recreated to get the latest software updates' (f110a506-2dcb-422e-bcea-d533fc8c35e2)
Control Domain Control Name MetadataId Category Title Owner Requirements Description Info Policy#
Azure_Security_Benchmark_v3.0 PV-2 Azure_Security_Benchmark_v3.0_PV-2 Microsoft cloud security benchmark PV-2 Posture and Vulnerability Management Audit and enforce secure configurations Shared **Security Principle:** Continuously monitor and alert when there is a deviation from the defined configuration baseline. Enforce the desired configuration according to the baseline configuration by denying the non-compliant configuration or deploy a configuration. **Azure Guidance:** Use Microsoft Defender for Cloud to configure Azure Policy to audit and enforce configurations of your Azure resources. Use Azure Monitor to create alerts when there is a configuration deviation detected on the resources. Use Azure Policy [deny] and [deploy if not exist] rule to enforce secure configuration across Azure resources. For resource configuration audit and enforcement not supported by Azure Policy, you may need to write your own scripts or use third-party tooling to implement the configuration audit and enforcement. **Implementation and additional context:** Understand Azure Policy effects: Create and manage policies to enforce compliance: Get compliance data of Azure resources: n/a link 27
C.04.6 - Timelines C.04.6 - Timelines 404 not found n/a n/a 29
Initiatives usage
Initiative DisplayName Initiative Id Initiative Category State Type
Microsoft cloud security benchmark 1f3afdf9-d0c9-4c3d-847f-89da613e70a8 Security Center GA BuiltIn
NL BIO Cloud Theme 6ce73208-883e-490f-a2ac-44aac3b3687f Regulatory Compliance GA BuiltIn
Date/Time (UTC ymd) (i) Change type Change detail
2023-08-11 17:58:20 change Patch (1.0.2 > 1.0.3)
2023-05-22 17:43:18 change Patch (1.0.1 > 1.0.2)
2023-04-06 17:42:16 change Patch, old suffix: preview (1.0.0-preview > 1.0.1)
2023-01-13 18:06:06 add f110a506-2dcb-422e-bcea-d533fc8c35e2
JSON compare
compare mode: version left: version right: