last sync: 2022-May-24 16:30:29 UTC

Changes on Azure Policy definitions

Category Id DisplayName Description Effect Roles used Details (UTC ymd) (i)
SignalR2393d2cf-a342-44cd-a2e2-fe0188fd1234Azure SignalR Service should use private linkAzure Private Link lets you connect your virtual network to Azure services without a public IP address at the source or destination. The private link platform handles the connectivity between the consumer and services over the Azure backbone network. By mapping private endpoints to your Azure SignalR Service resource instead of the entire service, you'll reduce your data leakage risks. Learn more about private links at: https://aka.ms/asrs/privatelink. Default: Audit
Allowed: (Audit, Disabled)
2022-05-23 08:52:47
add: 2393d2cf-a342-44cd-a2e2-fe0188fd1234
Attestation5e7e928c-8693-4a23-9bf3-1c77b9a8fe97Azure Attestation providers should disable public network accessTo improve the security of Azure Attestation Service, ensure that it isn't exposed to the public internet and can only be accessed from a private endpoint. Disable the public network access property as described in aka.ms/azureattestation. This option disables access from any public address space outside the Azure IP range, and denies all logins that match IP or virtual network-based firewall rules. This reduces data leakage risks. Default: Audit
Allowed: (Audit, Deny, Disabled)
2022-05-23 08:52:47
add: 5e7e928c-8693-4a23-9bf3-1c77b9a8fe97
Managed Identity516187d4-ef64-4a1b-ad6b-a7348502976cAssign Built-In User-Assigned Managed Identity to Virtual Machine Scale SetsCreate and assign a built-in user-assigned managed identity or assign a pre-created user-assigned managed identity at scale to virtual machine scale sets. For more detailed documentation, visit aka.ms/managedidentitypolicy. Default: DeployIfNotExists
Allowed: (AuditIfNotExists, DeployIfNotExists, Disabled)
Contributor
User Access Administrator
2022-05-23 08:52:47
add: 516187d4-ef64-4a1b-ad6b-a7348502976c
Key Vaultad27588c-0198-4c84-81ef-08efd0274653[Preview]: Azure Key Vault Managed HSM Keys should have more than the specified number of days before expirationIf a key is too close to expiration, an organizational delay to rotate the key may result in an outage. Keys should be rotated at a specified number of days prior to expiration to provide sufficient time to react to a failure. Default: Audit
Allowed: (Audit, Deny, Disabled)
2022-05-23 08:52:47
add: ad27588c-0198-4c84-81ef-08efd0274653
Key Vault86810a98-8e91-4a44-8386-ec66d0de5d57[Preview]: Azure Key Vault Managed HSM keys using RSA cryptography should have a specified minimum key sizeSet the minimum allowed key size for use with your key vaults. Use of RSA keys with small key sizes is not a secure practice and doesn't meet many industry certification requirements. Default: Audit
Allowed: (Audit, Deny, Disabled)
2022-05-23 08:52:47
add: 86810a98-8e91-4a44-8386-ec66d0de5d57
Web PubSubeb907f70-7514-460d-92b3-a5ae93b4f917Azure Web PubSub Service should use private linkAzure Private Link lets you connect your virtual networks to Azure services without a public IP address at the source or destination. The private link platform handles the connectivity between the consumer and services over the Azure backbone network. By mapping private endpoints to your Azure Web PubSub Service, you can reduce data leakage risks. Learn more about private links at: https://aka.ms/awps/privatelink. Default: Audit
Allowed: (Audit, Disabled)
2022-05-23 08:52:47
add: eb907f70-7514-460d-92b3-a5ae93b4f917
Key Vault1d478a74-21ba-4b9f-9d8f-8e6fced0eec5[Preview]: Azure Key Vault Managed HSM keys should have an expiration dateCryptographic keys should have a defined expiration date and not be permanent. Keys that are valid forever provide a potential attacker with more time to compromise the key. It is a recommended security practice to set expiration dates on cryptographic keys. Default: Audit
Allowed: (Audit, Deny, Disabled)
2022-05-23 08:52:47
add: 1d478a74-21ba-4b9f-9d8f-8e6fced0eec5
Kubernetesb81f454c-eebb-4e4f-9dfe-dca060e8a8fd[Preview]: Kubernetes clusters should restrict creation of given resource typeGiven Kubernetes resource type should not be deployed in certain namespace. Default: Audit
Allowed: (Audit, Deny, Disabled)
2022-05-23 08:52:47
add: b81f454c-eebb-4e4f-9dfe-dca060e8a8fd
Key Vaulte58fd0c1-feac-4d12-92db-0a7e9421f53e[Preview]: Azure Key Vault Managed HSM keys using elliptic curve cryptography should have the specified curve namesKeys backed by elliptic curve cryptography can have different curve names. Some applications are only compatible with specific elliptic curve keys. Enforce the types of elliptic curve keys that are allowed to be created in your environment. Default: Audit
Allowed: (Audit, Deny, Disabled)
2022-05-23 08:52:47
add: e58fd0c1-feac-4d12-92db-0a7e9421f53e
Managed Identityd367bd60-64ca-4364-98ea-276775bddd94Assign Built-In User-Assigned Managed Identity to Virtual MachinesCreate and assign a built-in user-assigned managed identity or assign a pre-created user-assigned managed identity at scale to virtual machines. For more detailed documentation, visit aka.ms/managedidentitypolicy. Default: DeployIfNotExists
Allowed: (AuditIfNotExists, DeployIfNotExists, Disabled)
Contributor
User Access Administrator
2022-05-23 08:52:47
add: d367bd60-64ca-4364-98ea-276775bddd94
Machine Learning438c38d2-3772-465a-a9cc-7a6666a275ceAzure Machine Learning workspaces should disable public network accessDisabling public network access improves security by ensuring that the machine learning workspaces aren't exposed on the public internet. You can limit exposure of your workspaces by creating private endpoints instead. Learn more at: https://aka.ms/privateendpoints. Default: Audit
Allowed: (Audit, Deny, Disabled)
2022-05-23 08:52:47
change: Major (1.3.0 > 2.0.0)
SQLfdccbe47-f3e3-4213-ad5d-ea459b2fa077Public network access should be disabled for MariaDB serversDisable the public network access property to improve security and ensure your Azure Database for MariaDB can only be accessed from a private endpoint. This configuration strictly disables access from any public address space outside of Azure IP range, and denies all logins that match IP or virtual network-based firewall rules. Default: Audit
Allowed: (Audit, Deny, Disabled)
2022-05-16 16:31:13
change: Major (1.0.2 > 2.0.0)
Bot Service5e8168db-69e3-4beb-9822-57cb59202a9dBot Service should have public network access disabledBots should be set to 'isolated only' mode. This setting configures Bot Service channels that require traffic over the public internet to be disabled. Default: Audit
Allowed: (Audit, Deny, Disabled)
2022-05-16 16:31:13
add: 5e8168db-69e3-4beb-9822-57cb59202a9d
SignalRd9f1f9a9-8795-49f9-9e7b-e11db14caeb2Azure SignalR Service should enable diagnostic logsAudit enabling of diagnostic logs. This enables you to recreate activity trails to use for investigation purposes; when a security incident occurs or when your network is compromised Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2022-05-16 16:31:13
add: d9f1f9a9-8795-49f9-9e7b-e11db14caeb2
Security Center13ce0167-8ca6-4048-8e6b-f996402e3c1bConfigure machines to receive a vulnerability assessment providerAzure Defender includes vulnerability scanning for your machines at no extra cost. You don't need a Qualys license or even a Qualys account - everything's handled seamlessly inside Security Center. When you enable this policy, Azure Defender automatically deploys the Qualys vulnerability assessment provider to all supported machines that don't already have it installed. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Security Admin
2022-05-16 16:31:13
change: Major, old suffix: preview (3.1.0-preview > 4.0.0)
Internet of Thingsa222b93a-e6c2-4c01-817f-21e092455b2aConfigure Azure Device Update for IoT Hub accounts to use private DNS zonesAzure Private DNS provides a reliable, secure DNS service to manage and resolve domain names in a virtual network without the need to add a custom DNS solution. You can use private DNS zones to override the DNS resolution by using your own custom domain names for a private endpoint. This policy deploys a private DNS Zone for Device Updatefor IoT Hub private endpoints. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Network Contributor
Contributor
2022-05-16 16:31:13
add: a222b93a-e6c2-4c01-817f-21e092455b2a
Container App0e80e269-43a4-4ae9-b5bc-178126b8a5cbContainer Apps should only be accessible over HTTPSUse of HTTPS ensures server/service authentication and protects data in transit from network layer eavesdropping attacks. Disabling 'allowInsecure' will result in the automatic redirection of requests from HTTP to HTTPS connections for container apps. Default: Audit
Allowed: (Audit, Deny, Disabled)
2022-05-16 16:31:13
add: 0e80e269-43a4-4ae9-b5bc-178126b8a5cb
Container App7c9f3fbb-739d-4844-8e42-97e3be6450e0Container App should configure with volume mountEnforce the use of volume mounts for Container Apps to ensure availability of persistent storage capacity. Default: Audit
Allowed: (Audit, Deny, Disabled)
2022-05-16 16:31:13
add: 7c9f3fbb-739d-4844-8e42-97e3be6450e0
Web PubSubee8a7be2-e9b5-47b9-9d37-d9b141ea78a4Azure Web PubSub Service should enable diagnostic logsAudit enabling of diagnostic logs. This enables you to recreate activity trails to use for investigation purposes; when a security incident occurs or when your network is compromised Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2022-05-16 16:31:13
add: ee8a7be2-e9b5-47b9-9d37-d9b141ea78a4
Internet of Things27573ebe-7ef3-4472-a8e1-33aef9ea65c5Configure Azure Device Update for IoT Hub accounts to disable public network accessDisabling the public network access property improves security by ensuring your Device Update for IoT Hub can only be accessed from a private endpoint. This policy disables public network access on Device Update for IoT Hub resources. Default: Modify
Allowed: (Modify, Disabled)
Contributor
2022-05-16 16:31:13
add: 27573ebe-7ef3-4472-a8e1-33aef9ea65c5
Container App2b585559-a78e-4cc4-b1aa-fb169d2f6b96Authentication should be enabled on Container AppsContainer Apps Authentication is a feature that can prevent anonymous HTTP requests from reaching the Container App, or authenticate those that have tokens before they reach the Container App Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2022-05-16 16:31:13
add: 2b585559-a78e-4cc4-b1aa-fb169d2f6b96
SQLb52376f7-9612-48a1-81cd-1ffe4b61032cPublic network access should be disabled for PostgreSQL serversDisable the public network access property to improve security and ensure your Azure Database for PostgreSQL can only be accessed from a private endpoint. This configuration disables access from any public address space outside of Azure IP range, and denies all logins that match IP or virtual network-based firewall rules. Default: Audit
Allowed: (Audit, Deny, Disabled)
2022-05-16 16:31:13
change: Major (1.0.2 > 2.0.0)
Container App783ea2a8-b8fd-46be-896a-9ae79643a0b1 Container Apps should disable external network accessDisable external network access to your Container Apps by enforcing internal-only ingress. This will ensure inbound communication for Container Apps is limited to callers within the Container Apps environment. Default: Audit
Allowed: (Audit, Deny, Disabled)
2022-05-16 16:31:13
add: 783ea2a8-b8fd-46be-896a-9ae79643a0b1
Container Appb874ab2d-72dd-47f1-8cb5-4a306478a4e7Managed Identity should be enabled for Container AppsEnforcing managed identity ensures Container Apps can securely authenticate to any resource that supports Azure AD authentication Default: Audit
Allowed: (Audit, Deny, Disabled)
2022-05-16 16:31:13
add: b874ab2d-72dd-47f1-8cb5-4a306478a4e7
Internet of Things510ec8b2-cb9e-461d-b7f3-6b8678c31182Public network access for Azure Device Update for IoT Hub accounts should be disabledDisabling the public network access property improves security by ensuring your Azure Device Update for IoT Hub accounts can only be accessed from a private endpoint. Default: Audit
Allowed: (Audit, Deny, Disabled)
2022-05-16 16:31:13
add: 510ec8b2-cb9e-461d-b7f3-6b8678c31182
SQLd9844e8a-1437-4aeb-a32c-0c992f056095Public network access should be disabled for MySQL serversDisable the public network access property to improve security and ensure your Azure Database for MySQL can only be accessed from a private endpoint. This configuration strictly disables access from any public address space outside of Azure IP range, and denies all logins that match IP or virtual network-based firewall rules. Default: Audit
Allowed: (Audit, Deny, Disabled)
2022-05-16 16:31:13
change: Major (1.0.2 > 2.0.0)
Container Appd074ddf8-01a5-4b5e-a2b8-964aed452c0aContainer Apps environment should disable public network accessDisable public network access to improve security by exposing the Container Apps environment through an internal load balancer. This removes the need for a public IP address and prevents internet access to all Container Apps within the environment. Default: Audit
Allowed: (Audit, Deny, Disabled)
2022-05-16 16:31:13
add: d074ddf8-01a5-4b5e-a2b8-964aed452c0a
Internet of Things5b9d063f-c5fd-4750-a489-1258d1fefcbfConfigure Azure Device Update for IoT Hub accounts with private endpointA private endpoint is a private IP address allocated inside a customer-owned virtual network via which an Azure resource is reachable. This policy deploys a private endpoint for your Device Update for IoT hub to allow services inside your virtual network to reach this resource without requiring traffic to be sent to Device Update for IoT Hub's public endpoint. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Network Contributor
Contributor
2022-05-16 16:31:13
add: 5b9d063f-c5fd-4750-a489-1258d1fefcbf
Monitoring1afdc4b6-581a-45fb-b630-f1e6051e3e7aLinux virtual machines should have Azure Monitor Agent installedLinux virtual machines should be monitored and secured through the deployed Azure Monitor Agent. The Azure Monitor Agent collects telemetry data from the guest OS. This policy will audit virtual machines with supported OS images in supported regions. Learn more: https://aka.ms/AMAOverview. Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2022-05-06 16:29:23
change: Major (1.0.0 > 2.0.0)
Monitoringa4034bc6-ae50-406d-bf76-50f4ee5a7811Configure Linux virtual machines to run Azure Monitor Agent with system-assigned managed identity-based authenticationAutomate the deployment of Azure Monitor Agent extension on your Linux virtual machines for collecting telemetry data from the guest OS. This policy will install the extension if the OS and region are supported and system-assigned managed identity is enabled, and skip install otherwise. Learn more: https://aka.ms/AMAOverview. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Virtual Machine Contributor
2022-05-06 16:29:23
change: Major (1.1.1 > 2.0.0)
Monitoring56a3e4f8-649b-4fac-887e-5564d11e8d3aConfigure Linux virtual machine scale sets to run Azure Monitor Agent with system-assigned managed identity-based authenticationAutomate the deployment of Azure Monitor Agent extension on your Linux virtual machine scale sets for collecting telemetry data from the guest OS. This policy will install the extension if the OS and region are supported and system-assigned managed identity is enabled, and skip install otherwise. Learn more: https://aka.ms/AMAOverview. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Virtual Machine Contributor
2022-05-06 16:29:23
change: Major (1.0.1 > 2.0.0)
Security Center6646a0bd-e110-40ca-bb97-84fcee63c414[Deprecated]: Service principals should be used to protect your subscriptions instead of management certificates[Deprecated: With Cloud Services (classic) retiring (see https://azure.microsoft.com/updates/cloud-services-retirement-announcement), there will no longer be a need for this assessment as management certificates will be obsolete.] Management certificates allow anyone who authenticates with them to manage the subscription(s) they are associated with. To manage subscriptions more securely, use of service principals with Resource Manager is recommended to limit the impact of a certificate compromise. Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2022-05-06 16:29:23
change: Version remains equal, new suffix: deprecated (1.0.0 > 1.0.0-deprecated)
Security Center13ce0167-8ca6-4048-8e6b-f996402e3c1bConfigure machines to receive a vulnerability assessment providerAzure Defender includes vulnerability scanning for your machines at no extra cost. You don't need a Qualys license or even a Qualys account - everything's handled seamlessly inside Security Center. When you enable this policy, Azure Defender automatically deploys the Qualys vulnerability assessment provider to all supported machines that don't already have it installed. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Security Admin
2022-05-06 16:29:23
change: Minor, suffix remains equal (3.0.0-preview > 3.1.0-preview)
Monitoring58e891b9-ce13-4ac3-86e4-ac3e1f20cb07Configure Linux Virtual Machines to be associated with a Data Collection RuleDeploy Association to link Linux virtual machines to the specified Data Collection Rule. The list of locations and OS images are updated over time as support is increased. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Monitoring Contributor
Log Analytics Contributor
2022-05-06 16:29:23
change: Major (1.0.1 > 2.0.0)
Kubernetesda6e2401-19da-4532-9141-fb8fbde08431Azure Kubernetes Service Clusters should use managed identitiesUse managed identities to wrap around service principals, simplify cluster management and avoid the complexity required to managed service principals. Learn more at: https://aka.ms/aks-update-managed-identities Default: Audit
Allowed: (Audit, Disabled)
2022-05-06 16:29:23
add: da6e2401-19da-4532-9141-fb8fbde08431
Guest Configuration50c52fc9-cb21-4d99-9031-d6a0c613361c[Preview]: Windows machines should meet STIG compliance requirements for Azure computeRequires that prerequisites are deployed to the policy assignment scope. For details, visit https://aka.ms/gcpol. Machines are non-compliant if the machine is not configured correctly for one of the recommendations in STIG compliance requirements for Azure compute. DISA (Defense Information Systems Agency) provides technical guides STIG (Security Technical Implementation Guide) to secure compute OS as required by Department of Defense (DoD). For more details, https://public.cyber.mil/stigs/. Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2022-05-06 16:29:23
add: 50c52fc9-cb21-4d99-9031-d6a0c613361c
Machine Learning438c38d2-3772-465a-a9cc-7a6666a275ceAzure Machine Learning workspaces should disable public network accessDisabling public network access improves security by ensuring that the machine learning workspaces aren't exposed on the public internet. You can limit exposure of your workspaces by creating private endpoints instead. Learn more at: https://aka.ms/privateendpoints. Default: Audit
Allowed: (Audit, Deny, Disabled)
2022-05-06 16:29:23
change: Minor (1.2.0 > 1.3.0)
Monitoring050a90d5-7cce-483f-8f6c-0df462036ddaConfigure Linux Virtual Machine Scale Sets to be associated with a Data Collection RuleDeploy Association to link Linux virtual machine scale sets to the specified Data Collection Rule. The list of locations and OS images are updated over time as support is increased. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Monitoring Contributor
Log Analytics Contributor
2022-05-06 16:29:23
change: Major (1.0.1 > 2.0.0)
Monitoring32ade945-311e-4249-b8a4-a549924234d7Linux virtual machine scale sets should have Azure Monitor Agent installedLinux virtual machine scale sets should be monitored and secured through the deployed Azure Monitor Agent. The Azure Monitor Agent collects telemetry data from the guest OS. This policy will audit virtual machine scale sets with supported OS images in supported regions. Learn more: https://aka.ms/AMAOverview. Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2022-05-06 16:29:23
change: Major (1.0.0 > 2.0.0)
Monitoring59c3d93f-900b-4827-a8bd-562e7b956e7cConfigure Linux virtual machine scale sets to run Azure Monitor Agent with user-assigned managed identity-based authenticationAutomate the deployment of Azure Monitor Agent extension on your Linux virtual machine scale sets for collecting telemetry data from the guest OS. This policy will install the extension and configure it to use the specified user-assigned managed identity if the OS and region are supported, and skip install otherwise. Learn more: https://aka.ms/AMAOverview. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Virtual Machine Contributor
2022-05-06 16:29:23
change: Major (1.0.0 > 2.0.0)
Monitoringae8a10e6-19d6-44a3-a02d-a2bdfc707742Configure Linux virtual machines to run Azure Monitor Agent with user-assigned managed identity-based authenticationAutomate the deployment of Azure Monitor Agent extension on your Linux virtual machines for collecting telemetry data from the guest OS. This policy will install the extension and configure it to use the specified user-assigned managed identity if the OS and region are supported, and skip install otherwise. Learn more: https://aka.ms/AMAOverview. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Virtual Machine Contributor
2022-05-06 16:29:23
change: Major (1.0.0 > 2.0.0)
Container Apps8b346db6-85af-419b-8557-92cee2c0f9bbContainer App environments should use network injectionContainer App environment should use virtual network injection. It isolates Container Apps from the Internet, unlocks advanced Container Apps networking and security features, and provides you with greater control over your network security configuration. Default: Audit
Allowed: (Audit, Disabled, Deny)
2022-05-06 16:29:23
add: 8b346db6-85af-419b-8557-92cee2c0f9bb
Monitoring2ea82cdd-f2e8-4500-af75-67a2e084ca74Configure Linux Machines to be associated with a Data Collection RuleDeploy Association to link Linux virtual machines, virtual machine scale sets, and Arc machines to the specified Data Collection Rule. The list of locations and OS images are updated over time as support is increased. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Monitoring Contributor
Log Analytics Contributor
2022-05-06 16:29:23
change: Major (3.0.1 > 4.0.0)
SQL86a912f6-9a06-4e26-b447-11b16ba8659fDeploy SQL DB transparent data encryptionEnables transparent data encryption on SQL databases Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
SQL DB Contributor
2022-05-06 16:29:23
change: Minor (2.0.0 > 2.1.0)
Backup09ce66bc-1220-4153-8104-e3f51c936913Configure backup on virtual machines without a given tag to an existing recovery services vault in the same locationEnforce backup for all virtual machines by backing them up to an existing central recovery services vault in the same location and subscription as the virtual machine. Doing this is useful when there is a central team in your organization managing backups for all resources in a subscription. You can optionally exclude virtual machines containing a specified tag to control the scope of assignment. See https://aka.ms/AzureVMCentralBackupExcludeTag. Default: DeployIfNotExists
Allowed: (auditIfNotExists, AuditIfNotExists, deployIfNotExists, DeployIfNotExists, disabled, Disabled)
Virtual Machine Contributor
Backup Contributor
2022-04-29 18:06:01
change: Major (7.1.0 > 8.0.0)
Update Management Center59efceea-0c96-497e-a4a1-4eb2290dac15[Preview]: Configure periodic checking for missing system updates on azure virtual machinesConfigure auto-assessment (every 24 hours) for OS updates on native Azure virtual machines. You can control the scope of assignment according to machine subscription, resource group, location or tag. Learn more about this for Windows: https://aka.ms/computevm-windowspatchassessmentmode, for Linux: https://aka.ms/computevm-linuxpatchassessmentmode. Fixed: modifyVirtual Machine Contributor
2022-04-29 18:06:01
change: Major, suffix remains equal (1.0.0-preview > 2.0.0-preview)
Kubernetesf85eb0dd-92ee-40e9-8a76-db25a507d6d3Kubernetes cluster containers should only use allowed ProcMountTypePod containers can only use allowed ProcMountTypes in a Kubernetes cluster. This recommendation is part of Pod Security Policies which are intended to improve the security of your Kubernetes environments. This policy is generally available for Kubernetes Service (AKS), and preview for AKS Engine and Azure Arc enabled Kubernetes. For more information, see https://aka.ms/kubepolicydoc. Default: Audit
Allowed: (audit, Audit, deny, Deny, disabled, Disabled)
2022-04-29 18:06:01
change: Minor (6.2.0 > 6.3.0)
Kubernetes1c6e92c9-99f0-4e55-9cf2-0c234dc48f99Kubernetes clusters should not allow container privilege escalationDo not allow containers to run with privilege escalation to root in a Kubernetes cluster. This recommendation is part of CIS 5.2.5 which is intended to improve the security of your Kubernetes environments. This policy is generally available for Kubernetes Service (AKS), and preview for AKS Engine and Azure Arc enabled Kubernetes. For more information, see https://aka.ms/kubepolicydoc. Default: Audit
Allowed: (audit, Audit, deny, Deny, disabled, Disabled)
2022-04-29 18:06:01
change: Minor (4.1.0 > 4.2.0)
Kubernetesdf49d893-a74c-421d-bc95-c663042e5b80Kubernetes cluster containers should run with a read only root file systemRun containers with a read only root file system to protect from changes at run-time with malicious binaries being added to PATH in a Kubernetes cluster. This policy is generally available for Kubernetes Service (AKS), and preview for AKS Engine and Azure Arc enabled Kubernetes. For more information, see https://aka.ms/kubepolicydoc. Default: Audit
Allowed: (audit, Audit, deny, Deny, disabled, Disabled)
2022-04-29 18:06:01
change: Minor (4.1.0 > 4.2.0)
Kubernetesb1a9997f-2883-4f12-bdff-2280f99b5915Ensure cluster containers have readiness or liveness probes configuredThis policy enforces that all pods have a readiness and/or liveness probes configured. Probe Types can be any of tcpSocket, httpGet and exec. This policy is generally available for Kubernetes Service (AKS), and preview for AKS Engine and Azure Arc enabled Kubernetes. For instructions on using this policy, visit https://aka.ms/kubepolicydoc. Default: Audit
Allowed: (Audit, Deny, Disabled)
2022-04-29 18:06:01
change: Minor (1.0.0 > 1.1.0)
Kubernetes16697877-1118-4fb1-9b65-9898ec2509ecKubernetes cluster pods should only use allowed volume typesPods can only use allowed volume types in a Kubernetes cluster. This recommendation is part of Pod Security Policies which are intended to improve the security of your Kubernetes environments. This policy is generally available for Kubernetes Service (AKS), and preview for AKS Engine and Azure Arc enabled Kubernetes. For more information, see https://aka.ms/kubepolicydoc. Default: Audit
Allowed: (audit, Audit, deny, Deny, disabled, Disabled)
2022-04-29 18:06:01
change: Minor (3.1.0 > 3.2.0)
Managed Labse8a5a3eb-1ab6-4657-a701-7ae432cf14e1Lab Services should not allow template virtual machines for labsThis policy prevents creation and customization of a template virtual machines for labs managed through Lab Services. Default: Audit
Allowed: (Audit, Deny, Disabled)
2022-04-29 18:06:01
add: e8a5a3eb-1ab6-4657-a701-7ae432cf14e1
Backup98d0b9f8-fd90-49c9-88e2-d3baf3b0dd86Configure backup on virtual machines without a given tag to a new recovery services vault with a default policyEnforce backup for all virtual machines by deploying a recovery services vault in the same location and resource group as the virtual machine. Doing this is useful when different application teams in your organization are allocated separate resource groups and need to manage their own backups and restores. You can optionally exclude virtual machines containing a specified tag to control the scope of assignment. See https://aka.ms/AzureVMAppCentricBackupExcludeTag. Default: DeployIfNotExists
Allowed: (auditIfNotExists, AuditIfNotExists, deployIfNotExists, DeployIfNotExists, disabled, Disabled)
Virtual Machine Contributor
Backup Contributor
2022-04-29 18:06:01
change: Major (7.1.0 > 8.0.0)
Update Management Centerbfea026e-043f-4ff4-9d1b-bf301ca7ff46[Preview]: Configure periodic checking for missing system updates on azure Arc-enabled serversConfigure auto-assessment (every 24 hours) for OS updates on Azure Arc-enabled servers. You can control the scope of assignment according to machine subscription, resource group, location or tag. Learn more about this for Windows: https://aka.ms/computevm-windowspatchassessmentmode, for Linux: https://aka.ms/computevm-linuxpatchassessmentmode. Fixed: modifyAzure Connected Machine Resource Administrator
2022-04-29 18:06:01
change: Minor, suffix remains equal (1.0.0-preview > 1.1.0-preview)
Backup83644c87-93dd-49fe-bf9f-6aff8fd0834eConfigure backup on virtual machines with a given tag to a new recovery services vault with a default policyEnforce backup for all virtual machines by deploying a recovery services vault in the same location and resource group as the virtual machine. Doing this is useful when different application teams in your organization are allocated separate resource groups and need to manage their own backups and restores. You can optionally include virtual machines containing a specified tag to control the scope of assignment. See https://aka.ms/AzureVMAppCentricBackupIncludeTag. Default: DeployIfNotExists
Allowed: (auditIfNotExists, AuditIfNotExists, deployIfNotExists, DeployIfNotExists, disabled, Disabled)
Virtual Machine Contributor
Backup Contributor
2022-04-29 18:06:01
change: Major (7.1.0 > 8.0.0)
Kubernetes47a1ee2f-2a2a-4576-bf2a-e0e36709c2b8Kubernetes cluster containers should not share host process ID or host IPC namespaceBlock pod containers from sharing the host process ID namespace and host IPC namespace in a Kubernetes cluster. This recommendation is part of CIS 5.2.2 and CIS 5.2.3 which are intended to improve the security of your Kubernetes environments. This policy is generally available for Kubernetes Service (AKS), and preview for AKS Engine and Azure Arc enabled Kubernetes. For more information, see https://aka.ms/kubepolicydoc. Default: Audit
Allowed: (audit, Audit, deny, Deny, disabled, Disabled)
2022-04-29 18:06:01
change: Minor (3.1.0 > 3.2.0)
Kubernetes82985f06-dc18-4a48-bc1c-b9f4f0098cfeKubernetes cluster pods should only use approved host network and port rangeRestrict pod access to the host network and the allowable host port range in a Kubernetes cluster. This recommendation is part of CIS 5.2.4 which is intended to improve the security of your Kubernetes environments. This policy is generally available for Kubernetes Service (AKS), and preview for AKS Engine and Azure Arc enabled Kubernetes. For more information, see https://aka.ms/kubepolicydoc. Default: Audit
Allowed: (audit, Audit, deny, Deny, disabled, Disabled)
2022-04-29 18:06:01
change: Minor (4.1.0 > 4.2.0)
Synapse8b5c654c-fb07-471b-aa8f-15fea733f140Configure Azure Synapse Workspace Dedicated SQL minimum TLS versionCustomers can raise or lower the minimal TLS version using the API, for both new Synapse workspaces or existing workspaces. So users who need to use a lower client version in the workspaces can connect while users who has security requirement can raise the minimum TLS version. Learn more at: https://docs.microsoft.com/azure/synapse-analytics/security/connectivity-settings. Default: Modify
Allowed: (Modify, Disabled)
Contributor
2022-04-29 18:06:01
add: 8b5c654c-fb07-471b-aa8f-15fea733f140
Managed Labs3e13d504-9083-4912-b935-39a085db2249Lab Services should restrict allowed virtual machine SKU sizesThis policy enables you to restrict certain Compute VM SKUs for labs managed through Lab Services. This will restrict certain virtual machine sizes. Default: Audit
Allowed: (Audit, Deny, Disabled)
2022-04-29 18:06:01
add: 3e13d504-9083-4912-b935-39a085db2249
SignalR53503636-bcc9-4748-9663-5348217f160f[Deprecated]: Azure SignalR Service should use private linkThe policy is deprecated. Please use /providers/Microsoft.Authorization/policyDefinitions/2393d2cf-a342-44cd-a2e2-fe0188fd1234 instead. Default: Audit
Allowed: (Audit, Deny, Disabled)
2022-04-29 18:06:01
change: Version remains equal, new suffix: deprecated (1.0.1 > 1.0.1-deprecated)
Backup345fa903-145c-4fe1-8bcd-93ec2adccde8Configure backup on virtual machines with a given tag to an existing recovery services vault in the same locationEnforce backup for all virtual machines by backing them up to an existing central recovery services vault in the same location and subscription as the virtual machine. Doing this is useful when there is a central team in your organization managing backups for all resources in a subscription. You can optionally include virtual machines containing a specified tag to control the scope of assignment. See https://aka.ms/AzureVMCentralBackupIncludeTag. Default: DeployIfNotExists
Allowed: (auditIfNotExists, AuditIfNotExists, deployIfNotExists, DeployIfNotExists, disabled, Disabled)
Virtual Machine Contributor
Backup Contributor
2022-04-29 18:06:01
change: Major (7.1.0 > 8.0.0)
Kubernetese345eecc-fa47-480f-9e88-67dcc122b164Kubernetes cluster containers CPU and memory resource limits should not exceed the specified limitsEnforce container CPU and memory resource limits to prevent resource exhaustion attacks in a Kubernetes cluster. This policy is generally available for Kubernetes Service (AKS), and preview for AKS Engine and Azure Arc enabled Kubernetes. For more information, see https://aka.ms/kubepolicydoc. Default: Deny
Allowed: (audit, Audit, deny, Deny, disabled, Disabled)
2022-04-29 18:06:01
change: Minor (7.1.0 > 7.2.0)
Lab Servicesa6e9cf2d-7d76-440e-b795-8da246bd3aabLab Services should enable all options for auto shutdownThis policy provides helps with cost management by enforcing all automatic shutdown options are enabled for a lab. Default: Audit
Allowed: (Audit, Deny, Disabled)
2022-04-29 18:06:01
add: a6e9cf2d-7d76-440e-b795-8da246bd3aab
Kubernetes975ce327-682c-4f2e-aa46-b9598289b86cKubernetes cluster containers should only use allowed seccomp profilesPod containers can only use allowed seccomp profiles in a Kubernetes cluster. This recommendation is part of Pod Security Policies which are intended to improve the security of your Kubernetes environments. This policy is generally available for Kubernetes Service (AKS), and preview for AKS Engine and Azure Arc enabled Kubernetes. For more information, see https://aka.ms/kubepolicydoc. Default: Audit
Allowed: (audit, Audit, deny, Deny, disabled, Disabled)
2022-04-29 18:06:01
change: Minor (4.1.0 > 4.2.0)
Kubernetesa2abc456-f0ae-464b-bd3a-07a3cdbd7fb1Kubernetes cluster windows containers should not overcommit cpu and memoryWindows container resource requests should be less or equal to the resource limit or unspecified to avoid overcommit. If Windows memory is over-provisioned it will process pages in disk - which can slow down performance - instead of terminating the container with out-of-memory Default: Audit
Allowed: (Audit, Deny, Disabled)
2022-04-29 18:06:01
add: a2abc456-f0ae-464b-bd3a-07a3cdbd7fb1
Kubernetes6c66c325-74c8-42fd-a286-a74b0e2939d8Deploy - Configure diagnostic settings for Azure Kubernetes Service to Log Analytics workspaceDeploys the diagnostic settings for Azure Kubernetes Service to stream resource logs to a Log Analytics workspace. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Monitoring Contributor
Log Analytics Contributor
2022-04-29 18:06:01
change: Major (1.0.0 > 2.0.0)
Kubernetes098fc59e-46c7-4d99-9b16-64990e543d75Kubernetes cluster pod hostPath volumes should only use allowed host pathsLimit pod HostPath volume mounts to the allowed host paths in a Kubernetes Cluster. This recommendation is part of Pod Security Policies which are intended to improve the security of your Kubernetes environments. This policy is generally available for Kubernetes Service (AKS), and preview for AKS Engine and Azure Arc enabled Kubernetes. For more information, see https://aka.ms/kubepolicydoc. Default: Audit
Allowed: (audit, Audit, deny, Deny, disabled, Disabled)
2022-04-29 18:06:01
change: Minor (4.1.0 > 4.2.0)
Kubernetes8dfab9c4-fe7b-49ad-85e4-1e9be085358f[Preview]: Azure Arc enabled Kubernetes clusters should have Microsoft Defender for Cloud extension installedMicrosoft Defender for Cloud extension for Azure Arc provides threat protection for your Arc enabled Kubernetes clusters. The extension collects data from all nodes in the cluster and sends it to the Azure Defender for Kubernetes backend in the cloud for further analysis. Learn more in https://docs.microsoft.com/azure/defender-for-cloud/defender-for-containers-enable?pivots=defender-for-container-arc. Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2022-04-29 18:06:01
change: Patch, suffix remains equal (5.0.0-preview > 5.0.1-preview)
Kubernetesa27c700f-8a22-44ec-961c-41625264370bKubernetes clusters should not use specific security capabilitiesPrevent specific security capabilities in Kubernetes clusters to prevent ungranted privileges on the Pod resource. For more information, see https://aka.ms/kubepolicydoc. Default: Audit
Allowed: (audit, Audit, deny, Deny, disabled, Disabled)
2022-04-29 18:06:01
change: Minor (3.1.0 > 3.2.0)
Managed Labs0fd9915e-cab3-4f24-b200-6e20e1aa276aLab Services should require non-admin user for labsThis policy requires non-admin user accounts to be created for the labs managed through lab-services. Default: Audit
Allowed: (Audit, Deny, Disabled)
2022-04-29 18:06:01
add: 0fd9915e-cab3-4f24-b200-6e20e1aa276a
Kubernetesd2e7ea85-6b44-4317-a0be-1b951587f626Kubernetes clusters should not grant CAP_SYS_ADMIN security capabilitiesTo reduce the attack surface of your containers, restrict CAP_SYS_ADMIN Linux capabilities. For more information, see https://aka.ms/kubepolicydoc. Default: Audit
Allowed: (audit, Audit, deny, Deny, disabled, Disabled)
2022-04-29 18:06:01
change: Minor (3.2.0 > 3.3.0)
Kubernetes95edb821-ddaf-4404-9732-666045e056b4Kubernetes cluster should not allow privileged containersDo not allow privileged containers creation in a Kubernetes cluster. This recommendation is part of CIS 5.2.1 which is intended to improve the security of your Kubernetes environments. This policy is generally available for Kubernetes Service (AKS), and preview for AKS Engine and Azure Arc enabled Kubernetes. For more information, see https://aka.ms/kubepolicydoc. Default: Deny
Allowed: (audit, Audit, deny, Deny, disabled, Disabled)
2022-04-29 18:06:01
change: Minor (7.1.0 > 7.2.0)
Kubernetes50c83470-d2f0-4dda-a716-1938a4825f62Kubernetes cluster containers should only use allowed pull policyRestrict containers' pull policy to enforce containers to use only allowed images on deployments Default: Audit
Allowed: (Audit, Deny, Disabled)
2022-04-29 18:06:01
change: Minor (1.0.0 > 1.1.0)
Kubernetesf06ddb64-5fa3-4b77-b166-acb36f7f6042Kubernetes cluster pods and containers should only run with approved user and group IDsControl the user, primary group, supplemental group and file system group IDs that pods and containers can use to run in a Kubernetes Cluster. This recommendation is part of Pod Security Policies which are intended to improve the security of your Kubernetes environments. This policy is generally available for Kubernetes Service (AKS), and preview for AKS Engine and Azure Arc enabled Kubernetes. For more information, see https://aka.ms/kubepolicydoc. Default: Audit
Allowed: (audit, Audit, deny, Deny, disabled, Disabled)
2022-04-29 18:06:01
change: Minor (4.1.0 > 4.2.0)
Kubernetesc26596ff-4d70-4e6a-9a30-c2506bd2f80cKubernetes cluster containers should only use allowed capabilitiesRestrict the capabilities to reduce the attack surface of containers in a Kubernetes cluster. This recommendation is part of CIS 5.2.8 and CIS 5.2.9 which are intended to improve the security of your Kubernetes environments. This policy is generally available for Kubernetes Service (AKS), and preview for AKS Engine and Azure Arc enabled Kubernetes. For more information, see https://aka.ms/kubepolicydoc. Default: Audit
Allowed: (audit, Audit, deny, Deny, disabled, Disabled)
2022-04-29 18:06:01
change: Minor (4.1.0 > 4.2.0)
Kubernetes708b60a6-d253-4fe0-9114-4be4c00f012c[Preview]: Configure Azure Arc enabled Kubernetes clusters to install Microsoft Defender for Cloud extensionMicrosoft Defender for Cloud extension for Azure Arc provides threat protection for your Arc enabled Kubernetes clusters. The extension collects data from all nodes in the cluster and sends it to the Azure Defender for Kubernetes backend in the cloud for further analysis. Learn more in https://docs.microsoft.com/azure/defender-for-cloud/defender-for-containers-enable?pivots=defender-for-container-arc. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Contributor
Log Analytics Contributor
2022-04-29 18:06:01
change: Major, suffix remains equal (5.1.0-preview > 6.0.0-preview)
Synapsecb3738a6-82a2-4a18-b87b-15217b9deff4Azure Synapse Workspace SQL Server should be running TLS version 1.2 or newerSetting TLS version to 1.2 or newer improves security by ensuring your Azure Synapse workspace SQL server can only be accessed from clients using TLS 1.2 or newer. Using versions of TLS less than 1.2 is not recommended since they have well documented security vulnerabilities. Default: Audit
Allowed: (Audit, Deny, Disabled)
2022-04-29 18:06:01
add: cb3738a6-82a2-4a18-b87b-15217b9deff4
Kubernetes46592696-4c7b-4bf3-9e45-6c2763bdc0a6Kubernetes cluster pods should use specified labelsUse specified labels to identify the pods in a Kubernetes cluster. This policy is generally available for Kubernetes Service (AKS), and preview for AKS Engine and Azure Arc enabled Kubernetes. For more information, see https://aka.ms/kubepolicydoc. Default: Deny
Allowed: (audit, Audit, deny, Deny, disabled, Disabled)
2022-04-29 18:06:01
change: Minor (6.1.0 > 6.2.0)
Kubernetes511f5417-5d12-434d-ab2e-816901e72a5eKubernetes cluster containers should only use allowed AppArmor profilesContainers should only use allowed AppArmor profiles in a Kubernetes cluster. This recommendation is part of Pod Security Policies which are intended to improve the security of your Kubernetes environments. This policy is generally available for Kubernetes Service (AKS), and preview for AKS Engine and Azure Arc enabled Kubernetes. For more information, see https://aka.ms/kubepolicydoc. Default: Audit
Allowed: (audit, Audit, deny, Deny, disabled, Disabled)
2022-04-29 18:06:01
change: Minor (4.1.0 > 4.2.0)
Kubernetese1e6c427-07d9-46ab-9689-bfa85431e636Kubernetes cluster pods and containers should only use allowed SELinux optionsPods and containers should only use allowed SELinux options in a Kubernetes cluster. This recommendation is part of Pod Security Policies which are intended to improve the security of your Kubernetes environments. This policy is generally available for Kubernetes Service (AKS), and preview for AKS Engine and Azure Arc enabled Kubernetes. For more information, see https://aka.ms/kubepolicydoc. Default: Audit
Allowed: (audit, Audit, deny, Deny, disabled, Disabled)
2022-04-29 18:06:01
change: Minor (5.1.0 > 5.2.0)
Web PubSub52630df9-ca7e-442b-853b-c6ce548b31a2[Deprecated]: Azure Web PubSub Service should use private linkThe policy is deprecated. Please use /providers/Microsoft.Authorization/policyDefinitions/eb907f70-7514-460d-92b3-a5ae93b4f917 instead. Default: Audit
Allowed: (Audit, Deny, Disabled)
2022-04-29 18:06:01
change: Patch, new suffix: deprecated (1.0.0 > 1.0.1-deprecated)
Kubernetes8dfab9c4-fe7b-49ad-85e4-1e9be085358f[Preview]: Azure Arc enabled Kubernetes clusters should have Microsoft Defender for Cloud extension installedMicrosoft Defender for Cloud extension for Azure Arc provides threat protection for your Arc enabled Kubernetes clusters. The extension collects data from all nodes in the cluster and sends it to the Azure Defender for Kubernetes backend in the cloud for further analysis. Learn more in https://docs.microsoft.com/azure/defender-for-cloud/defender-for-containers-enable?pivots=defender-for-container-arc. Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2022-04-22 19:50:54
change: Major, suffix remains equal (4.0.0-preview > 5.0.0-preview)
Storagefe83a0eb-a853-422d-aac2-1bffd182c5d0Storage accounts should have the specified minimum TLS versionConfigure a minimum TLS version for secure communication between the client application and the storage account. To minimize security risk, the recommended minimum TLS version is the latest released version, which is currently TLS 1.2. Default: Audit
Allowed: (Audit, Deny, Disabled)
2022-04-22 19:50:54
add: fe83a0eb-a853-422d-aac2-1bffd182c5d0
Kubernetes708b60a6-d253-4fe0-9114-4be4c00f012c[Preview]: Configure Azure Arc enabled Kubernetes clusters to install Microsoft Defender for Cloud extensionMicrosoft Defender for Cloud extension for Azure Arc provides threat protection for your Arc enabled Kubernetes clusters. The extension collects data from all nodes in the cluster and sends it to the Azure Defender for Kubernetes backend in the cloud for further analysis. Learn more in https://docs.microsoft.com/azure/defender-for-cloud/defender-for-containers-enable?pivots=defender-for-container-arc. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Contributor
Log Analytics Contributor
2022-04-22 19:50:54
change: Major, suffix remains equal (4.1.0-preview > 5.1.0-preview)
SQL5e1de0e3-42cb-4ebc-a86d-61d0c619ca48Public network access should be disabled for PostgreSQL flexible serversDisabling the public network access property improves security by ensuring your Azure Database for PostgreSQL flexible servers can only be accessed from a private endpoint. This configuration strictly disables access from any public address space outside of Azure IP range and denies all logins that match IP or virtual network-based firewall rules. Default: Audit
Allowed: (Audit, Deny, Disabled)
2022-04-22 19:50:54
change: Major (2.0.0 > 3.0.0)
Kubernetes50c83470-d2f0-4dda-a716-1938a4825f62Kubernetes cluster containers should only use allowed pull policyRestrict containers' pull policy to enforce containers to use only allowed images on deployments Default: Audit
Allowed: (Audit, Deny, Disabled)
2022-04-22 19:50:54
add: 50c83470-d2f0-4dda-a716-1938a4825f62
Monitoringc02729e5-e5e7-4458-97fa-2b5ad0661f28Windows virtual machines should have Azure Monitor Agent installedWindows virtual machines should be monitored and secured through the deployed Azure Monitor Agent. The Azure Monitor Agent collects telemetry data from the guest OS. Windows virtual machines with supported OS and in supported regions are monitored for Azure Monitor Agent deployment. Learn more: https://aka.ms/AMAOverview. Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2022-04-22 19:50:54
change: Major (2.0.0 > 3.0.0)
Monitoring3672e6f7-a74d-4763-b138-fcf332042f8fWindows virtual machine scale sets should have Azure Monitor Agent installedWindows virtual machine scale sets should be monitored and secured through the deployed Azure Monitor Agent. The Azure Monitor Agent collects telemetry data from the guest OS. Virtual machine scale sets with supported OS and in supported regions are monitored for Azure Monitor Agent deployment. Learn more: https://aka.ms/AMAOverview. Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2022-04-22 19:50:54
change: Major (2.0.0 > 3.0.0)
Kubernetes73868911-4f4a-444f-adbd-5382bf70208aAzure Arc-enabled Kubernetes clusters should have the Open Service Mesh extension installedOpen Service Mesh extension provides all standard service mesh capabilities for security, traffic management and observability of application services. Learn more here: https://aka.ms/arc-osm-doc Default: DeployIfNotExists
Allowed: (DeployIfNotExists, AuditIfNotExists, Disabled)
Owner
2022-04-15 17:17:14
add: 73868911-4f4a-444f-adbd-5382bf70208a
Security Center37c043a6-6d64-656d-6465-b362dfeb354a[Preview]: Deploy Microsoft Defender for Endpoint agent on Windows Azure Arc machinesDeploys Microsoft Defender for Endpoint on Windows Azure Arc machines. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, AuditIfNotExists, Disabled)
Security Admin
2022-04-15 17:17:14
change: Major, suffix remains equal (1.0.0-preview > 2.0.0-preview)
Security Centerd30025d0-6d64-656d-6465-67688881b632[Preview]: Deploy Microsoft Defender for Endpoint agent on Linux virtual machinesDeploys Microsoft Defender for Endpoint agent on applicable Linux VM images. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, AuditIfNotExists, Disabled)
Security Admin
2022-04-15 17:17:14
change: Major, suffix remains equal (1.0.0-preview > 2.0.0-preview)
Security Center1ec9c2c2-6d64-656d-6465-3ec3309b8579[Preview]: Deploy Microsoft Defender for Endpoint agent on Windows virtual machinesDeploys Microsoft Defender for Endpoint on applicable Windows VM images. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, AuditIfNotExists, Disabled)
Security Admin
2022-04-15 17:17:14
change: Major, suffix remains equal (1.0.0-preview > 2.0.0-preview)
Security Center4eb909e7-6d64-656d-6465-2eeb297a1625[Preview]: Deploy Microsoft Defender for Endpoint agent on Linux hybrid machinesDeploys Microsoft Defender for Endpoint agent on Linux hybrid machines Default: DeployIfNotExists
Allowed: (DeployIfNotExists, AuditIfNotExists, Disabled)
Security Admin
2022-04-15 17:17:14
change: Major, suffix remains equal (1.0.0-preview > 2.0.0-preview)
Stream Analyticsea6c4923-510a-4346-be26-1894919a5b97Stream Analytics job should use managed identity to authenticate endpointsEnsure that Stream Analytics jobs only connect to endpoints using managed identity authentication. Default: Audit
Allowed: (Deny, Disabled, Audit)
2022-04-15 17:17:14
add: ea6c4923-510a-4346-be26-1894919a5b97
Cache7d092e0a-7acd-40d2-a975-dca21cae48c4[Deprecated]: Azure Cache for Redis should reside within a virtual networkAzure Virtual Network deployment provides enhanced security and isolation for your Azure Cache for Redis, as well as subnets, access control policies, and other features to further restrict access.When an Azure Cache for Redis instance is configured with a virtual network, it is not publicly addressable and can only be accessed from virtual machines and applications within the virtual network. Default: Audit
Allowed: (Audit, Deny, Disabled)
2022-04-15 17:17:14
change: Version remains equal, new suffix: deprecated (1.0.3 > 1.0.3-deprecated)
Kubernetesf85eb0dd-92ee-40e9-8a76-db25a507d6d3Kubernetes cluster containers should only use allowed ProcMountTypePod containers can only use allowed ProcMountTypes in a Kubernetes cluster. This recommendation is part of Pod Security Policies which are intended to improve the security of your Kubernetes environments. This policy is generally available for Kubernetes Service (AKS), and preview for AKS Engine and Azure Arc enabled Kubernetes. For more information, see https://aka.ms/kubepolicydoc. Default: Audit
Allowed: (audit, Audit, deny, Deny, disabled, Disabled)
2022-04-15 17:17:14
change: Minor (6.1.0 > 6.2.0)
Backup83644c87-93dd-49fe-bf9f-6aff8fd0834eConfigure backup on virtual machines with a given tag to a new recovery services vault with a default policyEnforce backup for all virtual machines by deploying a recovery services vault in the same location and resource group as the virtual machine. Doing this is useful when different application teams in your organization are allocated separate resource groups and need to manage their own backups and restores. You can optionally include virtual machines containing a specified tag to control the scope of assignment. See https://aka.ms/AzureVMAppCentricBackupIncludeTag. Default: DeployIfNotExists
Allowed: (auditIfNotExists, AuditIfNotExists, deployIfNotExists, DeployIfNotExists, disabled, Disabled)
Virtual Machine Contributor
Backup Contributor
2022-04-08 16:22:13
change: Major (6.1.0 > 7.1.0)
Backup98d0b9f8-fd90-49c9-88e2-d3baf3b0dd86Configure backup on virtual machines without a given tag to a new recovery services vault with a default policyEnforce backup for all virtual machines by deploying a recovery services vault in the same location and resource group as the virtual machine. Doing this is useful when different application teams in your organization are allocated separate resource groups and need to manage their own backups and restores. You can optionally exclude virtual machines containing a specified tag to control the scope of assignment. See https://aka.ms/AzureVMAppCentricBackupExcludeTag. Default: DeployIfNotExists
Allowed: (auditIfNotExists, AuditIfNotExists, deployIfNotExists, DeployIfNotExists, disabled, Disabled)
Virtual Machine Contributor
Backup Contributor
2022-04-08 16:22:13
change: Major (6.1.0 > 7.1.0)
Backup345fa903-145c-4fe1-8bcd-93ec2adccde8Configure backup on virtual machines with a given tag to an existing recovery services vault in the same locationEnforce backup for all virtual machines by backing them up to an existing central recovery services vault in the same location and subscription as the virtual machine. Doing this is useful when there is a central team in your organization managing backups for all resources in a subscription. You can optionally include virtual machines containing a specified tag to control the scope of assignment. See https://aka.ms/AzureVMCentralBackupIncludeTag. Default: DeployIfNotExists
Allowed: (auditIfNotExists, AuditIfNotExists, deployIfNotExists, DeployIfNotExists, disabled, Disabled)
Virtual Machine Contributor
Backup Contributor
2022-04-08 16:22:13
change: Major (6.1.0 > 7.1.0)
Backup09ce66bc-1220-4153-8104-e3f51c936913Configure backup on virtual machines without a given tag to an existing recovery services vault in the same locationEnforce backup for all virtual machines by backing them up to an existing central recovery services vault in the same location and subscription as the virtual machine. Doing this is useful when there is a central team in your organization managing backups for all resources in a subscription. You can optionally exclude virtual machines containing a specified tag to control the scope of assignment. See https://aka.ms/AzureVMCentralBackupExcludeTag. Default: DeployIfNotExists
Allowed: (auditIfNotExists, AuditIfNotExists, deployIfNotExists, DeployIfNotExists, disabled, Disabled)
Virtual Machine Contributor
Backup Contributor
2022-04-08 16:22:13
change: Major (6.1.0 > 7.1.0)
Monitoring98569e20-8f32-4f31-bf34-0e91590ae9d3Configure Windows virtual machine scale sets to run Azure Monitor Agent with user-assigned managed identity-based authenticationAutomate the deployment of Azure Monitor Agent extension on your Windows virtual machine scale sets for collecting telemetry data from the guest OS. This policy will install the extension and configure it to use the specified user-assigned managed identity if the OS and region are supported, and skip install otherwise. Learn more: https://aka.ms/AMAOverview. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Virtual Machine Contributor
2022-04-08 16:22:13
add: 98569e20-8f32-4f31-bf34-0e91590ae9d3
Monitoring4efbd9d8-6bc6-45f6-9be2-7fe9dd5d89ffConfigure Windows virtual machine scale sets to run Azure Monitor Agent using system-assigned managed identityAutomate the deployment of Azure Monitor Agent extension on your Windows virtual machine scale sets for collecting telemetry data from the guest OS. This policy will install the extension if the OS and region are supported and system-assigned managed identity is enabled, and skip install otherwise. Learn more: https://aka.ms/AMAOverview. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Virtual Machine Contributor
2022-04-08 16:22:13
change: Patch (3.0.0 > 3.0.1)
Monitoringca817e41-e85a-4783-bc7f-dc532d36235eConfigure Windows virtual machines to run Azure Monitor Agent using system-assigned managed identityAutomate the deployment of Azure Monitor Agent extension on your Windows virtual machines for collecting telemetry data from the guest OS. This policy will install the extension if the OS and region are supported and system-assigned managed identity is enabled, and skip install otherwise. Learn more: https://aka.ms/AMAOverview. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Virtual Machine Contributor
2022-04-08 16:22:13
change: Patch (4.0.0 > 4.0.1)
Monitoring637125fd-7c39-4b94-bb0a-d331faf333a9Configure Windows virtual machines to run Azure Monitor Agent with user-assigned managed identity-based authenticationAutomate the deployment of Azure Monitor Agent extension on your Windows virtual machines for collecting telemetry data from the guest OS. This policy will install the extension and configure it to use the specified user-assigned managed identity if the OS and region are supported, and skip install otherwise. Learn more: https://aka.ms/AMAOverview. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Virtual Machine Contributor
2022-04-08 16:22:13
add: 637125fd-7c39-4b94-bb0a-d331faf333a9
Event Gridd389df0a-e0d7-4607-833c-75a6fdac2c2dDeploy - Configure Azure Event Grid domains to use private DNS zonesUse private DNS zones to override the DNS resolution for a private endpoint. Learn more at: https://aka.ms/privatednszone. Default: DeployIfNotExists
Allowed: (deployIfNotExists, DeployIfNotExists, Disabled)
Network Contributor
2022-04-01 20:29:14
change: Minor (1.0.0 > 1.1.0)
Regulatory Compliance59a7116d-19fd-49e9-a068-dec4460b97e5Microsoft Managed Control 1731 - Information Security Program PlanMicrosoft implements this Program Management control Fixed: audit
2022-04-01 20:29:14
add: 59a7116d-19fd-49e9-a068-dec4460b97e5
Regulatory Complianced922484a-8cfc-4a6b-95a4-77d6a685407fMicrosoft Managed Control 1577 - Acquisitions Process | Continuous Monitoring PlanMicrosoft implements this System and Services Acquisition control Fixed: audit
2022-04-01 20:29:14
change: Patch (1.0.0 > 1.0.1)
Regulatory Compliancefc933d22-04df-48ed-8f87-22a3773d4309Microsoft Managed Control 1075 - Access Control for Portable And Mobile Systems | Full Device / Container-Based EncryptionMicrosoft implements this Access Control control Fixed: audit
2022-04-01 20:29:14
change: Patch (1.0.0 > 1.0.1)
Regulatory Compliance967773fc-d9ab-4a4e-8ff6-f5e9e3f5dbefMicrosoft Managed Control 1717 - Software & Information Integrity | Binary Or Machine Executable CodeMicrosoft implements this System and Information Integrity control Fixed: audit
2022-04-01 20:29:14
change: Patch (1.0.0 > 1.0.1)
Stream Analytics87ba29ef-1ab3-4d82-b763-87fcd4f531f7Azure Stream Analytics jobs should use customer-managed keys to encrypt dataUse customer-managed keys when you want to securely store any metadata and private data assets of your Stream Analytics jobs in your storage account. This gives you total control over how your Stream Analytics data is encrypted. Default: Audit
Allowed: (audit, Audit, deny, Deny, disabled, Disabled)
2022-04-01 20:29:14
change: Minor (1.0.0 > 1.1.0)
Regulatory Compliance7522ed84-70d5-4181-afc0-21e50b1b6d0eMicrosoft Managed Control 1417 - Remote Maintenance | Comparable Security / SanitizationMicrosoft implements this Maintenance control Fixed: audit
2022-04-01 20:29:14
change: Patch (1.0.0 > 1.0.1)
Regulatory Compliancecf1cad59-1012-4b55-9b80-427596ea1f4fMicrosoft Managed Control 1867 - Dissemination of Privacy Program Information Microsoft implements this Transparency control Fixed: audit
2022-04-01 20:29:14
add: cf1cad59-1012-4b55-9b80-427596ea1f4f
Regulatory Compliancef5a44e7d-77a2-474e-b2e3-4e8c42ba514bMicrosoft Managed Control 1729 - Information Security Program PlanMicrosoft implements this Program Management control Fixed: audit
2022-04-01 20:29:14
add: f5a44e7d-77a2-474e-b2e3-4e8c42ba514b
Regulatory Complianceaac17c36-2ac1-417f-ba74-6305f2ce6ad5Microsoft Managed Control 1859 - Privacy NoticeMicrosoft implements this Transparency control Fixed: audit
2022-04-01 20:29:14
add: aac17c36-2ac1-417f-ba74-6305f2ce6ad5
Regulatory Compliance3815d34a-187d-4f30-a9fa-5ac464e3465dMicrosoft Managed Control 1736 - Information Security ResourcesMicrosoft implements this Program Management control Fixed: audit
2022-04-01 20:29:14
add: 3815d34a-187d-4f30-a9fa-5ac464e3465d
Regulatory Compliancefb3c7f40-4c97-4fdd-94c9-e7d99b4f6e42Microsoft Managed Control 1750 - Mission/Business Process DefinitionMicrosoft implements this Program Management control Fixed: audit
2022-04-01 20:29:14
add: fb3c7f40-4c97-4fdd-94c9-e7d99b4f6e42
Regulatory Compliancef475ee0e-f560-4c9b-876b-04a77460a404Microsoft Managed Control 1706 - Security Alerts & AdvisoriesMicrosoft implements this System and Information Integrity control Fixed: audit
2022-04-01 20:29:14
change: Patch (1.0.0 > 1.0.1)
Regulatory Complianced2fc426a-4b67-464b-87c9-2134b8762ddfMicrosoft Managed Control 1817 - Privacy-Enhanced System Design And Development Microsoft implements this Accountability, Audit, and Risk Management control Fixed: audit
2022-04-01 20:29:14
add: d2fc426a-4b67-464b-87c9-2134b8762ddf
Regulatory Compliance38512b01-6a68-45d6-bb97-189a9a0fbe5eMicrosoft Managed Control 1849 - Individual Access Microsoft implements this Individual Participation and Redress control Fixed: audit
2022-04-01 20:29:14
add: 38512b01-6a68-45d6-bb97-189a9a0fbe5e
Regulatory Compliance952a545c-6dc5-4999-aeb6-51ed27dc7ea5Microsoft Managed Control 1854 - Inventory of Personally Identifiable Information Microsoft implements this Security control Fixed: audit
2022-04-01 20:29:14
add: 952a545c-6dc5-4999-aeb6-51ed27dc7ea5
Regulatory Compliance2fb740e5-cbc7-4d10-8686-d1bf826652b1Microsoft Managed Control 1090 - Security AwarenessMicrosoft implements this Awareness and Training control Fixed: audit
2022-04-01 20:29:14
change: Patch (1.0.0 > 1.0.1)
Kubernetes89f2d532-c53c-4f8f-9afa-4927b1114a0dAzure Kubernetes Service Clusters should disable Command InvokeDisabling command invoke can enhance the security by avoiding bypass of restricted network access or Kubernetes role-based access control Default: Audit
Allowed: (Audit, Disabled)
2022-04-01 20:29:14
add: 89f2d532-c53c-4f8f-9afa-4927b1114a0d
Regulatory Compliance28e633fd-284e-4ea7-88b4-02ca157ed713Microsoft Managed Control 1418 - Remote Maintenance | Comparable Security / SanitizationMicrosoft implements this Maintenance control Fixed: audit
2022-04-01 20:29:14
change: Patch (1.0.0 > 1.0.1)
App Service95bccee9-a7f8-4bec-9ee9-62c3473701fcAuthentication should be enabled on your web appAzure App Service Authentication is a feature that can prevent anonymous HTTP requests from reaching the web app, or authenticate those that have tokens before they reach the web app Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2022-04-01 20:29:14
change: Major (1.0.0 > 2.0.0)
Regulatory Compliance6ca71be3-16cb-4d39-8b50-7f8fd5e2f11bMicrosoft Managed Control 1304 - User Identification And Authentication | Local Access To Non-Privileged AccountsMicrosoft implements this Identification and Authentication control Fixed: audit
2022-04-01 20:29:14
change: Patch (1.0.0 > 1.0.1)
Regulatory Compliance2ce63a52-e47b-4ae2-adbb-6e40d967f9e6Microsoft Managed Control 1414 - Remote MaintenanceMicrosoft implements this Maintenance control Fixed: audit
2022-04-01 20:29:14
change: Patch (1.0.0 > 1.0.1)
Kubernetes440b515e-a580-421e-abeb-b159a61ddcbc[Deprecated]: Kubernetes cluster containers should only listen on allowed portsRestrict containers to listen only on allowed ports to secure access to the Kubernetes cluster. The policy is deprecating since container port is only informative field which cannot decide the port container is actually using. For more information, see https://aka.ms/kubepolicydoc. Default: Deny
Allowed: (audit, Audit, deny, Deny, disabled, Disabled)
2022-04-01 20:29:14
change: Minor, suffix remains equal (6.1.3-deprecated > 6.2.0-deprecated)
Regulatory Compliance4f3b7f51-9620-4c71-b887-48a6838c68b8Microsoft Managed Control 1748 - Security Authorization ProcessMicrosoft implements this Program Management control Fixed: audit
2022-04-01 20:29:14
add: 4f3b7f51-9620-4c71-b887-48a6838c68b8
Regulatory Compliance80ca0a27-918a-4604-af9e-723a27ee51e8Microsoft Managed Control 1303 - User Identification And Authentication | Local Access To Privileged AccountsMicrosoft implements this Identification and Authentication control Fixed: audit
2022-04-01 20:29:14
change: Patch (1.0.0 > 1.0.1)
Regulatory Compliance881299bf-2a5b-4686-a1b2-321d33679953Microsoft Managed Control 1440 - Media Sanitization And Disposal | Review / Approve / Track / Document / VerifyMicrosoft implements this Media Protection control Fixed: audit
2022-04-01 20:29:14
change: Patch (1.0.0 > 1.0.1)
Key Vaulta22f4a40-01d3-4c7d-8071-da157eeff341Certificates should be issued by the specified non-integrated certificate authorityManage your organizational compliance requirements by specifying the custom or internal certificate authorities that can issue certificates in your key vault. Default: Audit
Allowed: (audit, Audit, deny, Deny, disabled, Disabled)
2022-04-01 20:29:14
change: Minor (2.0.1 > 2.1.0)
Backup09ce66bc-1220-4153-8104-e3f51c936913Configure backup on virtual machines without a given tag to an existing recovery services vault in the same locationEnforce backup for all virtual machines by backing them up to an existing central recovery services vault in the same location and subscription as the virtual machine. Doing this is useful when there is a central team in your organization managing backups for all resources in a subscription. You can optionally exclude virtual machines containing a specified tag to control the scope of assignment. See https://aka.ms/AzureVMCentralBackupExcludeTag. Default: DeployIfNotExists
Allowed: (auditIfNotExists, AuditIfNotExists, deployIfNotExists, DeployIfNotExists, disabled, Disabled)
Virtual Machine Contributor
Backup Contributor
2022-04-01 20:29:14
change: Minor (6.0.0 > 6.1.0)
Regulatory Compliance1f01608c-5f35-492d-8763-8edf0080cc38Microsoft Managed Control 1738 - Plan Of Action And Milestones ProcessMicrosoft implements this Program Management control Fixed: audit
2022-04-01 20:29:14
add: 1f01608c-5f35-492d-8763-8edf0080cc38
Regulatory Compliance6c657baf-0693-455a-8bb2-7b4bdf79fd0eMicrosoft Managed Control 1757 - Contacts With Security Groups And AssociationsMicrosoft implements this Program Management control Fixed: audit
2022-04-01 20:29:14
add: 6c657baf-0693-455a-8bb2-7b4bdf79fd0e
Regulatory Compliancea4eb2ba5-62b5-4524-83f0-7e05896edc76Microsoft Managed Control 1824 - Data QualityMicrosoft implements this Data Quality and Integrity control Fixed: audit
2022-04-01 20:29:14
add: a4eb2ba5-62b5-4524-83f0-7e05896edc76
Regulatory Compliancec3e4fa5d-c0c4-46c4-9a13-bb9b9f0b003fMicrosoft Managed Control 1865 - System of Records Notices And Privacy Act Statements | Public Website PublicationMicrosoft implements this Transparency control Fixed: audit
2022-04-01 20:29:14
add: c3e4fa5d-c0c4-46c4-9a13-bb9b9f0b003f
API for FHIR0fea8f8a-4169-495d-8307-30ec335f387dCORS should not allow every domain to access your API for FHIRCross-Origin Resource Sharing (CORS) should not allow all domains to access your API for FHIR. To protect your API for FHIR, remove access for all domains and explicitly define the domains allowed to connect. Default: Audit
Allowed: (audit, Audit, disabled, Disabled)
2022-04-01 20:29:14
change: Minor (1.0.0 > 1.1.0)
Regulatory Compliancef3739612-c86c-4b2e-bbe6-0d0869aec19cMicrosoft Managed Control 1803 - Governance And Privacy Program Microsoft implements this Accountability, Audit, and Risk Management control Fixed: audit
2022-04-01 20:29:14
add: f3739612-c86c-4b2e-bbe6-0d0869aec19c
Regulatory Complianced461dd50-c8fb-4ccb-93bf-61f53b44e54dMicrosoft Managed Control 1742 - Critical Infrastructure PlanMicrosoft implements this Program Management control Fixed: audit
2022-04-01 20:29:14
add: d461dd50-c8fb-4ccb-93bf-61f53b44e54d
Regulatory Compliance01524fa8-4555-48ce-ba5f-c3b8dcef5147Microsoft Managed Control 1142 - Certification, Authorization, Security Assessment Policy And ProceduresMicrosoft implements this Security Assessment and Authorization control Fixed: audit
2022-04-01 20:29:14
change: Patch (1.0.0 > 1.0.1)
Kubernetesd2e7ea85-6b44-4317-a0be-1b951587f626Kubernetes clusters should not grant CAP_SYS_ADMIN security capabilitiesTo reduce the attack surface of your containers, restrict CAP_SYS_ADMIN Linux capabilities. For more information, see https://aka.ms/kubepolicydoc. Default: Audit
Allowed: (audit, Audit, deny, Deny, disabled, Disabled)
2022-04-01 20:29:14
change: Minor (3.1.0 > 3.2.0)
Regulatory Compliancea36eb487-cbd1-4fe7-a3df-2efc6aa2c2b6Microsoft Managed Control 1745 - Risk Management StrategyMicrosoft implements this Program Management control Fixed: audit
2022-04-01 20:29:14
add: a36eb487-cbd1-4fe7-a3df-2efc6aa2c2b6
Regulatory Compliance1437bf9c-feef-4c82-a57a-22d1fcbcd247Microsoft Managed Control 1872 - Information Sharing with Third Parties Microsoft implements this Use Limitation control Fixed: audit
2022-04-01 20:29:14
add: 1437bf9c-feef-4c82-a57a-22d1fcbcd247
Kubernetes16697877-1118-4fb1-9b65-9898ec2509ecKubernetes cluster pods should only use allowed volume typesPods can only use allowed volume types in a Kubernetes cluster. This recommendation is part of Pod Security Policies which are intended to improve the security of your Kubernetes environments. This policy is generally available for Kubernetes Service (AKS), and preview for AKS Engine and Azure Arc enabled Kubernetes. For more information, see https://aka.ms/kubepolicydoc. Default: Audit
Allowed: (audit, Audit, deny, Deny, disabled, Disabled)
2022-04-01 20:29:14
change: Minor (3.0.2 > 3.1.0)
Regulatory Compliancee4df5fb7-58e9-41de-9399-f043c7a931f8Microsoft Managed Control 1740 - Information Security Measures Of PerformanceMicrosoft implements this Program Management control Fixed: audit
2022-04-01 20:29:14
add: e4df5fb7-58e9-41de-9399-f043c7a931f8
Kubernetesfebd0533-8e55-448f-b837-bd0e06f16469Kubernetes cluster containers should only use allowed imagesUse images from trusted registries to reduce the Kubernetes cluster's exposure risk to unknown vulnerabilities, security issues and malicious images. This policy is generally available for Kubernetes Service (AKS), and preview for AKS Engine and Azure Arc enabled Kubernetes. For more information, see https://aka.ms/kubepolicydoc. Default: Deny
Allowed: (audit, Audit, deny, Deny, disabled, Disabled)
2022-04-01 20:29:14
change: Minor (7.0.4 > 7.1.0)
Regulatory Compliance6519d7f3-e8a2-4ff3-a935-9a9497152ad7Microsoft Managed Control 1441 - Media Sanitization And Disposal | Equipment TestingMicrosoft implements this Media Protection control Fixed: audit
2022-04-01 20:29:14
change: Patch (1.0.0 > 1.0.1)
Monitoringea0dfaed-95fb-448c-934e-d6e713ce393dAzure Monitor Logs clusters should be created with infrastructure-encryption enabled (double encryption)To ensure secure data encryption is enabled at the service level and the infrastructure level with two different encryption algorithms and two different keys, use an Azure Monitor dedicated cluster. This option is enabled by default when supported at the region, see https://docs.microsoft.com/azure/azure-monitor/platform/customer-managed-keys#customer-managed-key-overview. Default: Audit
Allowed: (audit, Audit, deny, Deny, disabled, Disabled)
2022-04-01 20:29:14
change: Minor (1.0.0 > 1.1.0)
Regulatory Compliance17641f70-94cd-4a5d-a613-3d1143e20e34Microsoft Managed Control 1349 - Identification And Authentication (Non-Organizational Users) | Use Of Ficam-Approved ProductsMicrosoft implements this Identification and Authentication control Fixed: audit
2022-04-01 20:29:14
change: Patch (1.0.0 > 1.0.1)
Regulatory Complianced7d66d05-bf34-4555-b5f2-8b749def4098Microsoft Managed Control 1837 - Data Retention And Disposal | System ConfigurationMicrosoft implements this Data Minimization and Retention control Fixed: audit
2022-04-01 20:29:14
add: d7d66d05-bf34-4555-b5f2-8b749def4098
Kubernetes098fc59e-46c7-4d99-9b16-64990e543d75Kubernetes cluster pod hostPath volumes should only use allowed host pathsLimit pod HostPath volume mounts to the allowed host paths in a Kubernetes Cluster. This recommendation is part of Pod Security Policies which are intended to improve the security of your Kubernetes environments. This policy is generally available for Kubernetes Service (AKS), and preview for AKS Engine and Azure Arc enabled Kubernetes. For more information, see https://aka.ms/kubepolicydoc. Default: Audit
Allowed: (audit, Audit, deny, Deny, disabled, Disabled)
2022-04-01 20:29:14
change: Minor (4.0.3 > 4.1.0)
Regulatory Compliance1a437f5b-9ad6-4f28-8861-de404d511ae4Microsoft Managed Control 1071 - Wireless Access Restrictions | Restrict Configurations By UsersMicrosoft implements this Access Control control Fixed: audit
2022-04-01 20:29:14
change: Patch (1.0.0 > 1.0.1)
Regulatory Compliance426f3a87-2d38-47e9-9687-c095441cd82cMicrosoft Managed Control 1732 - Information Security Program PlanMicrosoft implements this Program Management control Fixed: audit
2022-04-01 20:29:14
add: 426f3a87-2d38-47e9-9687-c095441cd82c
Monitoringd550e854-df1a-4de9-bf44-cd894b39a95eAzure Monitor Logs for Application Insights should be linked to a Log Analytics workspaceLink the Application Insights component to a Log Analytics workspace for logs encryption. Customer-managed keys are commonly required to meet regulatory compliance and for more control over the access to your data in Azure Monitor. Linking your component to a Log Analytics workspace that's enabled with a customer-managed key, ensures that your Application Insights logs meet this compliance requirement, see https://docs.microsoft.com/azure/azure-monitor/platform/customer-managed-keys. Default: Audit
Allowed: (audit, Audit, deny, Deny, disabled, Disabled)
2022-04-01 20:29:14
change: Minor (1.0.0 > 1.1.0)
Regulatory Compliance04f5fb00-80bb-48a9-a75b-4cb4d4c97c36Microsoft Managed Control 1572 - Acquisitions ProcessMicrosoft implements this System and Services Acquisition control Fixed: audit
2022-04-01 20:29:14
change: Patch (1.0.0 > 1.0.1)
Regulatory Compliance84e622c8-4bed-417c-84c6-b2fb0dd73682Microsoft Managed Control 1307 - User Identification And Authentication | Network Access To Non-Privileged Accounts - Replay...Microsoft implements this Identification and Authentication control Fixed: audit
2022-04-01 20:29:14
change: Patch (1.0.0 > 1.0.1)
Regulatory Compliance5ec0d156-53ba-4f29-8c17-1525cde54129Microsoft Managed Control 1844 - ConsentMicrosoft implements this Individual Participation and Redress control Fixed: audit
2022-04-01 20:29:14
add: 5ec0d156-53ba-4f29-8c17-1525cde54129
Regulatory Compliancefb845c34-808d-4c17-a0ce-85a530e9164bMicrosoft Managed Control 1857 - Privacy Incident Response Microsoft implements this Security control Fixed: audit
2022-04-01 20:29:14
add: fb845c34-808d-4c17-a0ce-85a530e9164b
Kubernetesf06ddb64-5fa3-4b77-b166-acb36f7f6042Kubernetes cluster pods and containers should only run with approved user and group IDsControl the user, primary group, supplemental group and file system group IDs that pods and containers can use to run in a Kubernetes Cluster. This recommendation is part of Pod Security Policies which are intended to improve the security of your Kubernetes environments. This policy is generally available for Kubernetes Service (AKS), and preview for AKS Engine and Azure Arc enabled Kubernetes. For more information, see https://aka.ms/kubepolicydoc. Default: Audit
Allowed: (audit, Audit, deny, Deny, disabled, Disabled)
2022-04-01 20:29:14
change: Minor (4.0.3 > 4.1.0)
Regulatory Compliance3a09e314-dca7-4a19-b3b4-14abd6305043Microsoft Managed Control 1753 - Testing, Training, And MonitoringMicrosoft implements this Program Management control Fixed: audit
2022-04-01 20:29:14
add: 3a09e314-dca7-4a19-b3b4-14abd6305043
Regulatory Compliance0f559588-5e53-4b14-a7c4-85d28ebc2234Microsoft Managed Control 1430 - Media LabelingMicrosoft implements this Media Protection control Fixed: audit
2022-04-01 20:29:14
change: Patch (1.0.0 > 1.0.1)
Regulatory Compliance79da5b09-0e7e-499e-adda-141b069c7998Microsoft Managed Control 1510 - Position CategorizationMicrosoft implements this Personnel Security control Fixed: audit
2022-04-01 20:29:14
change: Patch (1.0.0 > 1.0.1)
Regulatory Compliance3a02bf7a-8fb7-4c97-bd55-4a8592764cc8Microsoft Managed Control 1840 - Minimization of PII Used in Testing, Training, And Research | Risk Minimization TechniquesMicrosoft implements this Data Minimization and Retention control Fixed: audit
2022-04-01 20:29:14
add: 3a02bf7a-8fb7-4c97-bd55-4a8592764cc8
Monitoring17b3de92-f710-4cf4-aa55-0e7859f1ed7b[Preview]: Configure system-assigned managed identity to enable Azure Monitor assignments on VMsConfigure system-assigned managed identity to virtual machines hosted in Azure that are supported by Azure Monitor and do not have a system-assigned managed identity. A system-assigned managed identity is a prerequisite for all Azure Monitor assignments and must be added to machines before using any Azure Monitor extension. Target virtual machines must be in a supported location. Default: Modify
Allowed: (Modify, Disabled)
Virtual Machine Contributor
Managed Identity Contributor
Managed Identity Operator
2022-04-01 20:29:14
change: Major, suffix remains equal (4.0.0-preview > 5.0.0-preview)
Healthcare APIsfe1c9040-c46a-4e81-9aea-c7850fbb3aa6CORS should not allow every domain to access your FHIR ServiceCross-Origin Resource Sharing (CORS) should not allow all domains to access your FHIR Service. To protect your FHIR Service, remove access for all domains and explicitly define the domains allowed to connect. Default: Audit
Allowed: (audit, Audit, disabled, Disabled)
2022-04-01 20:29:14
change: Minor (1.0.0 > 1.1.0)
Regulatory Compliancecceea882-9d83-4ca6-b30e-6a7b381a8e6aMicrosoft Managed Control 1866 - Dissemination of Privacy Program Information Microsoft implements this Transparency control Fixed: audit
2022-04-01 20:29:14
add: cceea882-9d83-4ca6-b30e-6a7b381a8e6a
Regulatory Complianced78966ce-05c7-4967-829d-9a414ea2bc92Microsoft Managed Control 1842 - ConsentMicrosoft implements this Individual Participation and Redress control Fixed: audit
2022-04-01 20:29:14
add: d78966ce-05c7-4967-829d-9a414ea2bc92
Bot Service6164527b-e1ee-4882-8673-572f425f5e0aBot Service endpoint should be a valid HTTPS URIData can be tampered with during transmission. Protocols exist that provide encryption to address problems of misuse and tampering. To ensure your bots are communicating only over encrypted channels, set the endpoint to a valid HTTPS URI. This ensures the HTTPS protocol is used to encrypt your data in transit and is also often a requirement for compliance with regulatory or industry standards. Please visit: https://docs.microsoft.com/azure/bot-service/bot-builder-security-guidelines. Default: Audit
Allowed: (audit, Audit, deny, Deny, disabled, Disabled)
2022-04-01 20:29:14
change: Minor (1.0.1 > 1.1.0)
Kubernetesf4a8fce0-2dd5-4c21-9a36-8f0ec809d663Kubernetes cluster pod FlexVolume volumes should only use allowed driversPod FlexVolume volumes should only use allowed drivers in a Kubernetes cluster. This recommendation is part of Pod Security Policies which are intended to improve the security of your Kubernetes environments. This policy is generally available for Kubernetes Service (AKS), and preview for AKS Engine and Azure Arc enabled Kubernetes. For more information, see https://aka.ms/kubepolicydoc. Default: Audit
Allowed: (audit, Audit, deny, Deny, disabled, Disabled)
2022-04-01 20:29:14
change: Minor (3.0.2 > 3.1.0)
Regulatory Complianceea979184-f7c4-42be-86d2-584b95c34540Microsoft Managed Control 1869 - Information Sharing with Third Parties Microsoft implements this Use Limitation control Fixed: audit
2022-04-01 20:29:14
add: ea979184-f7c4-42be-86d2-584b95c34540
Regulatory Compliance2ef3cc79-733e-48ed-ab6f-7bf439e9b406Microsoft Managed Control 1000 - Access Control Policy And Procedures RequirementsMicrosoft implements this Access Control control Fixed: audit
2022-04-01 20:29:14
change: Patch (1.0.0 > 1.0.1)
Kubernetesf85eb0dd-92ee-40e9-8a76-db25a507d6d3Kubernetes cluster containers should only use allowed ProcMountTypePod containers can only use allowed ProcMountTypes in a Kubernetes cluster. This recommendation is part of Pod Security Policies which are intended to improve the security of your Kubernetes environments. This policy is generally available for Kubernetes Service (AKS), and preview for AKS Engine and Azure Arc enabled Kubernetes. For more information, see https://aka.ms/kubepolicydoc. Default: Audit
Allowed: (audit, Audit, deny, Deny, disabled, Disabled)
2022-04-01 20:29:14
change: Minor (6.0.0 > 6.1.0)
Machine Learning3948394e-63de-11ea-bc55-0242ac130003[Preview]: Configure an approval endpoint called prior to jobs running for specified Azure Machine Learning computesConfigure an approval endpoint called prior to jobs running for specified Azure Machine Learning computes and can be assigned at the workspace. For more information. For more information, visit https://aka.ms/amlpolicydoc. Default: enforceSetting
Allowed: (enforceSetting, disabled)
2022-04-01 20:29:14
change: Major, suffix remains equal (3.0.0-preview > 4.0.0-preview)
Monitoringca817e41-e85a-4783-bc7f-dc532d36235eConfigure Windows virtual machines to run Azure Monitor Agent using system-assigned managed identityAutomate the deployment of Azure Monitor Agent extension on your Windows virtual machines for collecting telemetry data from the guest OS. This policy will install the extension if the OS and region are supported and system-assigned managed identity is enabled, and skip install otherwise. Learn more: https://aka.ms/AMAOverview. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Virtual Machine Contributor
2022-04-01 20:29:14
change: Major (3.0.0 > 4.0.0)
Regulatory Compliance238cef2f-9f76-41fa-be5e-0899a7aad0d8Microsoft Managed Control 1821 - Data QualityMicrosoft implements this Data Quality and Integrity control Fixed: audit
2022-04-01 20:29:14
add: 238cef2f-9f76-41fa-be5e-0899a7aad0d8
Kubernetes82985f06-dc18-4a48-bc1c-b9f4f0098cfeKubernetes cluster pods should only use approved host network and port rangeRestrict pod access to the host network and the allowable host port range in a Kubernetes cluster. This recommendation is part of CIS 5.2.4 which is intended to improve the security of your Kubernetes environments. This policy is generally available for Kubernetes Service (AKS), and preview for AKS Engine and Azure Arc enabled Kubernetes. For more information, see https://aka.ms/kubepolicydoc. Default: Audit
Allowed: (audit, Audit, deny, Deny, disabled, Disabled)
2022-04-01 20:29:14
change: Minor (4.0.2 > 4.1.0)
Regulatory Complianceb083a535-a66a-41ec-ba7f-f9498bf67cdeMicrosoft Managed Control 1711 - Security Functionality VerificationMicrosoft implements this System and Information Integrity control Fixed: audit
2022-04-01 20:29:14
change: Patch (1.0.0 > 1.0.1)
Regulatory Compliance1189aa19-fbcf-4b3e-b9ec-76508e2fa17bMicrosoft Managed Control 1850 - Redress Microsoft implements this Individual Participation and Redress control Fixed: audit
2022-04-01 20:29:14
add: 1189aa19-fbcf-4b3e-b9ec-76508e2fa17b
Kubernetese345eecc-fa47-480f-9e88-67dcc122b164Kubernetes cluster containers CPU and memory resource limits should not exceed the specified limitsEnforce container CPU and memory resource limits to prevent resource exhaustion attacks in a Kubernetes cluster. This policy is generally available for Kubernetes Service (AKS), and preview for AKS Engine and Azure Arc enabled Kubernetes. For more information, see https://aka.ms/kubepolicydoc. Default: Deny
Allowed: (audit, Audit, deny, Deny, disabled, Disabled)
2022-04-01 20:29:14
change: Minor (7.0.1 > 7.1.0)
Regulatory Compliance12718e41-af09-43b9-b6e4-7caae73b410bMicrosoft Managed Control 1754 - Testing, Training, And MonitoringMicrosoft implements this Program Management control Fixed: audit
2022-04-01 20:29:14
add: 12718e41-af09-43b9-b6e4-7caae73b410b
Regulatory Compliance0a2119c1-f068-4bfe-9f03-db94317e8db9Microsoft Managed Control 1855 - Inventory of Personally Identifiable Information Microsoft implements this Security control Fixed: audit
2022-04-01 20:29:14
add: 0a2119c1-f068-4bfe-9f03-db94317e8db9
Regulatory Compliance27a69937-af92-4198-9b86-08d355c7e59aMicrosoft Managed Control 1074 - Access Control for Portable And Mobile SystemsMicrosoft implements this Access Control control Fixed: audit
2022-04-01 20:29:14
change: Patch (1.0.0 > 1.0.1)
Regulatory Compliance3bd38f52-1833-42b2-b9aa-e1b9dcd0143bMicrosoft Managed Control 1747 - Security Authorization ProcessMicrosoft implements this Program Management control Fixed: audit
2022-04-01 20:29:14
add: 3bd38f52-1833-42b2-b9aa-e1b9dcd0143b
Regulatory Compliance0afb38a3-5e1c-4339-9ab4-df6a3dfc7da2Microsoft Managed Control 1804 - Governance And Privacy Program Microsoft implements this Accountability, Audit, and Risk Management control Fixed: audit
2022-04-01 20:29:14
add: 0afb38a3-5e1c-4339-9ab4-df6a3dfc7da2
Machine Learning77eeea86-7e81-4a7d-9067-de844d096752[Preview]: Configure allowed Python packages for specified Azure Machine Learning computesProvide allowed Python packages in specified Azure Machine Learning computes and can be assigned at the workspace. For more information, visit https://aka.ms/amlpolicydoc. Default: enforceSetting
Allowed: (enforceSetting, disabled)
2022-04-01 20:29:14
change: Major, suffix remains equal (3.0.0-preview > 4.0.0-preview)
Key Vaultbd78111f-4953-4367-9fd5-7e08808b54bfCertificates using elliptic curve cryptography should have allowed curve namesManage the allowed elliptic curve names for ECC Certificates stored in key vault. More information can be found at https://aka.ms/akvpolicy. Default: Audit
Allowed: (audit, Audit, deny, Deny, disabled, Disabled)
2022-04-01 20:29:14
change: Minor (2.0.1 > 2.1.0)
Kubernetesdf49d893-a74c-421d-bc95-c663042e5b80Kubernetes cluster containers should run with a read only root file systemRun containers with a read only root file system to protect from changes at run-time with malicious binaries being added to PATH in a Kubernetes cluster. This policy is generally available for Kubernetes Service (AKS), and preview for AKS Engine and Azure Arc enabled Kubernetes. For more information, see https://aka.ms/kubepolicydoc. Default: Audit
Allowed: (audit, Audit, deny, Deny, disabled, Disabled)
2022-04-01 20:29:14
change: Minor (4.0.2 > 4.1.0)
Regulatory Compliance0d87c70b-5012-48e9-994b-e70dd4b8def0Microsoft Managed Control 1713 - Software & Information Integrity | Integrity ChecksMicrosoft implements this System and Information Integrity control Fixed: audit
2022-04-01 20:29:14
change: Patch (1.0.0 > 1.0.1)
Regulatory Compliance3cb4787b-2c91-4aca-bf5a-577e99411c8aMicrosoft Managed Control 1825 - Data Quality | Validate PIIMicrosoft implements this Data Quality and Integrity control Fixed: audit
2022-04-01 20:29:14
add: 3cb4787b-2c91-4aca-bf5a-577e99411c8a
Regulatory Compliance40fcc635-52a2-4dbc-9523-80a1f4aa1de6Microsoft Managed Control 1438 - Media Sanitization And DisposalMicrosoft implements this Media Protection control Fixed: audit
2022-04-01 20:29:14
change: Patch (1.0.0 > 1.0.1)
Event Gridbaf19753-7502-405f-8745-370519b20483Deploy - Configure Azure Event Grid topics to use private DNS zonesUse private DNS zones to override the DNS resolution for a private endpoint. Learn more at: https://aka.ms/privatednszone. Default: DeployIfNotExists
Allowed: (deployIfNotExists, DeployIfNotExists, Disabled)
Network Contributor
2022-04-01 20:29:14
change: Minor (1.0.0 > 1.1.0)
Regulatory Complianceef080e67-0d1a-4f76-a0c5-fb9b0358485eMicrosoft Managed Control 1089 - Security AwarenessMicrosoft implements this Awareness and Training control Fixed: audit
2022-04-01 20:29:14
change: Patch (1.0.0 > 1.0.1)
Regulatory Compliance44e543aa-41db-42aa-98eb-8a5eb1db53f0Microsoft Managed Control 1712 - Software & Information IntegrityMicrosoft implements this System and Information Integrity control Fixed: audit
2022-04-01 20:29:14
change: Patch (1.0.0 > 1.0.1)
Regulatory Compliance5c5e54f6-0127-44d0-8b61-f31dc8dd6190Microsoft Managed Control 1067 - Wireless Access RestrictionsMicrosoft implements this Access Control control Fixed: audit
2022-04-01 20:29:14
change: Patch (1.0.0 > 1.0.1)
Regulatory Compliance66632c7c-d0b3-4945-a8ae-e5c62cbea386Microsoft Managed Control 1829 - Data Integrity And Data Integrity Board | Publish Agreements on WebsiteMicrosoft implements this Data Quality and Integrity control Fixed: audit
2022-04-01 20:29:14
add: 66632c7c-d0b3-4945-a8ae-e5c62cbea386
Cosmos DB1f905d99-2ab7-462c-a6b0-f709acca6c8fAzure Cosmos DB accounts should use customer-managed keys to encrypt data at restUse customer-managed keys to manage the encryption at rest of your Azure Cosmos DB. By default, the data is encrypted at rest with service-managed keys, but customer-managed keys are commonly required to meet regulatory compliance standards. Customer-managed keys enable the data to be encrypted with an Azure Key Vault key created and owned by you. You have full control and responsibility for the key lifecycle, including rotation and management. Learn more at https://aka.ms/cosmosdb-cmk. Default: Audit
Allowed: (audit, Audit, deny, Deny, disabled, Disabled)
2022-04-01 20:29:14
change: Minor (1.0.2 > 1.1.0)
Machine Learning1d413020-63de-11ea-bc55-0242ac130003[Preview]: Configure log filter expressions and datastore to be used for full logs for specified Azure Machine Learning computesProvide log filter expression and datastore to be used for full logs in specified Azure Machine Learning computes and can be assigned at the workspace. For more information, visit https://aka.ms/amlpolicydoc. Default: enforceSetting
Allowed: (enforceSetting, disabled)
2022-04-01 20:29:14
change: Major, suffix remains equal (3.0.0-preview > 4.0.0-preview)
Regulatory Compliance2bfea08c-2567-4f29-aad7-0f238ce655eaMicrosoft Managed Control 1758 - Threat Awareness ProgramMicrosoft implements this Program Management control Fixed: audit
2022-04-01 20:29:14
add: 2bfea08c-2567-4f29-aad7-0f238ce655ea
Automanageb025cfb4-3702-47c2-9110-87fe0cfcc99bConfigure virtual machines to be onboarded to Azure Automanage with Custom Configuration ProfileAzure Automanage enrolls, configures, and monitors virtual machines with best practice as defined in the Microsoft Cloud Adoption Framework for Azure. Use this policy to apply Automanage with your own customized Configuration Profile to your selected scope. Default: DeployIfNotExists
Allowed: (AuditIfNotExists, DeployIfNotExists, Disabled)
Contributor
2022-04-01 20:29:14
add: b025cfb4-3702-47c2-9110-87fe0cfcc99b
Cosmos DB0b7ef78e-a035-4f23-b9bd-aff122a1b1cfAzure Cosmos DB throughput should be limitedThis policy enables you to restrict the maximum throughput your organization can specify when creating Azure Cosmos DB databases and containers through the resource provider. It blocks the creation of autoscale resources. Default: Deny
Allowed: (audit, Audit, deny, Deny, disabled, Disabled)
2022-04-01 20:29:14
change: Minor (1.0.0 > 1.1.0)
Regulatory Compliance05a32666-d134-4842-a8cb-5c299f4bc099Microsoft Managed Control 1728 - Incident HandlingMicrosoft implements this Incident Response control Fixed: audit
2022-04-01 20:29:14
add: 05a32666-d134-4842-a8cb-5c299f4bc099
Regulatory Complianceb23bd715-5d1c-4e5c-9759-9cbdf79ded9dMicrosoft Managed Control 1091 - Security AwarenessMicrosoft implements this Awareness and Training control Fixed: audit
2022-04-01 20:29:14
change: Patch (1.0.0 > 1.0.1)
Regulatory Compliance68f837d0-8942-4b1e-9b31-be78b247bda8Microsoft Managed Control 1070 - Wireless Access Restrictions | Disable Wireless NetworkingMicrosoft implements this Access Control control Fixed: audit
2022-04-01 20:29:14
change: Patch (1.0.0 > 1.0.1)
Regulatory Compliance2234feec-08c6-4fc9-af78-df0dcc482efdMicrosoft Managed Control 1860 - Privacy NoticeMicrosoft implements this Transparency control Fixed: audit
2022-04-01 20:29:14
add: 2234feec-08c6-4fc9-af78-df0dcc482efd
Storage4fa4b6c0-31ca-4c0d-b10d-24b96f62a751[Preview]: Storage account public access should be disallowedAnonymous public read access to containers and blobs in Azure Storage is a convenient way to share data but might present security risks. To prevent data breaches caused by undesired anonymous access, Microsoft recommends preventing public access to a storage account unless your scenario requires it. Default: Audit
Allowed: (audit, Audit, deny, Deny, disabled, Disabled)
2022-04-01 20:29:14
change: Minor, suffix remains equal (3.0.1-preview > 3.1.0-preview)
Kubernetesb2fd3e59-6390-4f2b-8247-ea676bd03e2d[Deprecated]: Enforce unique ingress hostnames across namespaces in Kubernetes clusterThis policy enforces unique ingress hostnames across namespaces in a Kubernetes cluster. For instructions on using this policy, please go to https://aka.ms/kubepolicydoc. Default: Deny
Allowed: (audit, Audit, deny, Deny, disabled, Disabled)
2022-04-01 20:29:14
change: Minor, suffix remains equal (4.0.2-deprecated > 4.1.0-deprecated)
Regulatory Compliance58f477bf-287b-43ef-ab49-dffde92130a0Microsoft Managed Control 1816 - Privacy Reporting Microsoft implements this Accountability, Audit, and Risk Management control Fixed: audit
2022-04-01 20:29:14
add: 58f477bf-287b-43ef-ab49-dffde92130a0
Monitoring6fc8115b-2008-441f-8c61-9b722c1e537fWorkbooks should be saved to storage accounts that you controlWith bring your own storage (BYOS), your workbooks are uploaded into a storage account that you control. That means you control the encryption-at-rest policy, the lifetime management policy, and network access. You will, however, be responsible for the costs associated with that storage account. For more information, visit https://aka.ms/workbooksByos Default: Audit
Allowed: (deny, Deny, audit, Audit, disabled, Disabled)
2022-04-01 20:29:14
change: Minor (1.0.0 > 1.1.0)
Regulatory Compliance7c6de11b-5f51-4f7c-8d83-d2467c8a816eMicrosoft Managed Control 1143 - Certification, Authorization, Security Assessment Policy And ProceduresMicrosoft implements this Security Assessment and Authorization control Fixed: audit
2022-04-01 20:29:14
change: Patch (1.0.0 > 1.0.1)
Regulatory Compliance956b00aa-7977-4214-a0f5-e0428c1f9bffMicrosoft Managed Control 1806 - Governance And Privacy Program Microsoft implements this Accountability, Audit, and Risk Management control Fixed: audit
2022-04-01 20:29:14
add: 956b00aa-7977-4214-a0f5-e0428c1f9bff
Kubernetes233a2a17-77ca-4fb1-9b6b-69223d272a44Kubernetes cluster services should listen only on allowed portsRestrict services to listen only on allowed ports to secure access to the Kubernetes cluster. This policy is generally available for Kubernetes Service (AKS), and preview for AKS Engine and Azure Arc enabled Kubernetes. For more information, see https://aka.ms/kubepolicydoc. Default: Deny
Allowed: (audit, Audit, deny, Deny, disabled, Disabled)
2022-04-01 20:29:14
change: Minor (6.1.2 > 6.2.0)
Regulatory Compliance0c92e78e-4667-44f1-8b1d-bbc784b66950Microsoft Managed Control 1755 - Contacts With Security Groups And AssociationsMicrosoft implements this Program Management control Fixed: audit
2022-04-01 20:29:14
add: 0c92e78e-4667-44f1-8b1d-bbc784b66950
Kubernetesc050047b-b21b-4822-8a2d-c1e37c3c0c6aConfigure Kubernetes clusters with specified GitOps configuration using SSH secretsDeploy a 'sourceControlConfiguration' to Kubernetes clusters to assure that the clusters get their source of truth for workloads and configurations from the defined git repo. This definition requires a SSH private key secret in Key Vault. For instructions, visit https://aka.ms/K8sGitOpsPolicy. Default: DeployIfNotExists
Allowed: (auditIfNotExists, AuditIfNotExists, deployIfNotExists, DeployIfNotExists, disabled, Disabled)
Contributor
2022-04-01 20:29:14
change: Minor (1.0.1 > 1.1.0)
Regulatory Compliancebaff1279-05e0-4463-9a70-8ba5de4c7aa4Microsoft Managed Control 1726 - Information Output Handling And RetentionMicrosoft implements this System and Information Integrity control Fixed: audit
2022-04-01 20:29:14
change: Patch (1.0.0 > 1.0.1)
Regulatory Compliancead2f8e61-a564-4dfd-8eaa-816f5be8cb34Microsoft Managed Control 1569 - Acquisitions ProcessMicrosoft implements this System and Services Acquisition control Fixed: audit
2022-04-01 20:29:14
change: Patch (1.0.0 > 1.0.1)
Monitoring6c53d030-cc64-46f0-906d-2bc061cd1334Log Analytics workspaces should block log ingestion and querying from public networksImprove workspace security by blocking log ingestion and querying from public networks. Only private-link connected networks will be able to ingest and query logs on this workspace. Learn more at https://aka.ms/AzMonPrivateLink#configure-log-analytics. Default: Audit
Allowed: (audit, Audit, deny, Deny, disabled, Disabled)
2022-04-01 20:29:14
change: Minor (1.0.0 > 1.1.0)
Regulatory Compliance106618ad-fe3e-49b4-bfef-01009f6770d8Microsoft Managed Control 1820 - Accounting of Disclosures Microsoft implements this Accountability, Audit, and Risk Management control Fixed: audit
2022-04-01 20:29:14
add: 106618ad-fe3e-49b4-bfef-01009f6770d8
Regulatory Compliance33cfabfd-49ce-432b-b988-aff483ca3897Microsoft Managed Control 1871 - Information Sharing with Third Parties Microsoft implements this Use Limitation control Fixed: audit
2022-04-01 20:29:14
add: 33cfabfd-49ce-432b-b988-aff483ca3897
Azure Stack Edgeb4ac1030-89c5-4697-8e00-28b5ba6a8811Azure Stack Edge devices should use double-encryptionTo secure the data at rest on the device, ensure it's double-encrypted, the access to data is controlled, and once the device is deactivated, the data is securely erased off the data disks. Double encryption is the use of two layers of encryption: BitLocker XTS-AES 256-bit encryption on the data volumes and built-in encryption of the hard drives. Learn more in the security overview documentation for the specific Stack Edge device. Default: Audit
Allowed: (audit, Audit, deny, Deny, disabled, Disabled)
2022-04-01 20:29:14
change: Minor (1.0.0 > 1.1.0)
Key Vault0a075868-4c26-42ef-914c-5bc007359560[Preview]: Certificates should have the specified maximum validity periodManage your organizational compliance requirements by specifying the maximum amount of time that a certificate can be valid within your key vault. Default: Audit
Allowed: (audit, Audit, deny, Deny, disabled, Disabled)
2022-04-01 20:29:14
change: Minor, suffix remains equal (2.1.0-preview > 2.2.0-preview)
Regulatory Compliance1ca29e41-34ec-4e70-aba9-6248aca18c31Microsoft Managed Control 1072 - Wireless Access Restrictions | Antennas / Transmission Power LevelsMicrosoft implements this Access Control control Fixed: audit
2022-04-01 20:29:14
change: Patch (1.0.0 > 1.0.1)
Regulatory Compliancedd469ae0-71a8-4adc-aafc-de6949ca3339Microsoft Managed Control 1715 - Software & Information Integrity | Automated Response To Integrity ViolationsMicrosoft implements this System and Information Integrity control Fixed: audit
2022-04-01 20:29:14
change: Patch (1.0.0 > 1.0.1)
Regulatory Complianceb6a8e0cc-ac23-468b-abe4-a8a1cc6d7a08Microsoft Managed Control 1301 - User Identification And Authentication | Network Access To Privileged AccountsMicrosoft implements this Identification and Authentication control Fixed: audit
2022-04-01 20:29:14
change: Patch (1.0.0 > 1.0.1)
Regulatory Compliance05f5163b-bd90-49eb-8b6e-c1044d0b170aMicrosoft Managed Control 1752 - Information Security WorkforceMicrosoft implements this Program Management control Fixed: audit
2022-04-01 20:29:14
add: 05f5163b-bd90-49eb-8b6e-c1044d0b170a
Regulatory Compliance32d58eb6-4c76-4881-87ce-522b0e787bd0Microsoft Managed Control 1735 - Information Security ResourcesMicrosoft implements this Program Management control Fixed: audit
2022-04-01 20:29:14
add: 32d58eb6-4c76-4881-87ce-522b0e787bd0
Regulatory Complianced39620a4-95c6-4d4f-8aa4-83c0c6a2c640Microsoft Managed Control 1818 - Accounting of Disclosures Microsoft implements this Accountability, Audit, and Risk Management control Fixed: audit
2022-04-01 20:29:14
add: d39620a4-95c6-4d4f-8aa4-83c0c6a2c640
Regulatory Compliancefd4a2ac8-868a-4702-a345-6c896c3361ceMicrosoft Managed Control 1707 - Security Alerts & Advisories | Automated Alerts And AdvisoriesMicrosoft implements this System and Information Integrity control Fixed: audit
2022-04-01 20:29:14
change: Patch (1.0.0 > 1.0.1)
Regulatory Compliance99deec7d-5526-472e-b07c-3645a792026aMicrosoft Managed Control 1300 - User Identification And AuthenticationMicrosoft implements this Identification and Authentication control Fixed: audit
2022-04-01 20:29:14
change: Patch (1.0.0 > 1.0.1)
Monitoring1f68a601-6e6d-4e42-babf-3f643a047ea2Azure Monitor Logs clusters should be encrypted with customer-managed keyCreate Azure Monitor logs cluster with customer-managed keys encryption. By default, the log data is encrypted with service-managed keys, but customer-managed keys are commonly required to meet regulatory compliance. Customer-managed key in Azure Monitor gives you more control over the access to you data, see https://docs.microsoft.com/azure/azure-monitor/platform/customer-managed-keys. Default: Audit
Allowed: (audit, Audit, deny, Deny, disabled, Disabled)
2022-04-01 20:29:14
change: Minor (1.0.0 > 1.1.0)
Key Vaultcee51871-e572-4576-855c-047c820360f0Certificates using RSA cryptography should have the specified minimum key sizeManage your organizational compliance requirements by specifying a minimum key size for RSA certificates stored in your key vault. Default: Audit
Allowed: (audit, Audit, deny, Deny, disabled, Disabled)
2022-04-01 20:29:14
change: Minor (2.0.1 > 2.1.0)
Regulatory Compliance2d5600ed-575a-4723-9ff4-52d694be0a59Microsoft Managed Control 1856 - Privacy Incident Response Microsoft implements this Security control Fixed: audit
2022-04-01 20:29:14
add: 2d5600ed-575a-4723-9ff4-52d694be0a59
Regulatory Compliance56a838e0-0a5d-49a8-ab74-bf6be81b32f5Microsoft Managed Control 1835 - Data Retention And DisposalMicrosoft implements this Data Minimization and Retention control Fixed: audit
2022-04-01 20:29:14
add: 56a838e0-0a5d-49a8-ab74-bf6be81b32f5
Managed Application9db7917b-1607-4e7d-a689-bca978dd0633Application definition for Managed Application should use customer provided storage accountUse your own storage account to control the application definition data when this is a regulatory or compliance requirement. You can choose to store your managed application definition within a storage account provided by you during creation, so that its location and access can be fully managed by you to fulfill regulatory compliance requirements. Default: Audit
Allowed: (audit, Audit, deny, Deny, disabled, Disabled)
2022-04-01 20:29:14
change: Minor (1.0.0 > 1.1.0)
Regulatory Compliancef7161f06-5260-4f0f-aeae-4bbfb8612a10Microsoft Managed Control 1812 - Privacy Monitoring And Auditing Microsoft implements this Accountability, Audit, and Risk Management control Fixed: audit
2022-04-01 20:29:14
add: f7161f06-5260-4f0f-aeae-4bbfb8612a10
Regulatory Compliance99efece4-6828-42a4-9577-ff06bc1c4bf4Microsoft Managed Control 1839 - Minimization of PII Used in Testing, Training, And ResearchMicrosoft implements this Data Minimization and Retention control Fixed: audit
2022-04-01 20:29:14
add: 99efece4-6828-42a4-9577-ff06bc1c4bf4
Regulatory Compliance4e26f8c3-4bf3-4191-b8fc-d888805101b7Microsoft Managed Control 1001 - Access Control Policy And Procedures RequirementsMicrosoft implements this Access Control control Fixed: audit
2022-04-01 20:29:14
change: Patch (1.0.0 > 1.0.1)
Key Vault1151cede-290b-4ba0-8b38-0ad145ac888fCertificates should use allowed key typesManage your organizational compliance requirements by restricting the key types allowed for certificates. Default: Audit
Allowed: (audit, Audit, deny, Deny, disabled, Disabled)
2022-04-01 20:29:14
change: Minor (2.0.1 > 2.1.0)
Regulatory Compliance70792197-9bfc-4813-905a-bd33993e327fMicrosoft Managed Control 1509 - Position CategorizationMicrosoft implements this Personnel Security control Fixed: audit
2022-04-01 20:29:14
change: Patch (1.0.0 > 1.0.1)
Monitoringa4034bc6-ae50-406d-bf76-50f4ee5a7811Configure Linux virtual machines to run Azure Monitor Agent with system-assigned managed identity-based authenticationAutomate the deployment of Azure Monitor Agent extension on your Linux virtual machines for collecting telemetry data from the guest OS. This policy will install the extension if the OS and region are supported and system-assigned managed identity is enabled, and skip install otherwise. Learn more: https://aka.ms/AMAOverview. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Virtual Machine Contributor
2022-04-01 20:29:14
change: Patch (1.1.0 > 1.1.1)
Monitoringfa298e57-9444-42ba-bf04-86e8470e32c7Saved-queries in Azure Monitor should be saved in customer storage account for logs encryptionLink storage account to Log Analytics workspace to protect saved-queries with storage account encryption. Customer-managed keys are commonly required to meet regulatory compliance and for more control over the access to your saved-queries in Azure Monitor. For more details on the above, see https://docs.microsoft.com/azure/azure-monitor/platform/customer-managed-keys?tabs=portal#customer-managed-key-for-saved-queries. Default: Audit
Allowed: (audit, Audit, deny, Deny, disabled, Disabled)
2022-04-01 20:29:14
change: Minor (1.0.0 > 1.1.0)
Regulatory Compliance7cb8a3d2-a208-4b6f-95e8-e8f0bb85a7a6Microsoft Managed Control 1807 - Governance And Privacy Program Microsoft implements this Accountability, Audit, and Risk Management control Fixed: audit
2022-04-01 20:29:14
add: 7cb8a3d2-a208-4b6f-95e8-e8f0bb85a7a6
Regulatory Compliance4e54c7ef-7457-430b-9a3e-ef8881d4a8e0Microsoft Managed Control 1579 - Acquisitions Process | Use Of Approved Piv ProductsMicrosoft implements this System and Services Acquisition control Fixed: audit
2022-04-01 20:29:14
change: Patch (1.0.0 > 1.0.1)
Regulatory Compliance9870806c-153f-4fa5-aafa-c5f5eeb72292Microsoft Managed Control 1741 - Enterprise ArchitectureMicrosoft implements this Program Management control Fixed: audit
2022-04-01 20:29:14
add: 9870806c-153f-4fa5-aafa-c5f5eeb72292
Regulatory Compliance395736bb-aa8b-45f0-b9cc-06af26b2b1d4Microsoft Managed Control 1810 - Privacy Requirements for Contractors And Service Providers Microsoft implements this Accountability, Audit, and Risk Management control Fixed: audit
2022-04-01 20:29:14
add: 395736bb-aa8b-45f0-b9cc-06af26b2b1d4
Regulatory Compliance65c11daf-e754-406e-8d7b-f337dbd46a4fMicrosoft Managed Control 1800 - Authority to CollectMicrosoft implements this Authority and Purpose control Fixed: audit
2022-04-01 20:29:14
add: 65c11daf-e754-406e-8d7b-f337dbd46a4f
Regulatory Compliancecafc6c3c-5fc5-4c5e-a99b-a0ccb1d34effMicrosoft Managed Control 1306 - User Identification And Authentication | Network Access To Privileged Accounts - Replay...Microsoft implements this Identification and Authentication control Fixed: audit
2022-04-01 20:29:14
change: Patch (1.0.0 > 1.0.1)
Regulatory Compliancea7fcf38d-bb09-4600-be7d-825046eb162aMicrosoft Managed Control 1570 - Acquisitions ProcessMicrosoft implements this System and Services Acquisition control Fixed: audit
2022-04-01 20:29:14
change: Patch (1.0.0 > 1.0.1)
Key Vault8e826246-c976-48f6-b03e-619bb92b3d82Certificates should be issued by the specified integrated certificate authorityManage your organizational compliance requirements by specifying the Azure integrated certificate authorities that can issue certificates in your key vault such as Digicert or GlobalSign. Default: Audit
Allowed: (audit, Audit, deny, Deny, disabled, Disabled)
2022-04-01 20:29:14
change: Minor (2.0.1 > 2.1.0)
Kubernetes9f061a12-e40d-4183-a00e-171812443373Kubernetes clusters should not use the default namespacePrevent usage of the default namespace in Kubernetes clusters to protect against unauthorized access for ConfigMap, Pod, Secret, Service, and ServiceAccount resource types. For more information, see https://aka.ms/kubepolicydoc. Default: Audit
Allowed: (audit, Audit, deny, Deny, disabled, Disabled)
2022-04-01 20:29:14
change: Minor (2.1.2 > 2.2.0)
Regulatory Compliance1c0b3710-03dc-450a-a56a-77b85e744f0dMicrosoft Managed Control 1749 - Mission/Business Process DefinitionMicrosoft implements this Program Management control Fixed: audit
2022-04-01 20:29:14
add: 1c0b3710-03dc-450a-a56a-77b85e744f0d
Key Vaultf772fb64-8e40-40ad-87bc-7706e1949427[Preview]: Certificates should not expire within the specified number of daysManage certificates that will expire within a specified number of days to ensure your organization has sufficient time to rotate the certificate prior to expiration. Default: Audit
Allowed: (audit, Audit, deny, Deny, disabled, Disabled)
2022-04-01 20:29:14
change: Minor, suffix remains equal (2.0.1-preview > 2.1.0-preview)
Kubernetes56d0a13f-712f-466b-8416-56fb354fb823Kubernetes cluster containers should not use forbidden sysctl interfacesContainers should not use forbidden sysctl interfaces in a Kubernetes cluster. This recommendation is part of Pod Security Policies which are intended to improve the security of your Kubernetes environments. This policy is generally available for Kubernetes Service (AKS), and preview for AKS Engine and Azure Arc enabled Kubernetes. For more information, see https://aka.ms/kubepolicydoc. Default: Audit
Allowed: (audit, Audit, deny, Deny, disabled, Disabled)
2022-04-01 20:29:14
change: Minor (5.0.0 > 5.1.0)
Kubernetes1c6e92c9-99f0-4e55-9cf2-0c234dc48f99Kubernetes clusters should not allow container privilege escalationDo not allow containers to run with privilege escalation to root in a Kubernetes cluster. This recommendation is part of CIS 5.2.5 which is intended to improve the security of your Kubernetes environments. This policy is generally available for Kubernetes Service (AKS), and preview for AKS Engine and Azure Arc enabled Kubernetes. For more information, see https://aka.ms/kubepolicydoc. Default: Audit
Allowed: (audit, Audit, deny, Deny, disabled, Disabled)
2022-04-01 20:29:14
change: Minor (4.0.1 > 4.1.0)
Regulatory Compliancef355d62b-39a8-4ba3-abf7-90f71cb3b000Microsoft Managed Control 1309 - User Identification And Authentication | Acceptance Of Piv CredentialsMicrosoft implements this Identification and Authentication control Fixed: audit
2022-04-01 20:29:14
change: Patch (1.0.0 > 1.0.1)
Regulatory Compliance20ea0798-d19e-4925-afd0-53d583815818Microsoft Managed Control 1815 - Privacy Awareness And Training Microsoft implements this Accountability, Audit, and Risk Management control Fixed: audit
2022-04-01 20:29:14
add: 20ea0798-d19e-4925-afd0-53d583815818
Regulatory Compliance2e0ffcf5-c19e-4e04-ad0f-2db9b15ab126Microsoft Managed Control 1751 - Insider Threat ProgramMicrosoft implements this Program Management control Fixed: audit
2022-04-01 20:29:14
add: 2e0ffcf5-c19e-4e04-ad0f-2db9b15ab126
Regulatory Compliance4152937a-1a44-401a-a179-04b44ea15f4cMicrosoft Managed Control 1733 - Senior Information Security OfficerMicrosoft implements this Program Management control Fixed: audit
2022-04-01 20:29:14
add: 4152937a-1a44-401a-a179-04b44ea15f4c
Backup98d0b9f8-fd90-49c9-88e2-d3baf3b0dd86Configure backup on virtual machines without a given tag to a new recovery services vault with a default policyEnforce backup for all virtual machines by deploying a recovery services vault in the same location and resource group as the virtual machine. Doing this is useful when different application teams in your organization are allocated separate resource groups and need to manage their own backups and restores. You can optionally exclude virtual machines containing a specified tag to control the scope of assignment. See https://aka.ms/AzureVMAppCentricBackupExcludeTag. Default: DeployIfNotExists
Allowed: (auditIfNotExists, AuditIfNotExists, deployIfNotExists, DeployIfNotExists, disabled, Disabled)
Virtual Machine Contributor
Backup Contributor
2022-04-01 20:29:14
change: Minor (6.0.0 > 6.1.0)
Regulatory Complianceaf2a93c8-e6dd-4c94-acdd-4a2eedfc478eMicrosoft Managed Control 1710 - Security Functionality VerificationMicrosoft implements this System and Information Integrity control Fixed: audit
2022-04-01 20:29:14
change: Patch (1.0.0 > 1.0.1)
Regulatory Compliance3492d949-0dbb-4589-88b3-7b59601cc764Microsoft Managed Control 1412 - Remote MaintenanceMicrosoft implements this Maintenance control Fixed: audit
2022-04-01 20:29:14
change: Patch (1.0.0 > 1.0.1)
App Servicec75248c1-ea1d-4a9c-8fc9-29a6aabd5da8Authentication should be enabled on your Function appAzure App Service Authentication is a feature that can prevent anonymous HTTP requests from reaching the Function app, or authenticate those that have tokens before they reach the Function app Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2022-04-01 20:29:14
change: Major (1.0.0 > 2.0.0)
Regulatory Complianceb92ae63b-4411-48ba-b5c9-5bcaef5f8d02Microsoft Managed Control 1841 - ConsentMicrosoft implements this Individual Participation and Redress control Fixed: audit
2022-04-01 20:29:14
add: b92ae63b-4411-48ba-b5c9-5bcaef5f8d02
Regulatory Compliance9d9166a8-1722-4b8f-847c-2cf3f2618b3dMicrosoft Managed Control 1305 - User Identification And Authentication | Group AuthenticationMicrosoft implements this Identification and Authentication control Fixed: audit
2022-04-01 20:29:14
change: Patch (1.0.0 > 1.0.1)
Regulatory Compliance07458826-9325-4481-abaf-bc9ed043459dMicrosoft Managed Control 1744 - Risk Management StrategyMicrosoft implements this Program Management control Fixed: audit
2022-04-01 20:29:14
add: 07458826-9325-4481-abaf-bc9ed043459d
Kubernetes46592696-4c7b-4bf3-9e45-6c2763bdc0a6Kubernetes cluster pods should use specified labelsUse specified labels to identify the pods in a Kubernetes cluster. This policy is generally available for Kubernetes Service (AKS), and preview for AKS Engine and Azure Arc enabled Kubernetes. For more information, see https://aka.ms/kubepolicydoc. Default: Deny
Allowed: (audit, Audit, deny, Deny, disabled, Disabled)
2022-04-01 20:29:14
change: Minor (6.0.1 > 6.1.0)
Kubernetes1b708b0a-3380-40e9-8b79-821f9fa224ccDisable Command Invoke on Azure Kubernetes Service clustersDisabling command invoke can enhance the security by rejecting invoke-command access to the cluster Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Azure Kubernetes Service Contributor Role
Azure Kubernetes Service Policy Add-on Deployment
2022-04-01 20:29:14
add: 1b708b0a-3380-40e9-8b79-821f9fa224cc
Regulatory Compliance7a1e2c88-13de-4959-8ee7-47e3d74f1f48Microsoft Managed Control 1708 - Security Functionality VerificationMicrosoft implements this System and Information Integrity control Fixed: audit
2022-04-01 20:29:14
change: Patch (1.0.0 > 1.0.1)
Regulatory Compliancecd6120c1-d069-416d-9753-fbe84bca4b01Microsoft Managed Control 1808 - Privacy Impact And Risk Assessment Microsoft implements this Accountability, Audit, and Risk Management control Fixed: audit
2022-04-01 20:29:14
add: cd6120c1-d069-416d-9753-fbe84bca4b01
Regulatory Complianced02e586f-d430-4053-b672-c14a788ad59fMicrosoft Managed Control 1823 - Data QualityMicrosoft implements this Data Quality and Integrity control Fixed: audit
2022-04-01 20:29:14
add: d02e586f-d430-4053-b672-c14a788ad59f
Regulatory Complianceb6a8eae8-9854-495a-ac82-d2cd3eac02a6Microsoft Managed Control 1568 - Acquisitions ProcessMicrosoft implements this System and Services Acquisition control Fixed: audit
2022-04-01 20:29:14
change: Patch (1.0.0 > 1.0.1)
Regulatory Compliance2d44b6fa-1134-4ea6-ad4e-9edb68f65429Microsoft Managed Control 1704 - Security Alerts & AdvisoriesMicrosoft implements this System and Information Integrity control Fixed: audit
2022-04-01 20:29:14
change: Patch (1.0.0 > 1.0.1)
Regulatory Compliance12a4a4dd-6c65-4900-9d7e-63fed5da791eMicrosoft Managed Control 1834 - Data Retention And DisposalMicrosoft implements this Data Minimization and Retention control Fixed: audit
2022-04-01 20:29:14
add: 12a4a4dd-6c65-4900-9d7e-63fed5da791e
Regulatory Compliance2ab0c8e3-b8ef-48e9-b6ac-a0c5e713a757Microsoft Managed Control 1746 - Security Authorization ProcessMicrosoft implements this Program Management control Fixed: audit
2022-04-01 20:29:14
add: 2ab0c8e3-b8ef-48e9-b6ac-a0c5e713a757
Regulatory Compliance74520428-3aa8-449c-938d-93f51940759eMicrosoft Managed Control 1739 - Information System InventoryMicrosoft implements this Program Management control Fixed: audit
2022-04-01 20:29:14
add: 74520428-3aa8-449c-938d-93f51940759e
Regulatory Compliancee17a106b-cf45-431e-89dc-da71e161c40cMicrosoft Managed Control 1801 - Purpose SpecificationMicrosoft implements this Authority and Purpose control Fixed: audit
2022-04-01 20:29:14
add: e17a106b-cf45-431e-89dc-da71e161c40c
Regulatory Complianced77fd943-6ba6-4a21-ba07-22b03e347cc4Microsoft Managed Control 1350 - Identification And Authentication (Non-Organizational Users) | Use Of Ficam-Issued ProfilesMicrosoft implements this Identification and Authentication control Fixed: audit
2022-04-01 20:29:14
change: Patch (1.0.0 > 1.0.1)
Kubernetes95edb821-ddaf-4404-9732-666045e056b4Kubernetes cluster should not allow privileged containersDo not allow privileged containers creation in a Kubernetes cluster. This recommendation is part of CIS 5.2.1 which is intended to improve the security of your Kubernetes environments. This policy is generally available for Kubernetes Service (AKS), and preview for AKS Engine and Azure Arc enabled Kubernetes. For more information, see https://aka.ms/kubepolicydoc. Default: Deny
Allowed: (audit, Audit, deny, Deny, disabled, Disabled)
2022-04-01 20:29:14
change: Minor (7.0.1 > 7.1.0)
Regulatory Compliance4b0d8d1d-7800-4b62-b4bf-6eecde12b2afMicrosoft Managed Control 1813 - Privacy Awareness And Training Microsoft implements this Accountability, Audit, and Risk Management control Fixed: audit
2022-04-01 20:29:14
add: 4b0d8d1d-7800-4b62-b4bf-6eecde12b2af
Regulatory Complianced5f959a0-1808-4ebd-9a13-79237246f96fMicrosoft Managed Control 1861 - Privacy Notice | Real-Time or Layered NoticeMicrosoft implements this Transparency control Fixed: audit
2022-04-01 20:29:14
add: d5f959a0-1808-4ebd-9a13-79237246f96f
API for FHIR051cba44-2429-45b9-9649-46cec11c7119Azure API for FHIR should use a customer-managed key to encrypt data at restUse a customer-managed key to control the encryption at rest of the data stored in Azure API for FHIR when this is a regulatory or compliance requirement. Customer-managed keys also deliver double encryption by adding a second layer of encryption on top of the default one done with service-managed keys. Default: Audit
Allowed: (audit, Audit, disabled, Disabled)
2022-04-01 20:29:14
change: Minor (1.0.1 > 1.1.0)
Regulatory Compliance18573dd5-899f-453d-b069-fa77b61fe257Microsoft Managed Control 1870 - Information Sharing with Third Parties Microsoft implements this Use Limitation control Fixed: audit
2022-04-01 20:29:14
add: 18573dd5-899f-453d-b069-fa77b61fe257
Regulatory Compliance4c6df994-1810-44c9-bd35-3280397cf9a6Microsoft Managed Control 1868 - Internal UseMicrosoft implements this Use Limitation control Fixed: audit
2022-04-01 20:29:14
add: 4c6df994-1810-44c9-bd35-3280397cf9a6
Regulatory Compliance91c97b44-791e-46e9-bad7-ab7c4949edbbMicrosoft Managed Control 1069 - Wireless Access Restrictions | Authentication And EncryptionMicrosoft implements this Access Control control Fixed: audit
2022-04-01 20:29:14
change: Patch (1.0.0 > 1.0.1)
Regulatory Compliance6b04f815-52d7-4ff6-94bf-a4f22c07d5aeMicrosoft Managed Control 1809 - Privacy Impact And Risk Assessment Microsoft implements this Accountability, Audit, and Risk Management control Fixed: audit
2022-04-01 20:29:14
add: 6b04f815-52d7-4ff6-94bf-a4f22c07d5ae
Regulatory Compliance81817e1c-5347-48dd-965a-40159d008229Microsoft Managed Control 1308 - User Identification And Authentication | Remote Access - Separate DeviceMicrosoft implements this Identification and Authentication control Fixed: audit
2022-04-01 20:29:14
change: Patch (1.0.0 > 1.0.1)
Cosmos DB0473574d-2d43-4217-aefe-941fcdf7e684Azure Cosmos DB allowed locationsThis policy enables you to restrict the locations your organization can specify when deploying Azure Cosmos DB resources. Use to enforce your geo-compliance requirements. Default: Deny
Allowed: (audit, Audit, deny, Deny, disabled, Disabled)
2022-04-01 20:29:14
change: Minor (1.0.0 > 1.1.0)
Regulatory Complianceb6747bf9-2b97-45b8-b162-3c8becb9937dMicrosoft Managed Control 1419 - Remote Maintenance | Cryptographic ProtectionMicrosoft implements this Maintenance control Fixed: audit
2022-04-01 20:29:14
change: Patch (1.0.0 > 1.0.1)
Monitoringae8a10e6-19d6-44a3-a02d-a2bdfc707742Configure Linux virtual machines to run Azure Monitor Agent with user-assigned managed identity-based authenticationAutomate the deployment of Azure Monitor Agent extension on your Linux virtual machines for collecting telemetry data from the guest OS. This policy will install the extension and configure it to use the specified user-assigned managed identity if the OS and region are supported, and skip install otherwise. Learn more: https://aka.ms/AMAOverview. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Virtual Machine Contributor
2022-04-01 20:29:14
add: ae8a10e6-19d6-44a3-a02d-a2bdfc707742
Regulatory Compliance2fd50ffd-c983-4fab-862c-678b95bfaf5aMicrosoft Managed Control 1832 - Minimization of Personally Identifiable InformationMicrosoft implements this Data Minimization and Retention control Fixed: audit
2022-04-01 20:29:14
add: 2fd50ffd-c983-4fab-862c-678b95bfaf5a
Regulatory Compliance76f500cc-4bca-4583-bda1-6d084dc21086Microsoft Managed Control 1508 - Position CategorizationMicrosoft implements this Personnel Security control Fixed: audit
2022-04-01 20:29:14
change: Patch (1.0.0 > 1.0.1)
Machine Learning53c70b02-63dd-11ea-bc55-0242ac130003[Preview]: Configure allowed module authors for specified Azure Machine Learning computesProvide allowed module authors in specified Azure Machine Learning computes and can be assigned at the workspace. For more information, visit https://aka.ms/amlpolicydoc. Default: enforceSetting
Allowed: (enforceSetting, disabled)
2022-04-01 20:29:14
change: Major, suffix remains equal (4.0.0-preview > 5.0.0-preview)
Regulatory Compliance6f29a2f0-ca59-4bdc-97a7-a8d593b60108Microsoft Managed Control 1853 - Compliant Management | Response TimesMicrosoft implements this Individual Participation and Redress control Fixed: audit
2022-04-01 20:29:14
add: 6f29a2f0-ca59-4bdc-97a7-a8d593b60108
Regulatory Compliance38dfd8a3-5290-4099-88b7-4081f4c4d8aeMicrosoft Managed Control 1416 - Remote Maintenance | Document Remote MaintenanceMicrosoft implements this Maintenance control Fixed: audit
2022-04-01 20:29:14
change: Patch (1.0.0 > 1.0.1)
Regulatory Compliance898d4fe8-f743-4333-86b7-0c9245d93e7dMicrosoft Managed Control 1411 - Remote MaintenanceMicrosoft implements this Maintenance control Fixed: audit
2022-04-01 20:29:14
change: Patch (1.0.0 > 1.0.1)
Regulatory Compliance8e903bb7-00e9-4255-a881-500742a2dbaaMicrosoft Managed Control 1843 - ConsentMicrosoft implements this Individual Participation and Redress control Fixed: audit
2022-04-01 20:29:14
add: 8e903bb7-00e9-4255-a881-500742a2dbaa
Kubernetes511f5417-5d12-434d-ab2e-816901e72a5eKubernetes cluster containers should only use allowed AppArmor profilesContainers should only use allowed AppArmor profiles in a Kubernetes cluster. This recommendation is part of Pod Security Policies which are intended to improve the security of your Kubernetes environments. This policy is generally available for Kubernetes Service (AKS), and preview for AKS Engine and Azure Arc enabled Kubernetes. For more information, see https://aka.ms/kubepolicydoc. Default: Audit
Allowed: (audit, Audit, deny, Deny, disabled, Disabled)
2022-04-01 20:29:14
change: Minor (4.0.3 > 4.1.0)
Regulatory Compliance4f8e271b-dfea-47e9-b81e-5519bae0b120Microsoft Managed Control 1852 - Compliant ManagementMicrosoft implements this Individual Participation and Redress control Fixed: audit
2022-04-01 20:29:14
add: 4f8e271b-dfea-47e9-b81e-5519bae0b120
Regulatory Compliance8a29d47b-8604-4667-84ef-90d203fcb305Microsoft Managed Control 1092 - Security Awareness | Insider ThreatMicrosoft implements this Awareness and Training control Fixed: audit
2022-04-01 20:29:14
change: Patch (1.0.0 > 1.0.1)
Regulatory Complianced4de5955-e00f-414d-9c16-f569c6a99c10Microsoft Managed Control 1756 - Contacts With Security Groups And AssociationsMicrosoft implements this Program Management control Fixed: audit
2022-04-01 20:29:14
add: d4de5955-e00f-414d-9c16-f569c6a99c10
Regulatory Compliancedce72873-c5f1-47c3-9b4f-6b8207fd5a45Microsoft Managed Control 1439 - Media Sanitization And DisposalMicrosoft implements this Media Protection control Fixed: audit
2022-04-01 20:29:14
change: Patch (1.0.0 > 1.0.1)
Kubernetes423dd1ba-798e-40e4-9c4d-b6902674b423Kubernetes clusters should disable automounting API credentialsDisable automounting API credentials to prevent a potentially compromised Pod resource to run API commands against Kubernetes clusters. For more information, see https://aka.ms/kubepolicydoc. Default: Audit
Allowed: (audit, Audit, deny, Deny, disabled, Disabled)
2022-04-01 20:29:14
change: Minor (2.0.2 > 2.1.0)
Regulatory Compliance4edd8330-da6b-4f1e-b996-e064d8b92cb7Microsoft Managed Control 1833 - Minimization of Personally Identifiable Information | Locate/Remove/Redact/Anonymize PIIMicrosoft implements this Data Minimization and Retention control Fixed: audit
2022-04-01 20:29:14
add: 4edd8330-da6b-4f1e-b996-e064d8b92cb7
Kubernetes3fc4dc25-5baf-40d8-9b05-7fe74c1bc64eKubernetes clusters should use internal load balancersUse internal load balancers to make a Kubernetes service accessible only to applications running in the same virtual network as the Kubernetes cluster. For more information, see https://aka.ms/kubepolicydoc. Default: Deny
Allowed: (audit, Audit, deny, Deny, disabled, Disabled)
2022-04-01 20:29:14
change: Minor (6.0.1 > 6.1.0)
Regulatory Compliance6bfe6405-805c-4c9b-a9d3-f209237bb95dMicrosoft Managed Control 1802 - Governance And Privacy Program Microsoft implements this Accountability, Audit, and Risk Management control Fixed: audit
2022-04-01 20:29:14
add: 6bfe6405-805c-4c9b-a9d3-f209237bb95d
Bot Service51522a96-0869-4791-82f3-981000c2c67fBot Service should be encrypted with a customer-managed keyAzure Bot Service automatically encrypts your resource to protect your data and meet organizational security and compliance commitments. By default, Microsoft-managed encryption keys are used. For greater flexibility in managing keys or controlling access to your subscription, select customer-managed keys, also known as bring your own key (BYOK). Learn more about Azure Bot Service encryption: https://docs.microsoft.com/azure/bot-service/bot-service-encryption. Default: Audit
Allowed: (audit, Audit, deny, Deny, disabled, Disabled)
2022-04-01 20:29:14
change: Minor (1.0.0 > 1.1.0)
Regulatory Compliance791cfc15-6974-42a0-9f4c-2d4b82f4a78cMicrosoft Managed Control 1647 - Use of CryptographyMicrosoft implements this System and Communications Protection control Fixed: audit
2022-04-01 20:29:14
change: Patch (1.0.0 > 1.0.1)
Regulatory Compliance5fd9ced5-18e8-4c09-91b7-3725680f8adeMicrosoft Managed Control 1734 - Information Security ResourcesMicrosoft implements this Program Management control Fixed: audit
2022-04-01 20:29:14
add: 5fd9ced5-18e8-4c09-91b7-3725680f8ade
Regulatory Complianceb11c985b-f2cd-4bd7-85f4-b52426edf905Microsoft Managed Control 1571 - Acquisitions ProcessMicrosoft implements this System and Services Acquisition control Fixed: audit
2022-04-01 20:29:14
change: Patch (1.0.0 > 1.0.1)
Regulatory Compliance86cd0591-5076-4447-aeff-2557def90353Microsoft Managed Control 1827 - Data Integrity And Data Integrity BoardMicrosoft implements this Data Quality and Integrity control Fixed: audit
2022-04-01 20:29:14
add: 86cd0591-5076-4447-aeff-2557def90353
Kubernetesd46c275d-1680-448d-b2ec-e495a3b6cc89Kubernetes cluster services should only use allowed external IPsUse allowed external IPs to avoid the potential attack (CVE-2020-8554) in a Kubernetes cluster. For more information, see https://aka.ms/kubepolicydoc. Default: Audit
Allowed: (audit, Audit, deny, Deny, disabled, Disabled)
2022-04-01 20:29:14
change: Minor (3.0.2 > 3.1.0)
Kubernetes708b60a6-d253-4fe0-9114-4be4c00f012c[Preview]: Configure Azure Arc enabled Kubernetes clusters to install Microsoft Defender for Cloud extensionMicrosoft Defender for Cloud extension for Azure Arc provides threat protection for your Arc enabled Kubernetes clusters. The extension collects data from all nodes in the cluster and sends it to the Azure Defender for Kubernetes backend in the cloud for further analysis. Learn more in https://docs.microsoft.com/azure/defender-for-cloud/defender-for-containers-enable?pivots=defender-for-container-arc. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Contributor
Log Analytics Contributor
2022-04-01 20:29:14
change: Minor, suffix remains equal (4.0.0-preview > 4.1.0-preview)
Regulatory Compliance39f15e01-d964-41ee-88e3-eefbddc840cdMicrosoft Managed Control 1846 - Individual Access Microsoft implements this Individual Participation and Redress control Fixed: audit
2022-04-01 20:29:14
add: 39f15e01-d964-41ee-88e3-eefbddc840cd
Key Vault12ef42cb-9903-4e39-9c26-422d29570417Certificates should have the specified lifetime action triggersManage your organizational compliance requirements by specifying whether a certificate lifetime action is triggered at a specific percentage of its lifetime or at a certain number of days prior to its expiration. Default: Audit
Allowed: (audit, Audit, deny, Deny, disabled, Disabled)
2022-04-01 20:29:14
change: Minor (2.0.1 > 2.1.0)
Regulatory Complianceb07c9b24-729e-4e85-95fc-f224d2d08a80Microsoft Managed Control 1429 - Media LabelingMicrosoft implements this Media Protection control Fixed: audit
2022-04-01 20:29:14
change: Patch (1.0.0 > 1.0.1)
Kubernetes1d61c4d2-aef2-432b-87fc-7f96b019b7e1Configure Kubernetes clusters with specified GitOps configuration using no secretsDeploy a 'sourceControlConfiguration' to Kubernetes clusters to assure that the clusters get their source of truth for workloads and configurations from the defined git repo. This definition requires no secrets. For instructions, visit https://aka.ms/K8sGitOpsPolicy. Default: DeployIfNotExists
Allowed: (auditIfNotExists, AuditIfNotExists, deployIfNotExists, DeployIfNotExists, disabled, Disabled)
Contributor
2022-04-01 20:29:14
change: Minor (1.0.0 > 1.1.0)
Backup83644c87-93dd-49fe-bf9f-6aff8fd0834eConfigure backup on virtual machines with a given tag to a new recovery services vault with a default policyEnforce backup for all virtual machines by deploying a recovery services vault in the same location and resource group as the virtual machine. Doing this is useful when different application teams in your organization are allocated separate resource groups and need to manage their own backups and restores. You can optionally include virtual machines containing a specified tag to control the scope of assignment. See https://aka.ms/AzureVMAppCentricBackupIncludeTag. Default: DeployIfNotExists
Allowed: (auditIfNotExists, AuditIfNotExists, deployIfNotExists, DeployIfNotExists, disabled, Disabled)
Virtual Machine Contributor
Backup Contributor
2022-04-01 20:29:14
change: Minor (6.0.0 > 6.1.0)
Monitoring4efbd9d8-6bc6-45f6-9be2-7fe9dd5d89ffConfigure Windows virtual machine scale sets to run Azure Monitor Agent using system-assigned managed identityAutomate the deployment of Azure Monitor Agent extension on your Windows virtual machine scale sets for collecting telemetry data from the guest OS. This policy will install the extension if the OS and region are supported and system-assigned managed identity is enabled, and skip install otherwise. Learn more: https://aka.ms/AMAOverview. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Virtual Machine Contributor
2022-04-01 20:29:14
change: Major (2.0.0 > 3.0.0)
Bot Service52152f42-0dda-40d9-976e-abb1acdd611eBot Service should have isolated mode enabledBots should be set to 'isolated only' mode. This setting configures Bot Service channels that require traffic over the public internet to be disabled. Default: Audit
Allowed: (audit, Audit, deny, Deny, disabled, Disabled)
2022-04-01 20:29:14
change: Minor (2.0.0 > 2.1.0)
Regulatory Compliance09828c65-e323-422b-9774-9d5c646124daMicrosoft Managed Control 1302 - User Identification And Authentication | Network Access To Non-Privileged AccountsMicrosoft implements this Identification and Authentication control Fixed: audit
2022-04-01 20:29:14
change: Patch (1.0.0 > 1.0.1)
Regulatory Compliancef82e3639-fa2b-4e06-a786-932d8379b972Microsoft Managed Control 1705 - Security Alerts & AdvisoriesMicrosoft implements this System and Information Integrity control Fixed: audit
2022-04-01 20:29:14
change: Patch (1.0.0 > 1.0.1)
Regulatory Compliance4c25cbd0-8776-412f-8466-5993e38ce602Microsoft Managed Control 1838 - Minimization of PII Used in Testing, Training, And ResearchMicrosoft implements this Data Minimization and Retention control Fixed: audit
2022-04-01 20:29:14
add: 4c25cbd0-8776-412f-8466-5993e38ce602
Regulatory Compliance93e1bb73-1b08-4dbe-9c62-8e2e92e7ec41Microsoft Managed Control 1575 - Acquisitions Process | Functional Properties Of Security ControlsMicrosoft implements this System and Services Acquisition control Fixed: audit
2022-04-01 20:29:14
change: Patch (1.0.0 > 1.0.1)
Regulatory Compliance3bd6a378-4173-411d-a958-dc699b0ee2fdMicrosoft Managed Control 1737 - Plan Of Action And Milestones ProcessMicrosoft implements this Program Management control Fixed: audit
2022-04-01 20:29:14
add: 3bd6a378-4173-411d-a958-dc699b0ee2fd
Regulatory Compliancee12494fa-b81e-4080-af71-7dbacc2da0ecMicrosoft Managed Control 1714 - Software & Information Integrity | Automated Notifications Of Integrity ViolationsMicrosoft implements this System and Information Integrity control Fixed: audit
2022-04-01 20:29:14
change: Patch (1.0.0 > 1.0.1)
Regulatory Compliancec6c43097-8552-4279-8b38-7dcabff781d3Microsoft Managed Control 1819 - Accounting of Disclosures Microsoft implements this Accountability, Audit, and Risk Management control Fixed: audit
2022-04-01 20:29:14
add: c6c43097-8552-4279-8b38-7dcabff781d3
Regulatory Complianceaeedddb6-6bc0-42d5-809b-80048033419dMicrosoft Managed Control 1413 - Remote MaintenanceMicrosoft implements this Maintenance control Fixed: audit
2022-04-01 20:29:14
change: Patch (1.0.0 > 1.0.1)
Machine Learning6a6f7384-63de-11ea-bc55-0242ac130003[Preview]: Configure code signing for training code for specified Azure Machine Learning computesProvide code signing for training code in specified Azure Machine Learning computes and can be assigned at the workspace. For more information, visit https://aka.ms/amlpolicydoc. Default: enforceSetting
Allowed: (enforceSetting, disabled)
2022-04-01 20:29:14
change: Major, suffix remains equal (4.0.0-preview > 5.0.0-preview)
Backup345fa903-145c-4fe1-8bcd-93ec2adccde8Configure backup on virtual machines with a given tag to an existing recovery services vault in the same locationEnforce backup for all virtual machines by backing them up to an existing central recovery services vault in the same location and subscription as the virtual machine. Doing this is useful when there is a central team in your organization managing backups for all resources in a subscription. You can optionally include virtual machines containing a specified tag to control the scope of assignment. See https://aka.ms/AzureVMCentralBackupIncludeTag. Default: DeployIfNotExists
Allowed: (auditIfNotExists, AuditIfNotExists, deployIfNotExists, DeployIfNotExists, disabled, Disabled)
Virtual Machine Contributor
Backup Contributor
2022-04-01 20:29:14
change: Minor (6.0.0 > 6.1.0)
Regulatory Complianceb2c2d6ed-bed8-419f-a8b7-59d736573acdMicrosoft Managed Control 1863 - System of Records Notices And Privacy Act StatementsMicrosoft implements this Transparency control Fixed: audit
2022-04-01 20:29:14
add: b2c2d6ed-bed8-419f-a8b7-59d736573acd
Regulatory Compliance4f26049b-2c5a-4841-9ff3-d48a26aae475Microsoft Managed Control 1442 - Media Sanitization And Disposal | Nondestructive TechniquesMicrosoft implements this Media Protection control Fixed: audit
2022-04-01 20:29:14
change: Patch (1.0.0 > 1.0.1)
Kubernetes1a5b4dca-0b6f-4cf5-907c-56316bc1bf3dKubernetes clusters should be accessible only over HTTPSUse of HTTPS ensures authentication and protects data in transit from network layer eavesdropping attacks. This capability is currently generally available for Kubernetes Service (AKS), and in preview for AKS Engine and Azure Arc enabled Kubernetes. For more info, visit https://aka.ms/kubepolicydoc Default: Deny
Allowed: (audit, Audit, deny, Deny, disabled, Disabled)
2022-04-01 20:29:14
change: Minor (6.0.1 > 6.1.0)
Regulatory Compliancec055ec23-c9d1-4718-be96-433aa8108516Microsoft Managed Control 1826 - Data Quality | Re-Validate PIIMicrosoft implements this Data Quality and Integrity control Fixed: audit
2022-04-01 20:29:14
add: c055ec23-c9d1-4718-be96-433aa8108516
Regulatory Compliance2d045bca-a0fd-452e-9f41-4ec33769717cMicrosoft Managed Control 1068 - Wireless Access RestrictionsMicrosoft implements this Access Control control Fixed: audit
2022-04-01 20:29:14
change: Patch (1.0.0 > 1.0.1)
Regulatory Complianceab55cdb0-c7dd-4bd8-ae22-a7cea7594e9cMicrosoft Managed Control 1073 - Access Control for Portable And Mobile SystemsMicrosoft implements this Access Control control Fixed: audit
2022-04-01 20:29:14
change: Patch (1.0.0 > 1.0.1)
Regulatory Compliance5b61f773-2042-46a8-b489-106d850d6d4eMicrosoft Managed Control 1814 - Privacy Awareness And Training Microsoft implements this Accountability, Audit, and Risk Management control Fixed: audit
2022-04-01 20:29:14
add: 5b61f773-2042-46a8-b489-106d850d6d4e
Regulatory Compliance025992d6-7fee-4137-9bbf-2ffc39c0686cMicrosoft Managed Control 1709 - Security Functionality VerificationMicrosoft implements this System and Information Integrity control Fixed: audit
2022-04-01 20:29:14
change: Patch (1.0.0 > 1.0.1)
Kubernetesc26596ff-4d70-4e6a-9a30-c2506bd2f80cKubernetes cluster containers should only use allowed capabilitiesRestrict the capabilities to reduce the attack surface of containers in a Kubernetes cluster. This recommendation is part of CIS 5.2.8 and CIS 5.2.9 which are intended to improve the security of your Kubernetes environments. This policy is generally available for Kubernetes Service (AKS), and preview for AKS Engine and Azure Arc enabled Kubernetes. For more information, see https://aka.ms/kubepolicydoc. Default: Audit
Allowed: (audit, Audit, deny, Deny, disabled, Disabled)
2022-04-01 20:29:14
change: Minor (4.0.2 > 4.1.0)
Regulatory Compliance2e5cd188-7fa8-41fc-87ff-0ac7475ccb25Microsoft Managed Control 1845 - Consent | Mechanisms Supporting Itemized or Tiered Consent Microsoft implements this Individual Participation and Redress control Fixed: audit
2022-04-01 20:29:14
add: 2e5cd188-7fa8-41fc-87ff-0ac7475ccb25
Regulatory Compliance0b1aa965-7502-41f9-92be-3e2fe7cc392aMicrosoft Managed Control 1046 - Unsuccessful Logon Attempts | Purge / Wipe Mobile DeviceMicrosoft implements this Access Control control Fixed: audit
2022-04-01 20:29:14
change: Patch (1.0.0 > 1.0.1)
Regulatory Compliance66a56404-7b65-4e33-b371-28d069172dd4Microsoft Managed Control 1743 - Risk Management StrategyMicrosoft implements this Program Management control Fixed: audit
2022-04-01 20:29:14
add: 66a56404-7b65-4e33-b371-28d069172dd4
Regulatory Compliance5f18c885-ade3-48c5-80b1-8f9216019c18Microsoft Managed Control 1576 - Acquisitions Process | Design / Implementation Information For Security ControlsMicrosoft implements this System and Services Acquisition control Fixed: audit
2022-04-01 20:29:14
change: Patch (1.0.0 > 1.0.1)
Regulatory Compliance4d1d4ce2-71ea-4578-bbb4-fe76215d45acMicrosoft Managed Control 1811 - Privacy Requirements for Contractors And Service Providers Microsoft implements this Accountability, Audit, and Risk Management control Fixed: audit
2022-04-01 20:29:14
add: 4d1d4ce2-71ea-4578-bbb4-fe76215d45ac
Regulatory Compliance71c6c2b1-78c8-4e84-9d05-9bd4db116cbaMicrosoft Managed Control 1858 - Privacy NoticeMicrosoft implements this Transparency control Fixed: audit
2022-04-01 20:29:14
add: 71c6c2b1-78c8-4e84-9d05-9bd4db116cba
Regulatory Compliance3044f5dc-93dd-4da0-b25d-bb6cedde3536Microsoft Managed Control 1862 - System of Records Notices And Privacy Act StatementsMicrosoft implements this Transparency control Fixed: audit
2022-04-01 20:29:14
add: 3044f5dc-93dd-4da0-b25d-bb6cedde3536
Regulatory Compliance88ae1753-f34c-47c3-96af-dccb4ac052ebMicrosoft Managed Control 1830 - Minimization of Personally Identifiable InformationMicrosoft implements this Data Minimization and Retention control Fixed: audit
2022-04-01 20:29:14
add: 88ae1753-f34c-47c3-96af-dccb4ac052eb
Regulatory Compliancee54c325e-42a0-4dcf-b105-046e0f6f590fMicrosoft Managed Control 1716 - Software & Information Integrity | Integration Of Detection And ResponseMicrosoft implements this System and Information Integrity control Fixed: audit
2022-04-01 20:29:14
change: Patch (1.0.0 > 1.0.1)
Regulatory Compliance61a1dd98-b259-4840-abd5-fbba7ee0da83Microsoft Managed Control 1415 - Remote MaintenanceMicrosoft implements this Maintenance control Fixed: audit
2022-04-01 20:29:14
change: Patch (1.0.0 > 1.0.1)
Kubernetesa27c700f-8a22-44ec-961c-41625264370bKubernetes clusters should not use specific security capabilitiesPrevent specific security capabilities in Kubernetes clusters to prevent ungranted privileges on the Pod resource. For more information, see https://aka.ms/kubepolicydoc. Default: Audit
Allowed: (audit, Audit, deny, Deny, disabled, Disabled)
2022-04-01 20:29:14
change: Minor (3.0.2 > 3.1.0)
Kubernetese1e6c427-07d9-46ab-9689-bfa85431e636Kubernetes cluster pods and containers should only use allowed SELinux optionsPods and containers should only use allowed SELinux options in a Kubernetes cluster. This recommendation is part of Pod Security Policies which are intended to improve the security of your Kubernetes environments. This policy is generally available for Kubernetes Service (AKS), and preview for AKS Engine and Azure Arc enabled Kubernetes. For more information, see https://aka.ms/kubepolicydoc. Default: Audit
Allowed: (audit, Audit, deny, Deny, disabled, Disabled)
2022-04-01 20:29:14
change: Minor (5.0.0 > 5.1.0)
Regulatory Compliance1fa50212-51a9-471b-95cf-3a23410ec9e9Microsoft Managed Control 1730 - Information Security Program PlanMicrosoft implements this Program Management control Fixed: audit
2022-04-01 20:29:14
add: 1fa50212-51a9-471b-95cf-3a23410ec9e9
Kubernetes47a1ee2f-2a2a-4576-bf2a-e0e36709c2b8Kubernetes cluster containers should not share host process ID or host IPC namespaceBlock pod containers from sharing the host process ID namespace and host IPC namespace in a Kubernetes cluster. This recommendation is part of CIS 5.2.2 and CIS 5.2.3 which are intended to improve the security of your Kubernetes environments. This policy is generally available for Kubernetes Service (AKS), and preview for AKS Engine and Azure Arc enabled Kubernetes. For more information, see https://aka.ms/kubepolicydoc. Default: Audit
Allowed: (audit, Audit, deny, Deny, disabled, Disabled)
2022-04-01 20:29:14
change: Minor (3.0.2 > 3.1.0)
Kubernetes64def556-fbad-4622-930e-72d1d5589bf5[Preview]: Configure Azure Kubernetes Service clusters to enable Defender profileMicrosoft Defender for Containers provides cloud-native Kubernetes security capabilities including environment hardening, workload protection, and run-time protection. When you enable the SecurityProfile.AzureDefender on your Azure Kubernetes Service cluster, an agent is deployed to your cluster to collect security event data. Learn more about Microsoft Defender for Containers: https://docs.microsoft.com/azure/defender-for-cloud/defender-for-containers-introduction?tabs=defender-for-container-arch-aks. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Contributor
Log Analytics Contributor
2022-04-01 20:29:14
change: Patch, suffix remains equal (3.0.2-preview > 3.0.3-preview)
Monitoring56a3e4f8-649b-4fac-887e-5564d11e8d3aConfigure Linux virtual machine scale sets to run Azure Monitor Agent with system-assigned managed identity-based authenticationAutomate the deployment of Azure Monitor Agent extension on your Linux virtual machine scale sets for collecting telemetry data from the guest OS. This policy will install the extension if the OS and region are supported and system-assigned managed identity is enabled, and skip install otherwise. Learn more: https://aka.ms/AMAOverview. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Virtual Machine Contributor
2022-04-01 20:29:14
change: Patch (1.0.0 > 1.0.1)
Regulatory Compliance51d53eb3-6c02-4f3f-a608-a058af96fa6aMicrosoft Managed Control 1831 - Minimization of Personally Identifiable InformationMicrosoft implements this Data Minimization and Retention control Fixed: audit
2022-04-01 20:29:14
add: 51d53eb3-6c02-4f3f-a608-a058af96fa6a
Regulatory Compliance45b7b644-5f91-498e-9d89-7402532d3645Microsoft Managed Control 1578 - Acquisitions Process | Functions / Ports / Protocols / Services In UseMicrosoft implements this System and Services Acquisition control Fixed: audit
2022-04-01 20:29:14
change: Patch (1.0.0 > 1.0.1)
Monitoring59c3d93f-900b-4827-a8bd-562e7b956e7cConfigure Linux virtual machine scale sets to run Azure Monitor Agent with user-assigned managed identity-based authenticationAutomate the deployment of Azure Monitor Agent extension on your Linux virtual machine scale sets for collecting telemetry data from the guest OS. This policy will install the extension and configure it to use the specified user-assigned managed identity if the OS and region are supported, and skip install otherwise. Learn more: https://aka.ms/AMAOverview. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Virtual Machine Contributor
2022-04-01 20:29:14
add: 59c3d93f-900b-4827-a8bd-562e7b956e7c
Regulatory Compliance0f935dab-83d6-47b8-85ef-68b8584161b9Microsoft Managed Control 1574 - Acquisitions ProcessMicrosoft implements this System and Services Acquisition control Fixed: audit
2022-04-01 20:29:14
change: Patch (1.0.0 > 1.0.1)
Regulatory Compliance58c93053-7b98-4cf0-b99f-1beb985416c2Microsoft Managed Control 1573 - Acquisitions ProcessMicrosoft implements this System and Services Acquisition control Fixed: audit
2022-04-01 20:29:14
change: Patch (1.0.0 > 1.0.1)
Regulatory Compliance8cb6d7ea-a6ae-4bc0-ae70-9fa3715e46bfMicrosoft Managed Control 1822 - Data QualityMicrosoft implements this Data Quality and Integrity control Fixed: audit
2022-04-01 20:29:14
add: 8cb6d7ea-a6ae-4bc0-ae70-9fa3715e46bf
Internet of Thingsc99ce9c1-ced7-4c3e-aca0-10e69ce0cb02Deploy - Configure Azure IoT Hubs to use private DNS zonesAzure Private DNS provides a reliable, secure DNS service to manage and resolve domain names in a virtual network without the need to add a custom DNS solution. You can use private DNS zones to override the DNS resolution by using your own custom domain names for a private endpoint. This policy deploys a private DNS Zone for IoT Hub private endpoints. Default: DeployIfNotExists
Allowed: (deployIfNotExists, DeployIfNotExists, disabled, Disabled)
Network Contributor
Contributor
2022-04-01 20:29:14
change: Minor (1.0.0 > 1.1.0)
Regulatory Compliance9834600a-668a-482c-9310-a89861b29e06Microsoft Managed Control 1805 - Governance And Privacy Program Microsoft implements this Accountability, Audit, and Risk Management control Fixed: audit
2022-04-01 20:29:14
add: 9834600a-668a-482c-9310-a89861b29e06
Regulatory Compliance131a2706-61e9-4916-a164-00e052056462Microsoft Managed Control 1347 - Identification And Authentication (Non-Organizational Users) | Acceptance Of Piv Credentials...Microsoft implements this Identification and Authentication control Fixed: audit
2022-04-01 20:29:14
change: Patch (1.0.0 > 1.0.1)
Regulatory Compliance51f2fa3e-cd5f-4713-a9ce-177ee7a22d48Microsoft Managed Control 1828 - Data Integrity And Data Integrity BoardMicrosoft implements this Data Quality and Integrity control Fixed: audit
2022-04-01 20:29:14
add: 51f2fa3e-cd5f-4713-a9ce-177ee7a22d48
Regulatory Compliance5bef3414-50bc-4fc0-b3db-372bb8fe0796Microsoft Managed Control 1836 - Data Retention And DisposalMicrosoft implements this Data Minimization and Retention control Fixed: audit
2022-04-01 20:29:14
add: 5bef3414-50bc-4fc0-b3db-372bb8fe0796
Regulatory Compliancef751cdb7-fbee-406b-969b-815d367cb9b3Microsoft Managed Control 1591 - External Information System Services | Identification Of Functions / Ports / Protocols...Microsoft implements this System and Services Acquisition control Fixed: audit
2022-04-01 20:29:14
change: Patch (1.0.0 > 1.0.1)
Regulatory Compliance71280b2a-8c2f-4480-b933-686c0987cfbbMicrosoft Managed Control 1851 - Redress Microsoft implements this Individual Participation and Redress control Fixed: audit
2022-04-01 20:29:14
add: 71280b2a-8c2f-4480-b933-686c0987cfbb
Monitoring1bc02227-0cb6-4e11-8f53-eb0b22eab7e8Application Insights components should block log ingestion and querying from public networksImprove Application Insights security by blocking log ingestion and querying from public networks. Only private-link connected networks will be able to ingest and query logs of this component. Learn more at https://aka.ms/AzMonPrivateLink#configure-application-insights. Default: Audit
Allowed: (audit, Audit, deny, Deny, disabled, Disabled)
2022-04-01 20:29:14
change: Minor (1.0.0 > 1.1.0)
Regulatory Compliance804faf7d-b687-40f7-9f74-79e28adf4205Microsoft Managed Control 1703 - Security Alerts & AdvisoriesMicrosoft implements this System and Information Integrity control Fixed: audit
2022-04-01 20:29:14
change: Patch (1.0.0 > 1.0.1)
Regulatory Compliance855ced56-417b-4d74-9d5f-dd1bc81e22d6Microsoft Managed Control 1348 - Identification And Authentication (Non-Organizational Users) | Acceptance Of Third-Party...Microsoft implements this Identification and Authentication control Fixed: audit
2022-04-01 20:29:14
change: Patch (1.0.0 > 1.0.1)
Regulatory Compliance563f2ce4-2d95-44b6-b828-275a2f3cac47Microsoft Managed Control 1848 - Individual Access Microsoft implements this Individual Participation and Redress control Fixed: audit
2022-04-01 20:29:14
add: 563f2ce4-2d95-44b6-b828-275a2f3cac47
Regulatory Compliance669ac708-82af-46f6-8bd6-75b48247489dMicrosoft Managed Control 1864 - System of Records Notices And Privacy Act StatementsMicrosoft implements this Transparency control Fixed: audit
2022-04-01 20:29:14
add: 669ac708-82af-46f6-8bd6-75b48247489d
Kubernetesa6f560f4-f582-4b67-b123-a37dcd1bf7eaConfigure Kubernetes clusters with specified GitOps configuration using HTTPS secretsDeploy a 'sourceControlConfiguration' to Kubernetes clusters to assure that the clusters get their source of truth for workloads and configurations from the defined git repo. This definition requires HTTPS user and key secrets stored in Key Vault. For instructions, visit https://aka.ms/K8sGitOpsPolicy. Default: DeployIfNotExists
Allowed: (auditIfNotExists, AuditIfNotExists, deployIfNotExists, DeployIfNotExists, disabled, Disabled)
Contributor
2022-04-01 20:29:14
change: Minor (1.0.1 > 1.1.0)
Kubernetes975ce327-682c-4f2e-aa46-b9598289b86cKubernetes cluster containers should only use allowed seccomp profilesPod containers can only use allowed seccomp profiles in a Kubernetes cluster. This recommendation is part of Pod Security Policies which are intended to improve the security of your Kubernetes environments. This policy is generally available for Kubernetes Service (AKS), and preview for AKS Engine and Azure Arc enabled Kubernetes. For more information, see https://aka.ms/kubepolicydoc. Default: Audit
Allowed: (audit, Audit, deny, Deny, disabled, Disabled)
2022-04-01 20:29:14
change: Minor (4.0.2 > 4.1.0)
Regulatory Compliance0dced7ab-9ce5-4137-93aa-14c13e06ab17Microsoft Managed Control 1718 - Software & Information Integrity | Binary Or Machine Executable CodeMicrosoft implements this System and Information Integrity control Fixed: audit
2022-04-01 20:29:14
change: Patch (1.0.0 > 1.0.1)
Regulatory Compliance76ba3061-b78b-48a5-aab8-43f5ae02898dMicrosoft Managed Control 1847 - Individual Access Microsoft implements this Individual Participation and Redress control Fixed: audit
2022-04-01 20:29:14
add: 76ba3061-b78b-48a5-aab8-43f5ae02898d
Machine Learning5853517a-63de-11ea-bc55-0242ac130003[Preview]: Configure allowed registries for specified Azure Machine Learning computesProvide registries that are allowed in specified Azure Machine Learning computes and can be assigned at the workspace. For more information, visit https://aka.ms/amlpolicydoc. Default: enforceSetting
Allowed: (enforceSetting, disabled)
2022-04-01 20:29:14
change: Major, suffix remains equal (4.0.0-preview > 5.0.0-preview)
CDNdfc212af-17ea-423a-9dcb-91e2cb2caa6bAzure Front Door profiles should use Premium tier that supports managed WAF rules and private linkAzure Front Door Premium supports Azure managed WAF rules and private link to supported Azure origins. Default: Audit
Allowed: (Audit, Deny, Disabled)
2022-03-25 18:52:24
add: dfc212af-17ea-423a-9dcb-91e2cb2caa6b
Monitoring3c1b3629-c8f8-4bf6-862c-037cb9094038Deploy - Configure Log Analytics extension to be enabled on Windows virtual machine scale setsDeploy Log Analytics extension for Windows virtual machine scale sets if the virtual machine image is in the list defined and the extension is not installed. If your scale set upgradePolicy is set to Manual, you need to apply the extension to all the virtual machine in the set by updating them. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Log Analytics Contributor
Virtual Machine Contributor
2022-03-25 18:52:24
change: Minor (2.0.1 > 2.1.1)
Guest Configurationea53dbee-c6c9-4f0e-9f9e-de0039b78023Audit Linux machines that allow remote connections from accounts without passwordsRequires that prerequisites are deployed to the policy assignment scope. For details, visit https://aka.ms/gcpol. Machines are non-compliant if Linux machines that allow remote connections from accounts without passwords Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2022-03-25 18:52:24
change: Major (2.0.0 > 3.0.0)
Guest Configuratione6955644-301c-44b5-a4c4-528577de6861Audit Linux machines that do not have the passwd file permissions set to 0644Requires that prerequisites are deployed to the policy assignment scope. For details, visit https://aka.ms/gcpol. Machines are non-compliant if Linux machines that do not have the passwd file permissions set to 0644 Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2022-03-25 18:52:24
change: Major (2.0.0 > 3.0.0)
CDN679da822-78a7-4eff-8fff-a899454a9970Azure Front Door Standard and Premium should be running minimum TLS version of 1.2Setting minimal TLS version to 1.2 improves security by ensuring your custom domains are accessed from clients using TLS 1.2 or newer. Using versions of TLS less than 1.2 is not recommended since they are weak and do not support modern cryptographic algorithms. Default: Audit
Allowed: (Audit, Deny, Disabled)
2022-03-25 18:52:24
add: 679da822-78a7-4eff-8fff-a899454a9970
Monitoring1c210e94-a481-4beb-95fa-1571b434fb04Deploy - Configure Dependency agent to be enabled on Windows virtual machinesDeploy Dependency agent for Windows virtual machines if the virtual machine image is in the list defined and the agent is not installed. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Log Analytics Contributor
2022-03-25 18:52:24
change: Minor (2.0.0 > 2.1.0)
Monitoring3be22e3b-d919-47aa-805e-8985dbeb0ad9Deploy - Configure Dependency agent to be enabled on Windows virtual machine scale setsDeploy Dependency agent for Windows virtual machine scale sets if the virtual machine image is in the list defined and the agent is not installed. If your scale set upgradePolicy is set to Manual, you need to apply the extension to all the virtual machines in the set by updating them. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Virtual Machine Contributor
2022-03-25 18:52:24
change: Minor (2.0.0 > 2.1.0)
CDNdaba2cce-8326-4af3-b049-81a362da024dSecure private connectivity between Azure Front Door Premium and Azure Storage Blob, or Azure App ServicePrivate link ensures private connectivity between AFD Premium and Azure Storage Blob or Azure App Service over the Azure backbone network, without the Azure Storage Blob or the Azure App Service being publicly exposed to the internet. Default: Audit
Allowed: (Audit, Disabled)
2022-03-25 18:52:24
add: daba2cce-8326-4af3-b049-81a362da024d
Monitoring0868462e-646c-4fe3-9ced-a733534b6a2cDeploy - Configure Log Analytics extension to be enabled on Windows virtual machinesDeploy Log Analytics extension for Windows virtual machines if the virtual machine image is in the list defined and the extension is not installed. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Log Analytics Contributor
2022-03-25 18:52:24
change: Minor (2.0.1 > 2.1.1)
Guest Configurationf6ec09a3-78bf-4f8f-99dc-6c77182d0f99Audit Linux machines that have accounts without passwordsRequires that prerequisites are deployed to the policy assignment scope. For details, visit https://aka.ms/gcpol. Machines are non-compliant if Linux machines that have accounts without passwords Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2022-03-25 18:52:24
change: Major (2.0.0 > 3.0.0)
Kubernetes64def556-fbad-4622-930e-72d1d5589bf5[Preview]: Configure Azure Kubernetes Service clusters to enable Defender profileMicrosoft Defender for Containers provides cloud-native Kubernetes security capabilities including environment hardening, workload protection, and run-time protection. When you enable the SecurityProfile.AzureDefender on your Azure Kubernetes Service cluster, an agent is deployed to your cluster to collect security event data. Learn more about Microsoft Defender for Containers: https://docs.microsoft.com/azure/defender-for-cloud/defender-for-containers-introduction?tabs=defender-for-container-arch-aks. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Contributor
Log Analytics Contributor
2022-03-25 18:52:24
change: Patch, suffix remains equal (3.0.1-preview > 3.0.2-preview)
Monitoring4da21710-ce6f-4e06-8cdb-5cc4c93ffbeeDeploy Dependency agent for Linux virtual machinesDeploy Dependency agent for Linux virtual machines if the VM Image (OS) is in the list defined and the agent is not installed. Fixed: deployIfNotExistsLog Analytics Contributor
2022-03-18 17:53:47
change: Major (1.3.0 > 2.0.0)
Guest Configuration331e8ea8-378a-410f-a2e5-ae22f38bb0daDeploy the Linux Guest Configuration extension to enable Guest Configuration assignments on Linux VMsThis policy deploys the Linux Guest Configuration extension to Linux virtual machines hosted in Azure that are supported by Guest Configuration. The Linux Guest Configuration extension is a prerequisite for all Linux Guest Configuration assignments and must be deployed to machines before using any Linux Guest Configuration policy definition. For more information on Guest Configuration, visit https://aka.ms/gcpol. Fixed: deployIfNotExistsContributor
2022-03-18 17:53:47
change: Major (2.0.0 > 3.0.0)
Monitoring765266ab-e40e-4c61-bcb2-5a5275d0b7c0Deploy Dependency agent for Linux virtual machine scale setsDeploy Dependency agent for Linux virtual machine scale sets if the VM Image (OS) is in the list defined and the agent is not installed. Note: if your scale set upgradePolicy is set to Manual, you need to apply the extension to the all virtual machines in the set by calling upgrade on them. In CLI this would be az vmss update-instances. Fixed: deployIfNotExistsVirtual Machine Contributor
2022-03-18 17:53:47
change: Major (1.3.0 > 2.0.0)
Guest Configuration497dff13-db2a-4c0f-8603-28fa3b331ab6Add system-assigned managed identity to enable Guest Configuration assignments on VMs with a user-assigned identityThis policy adds a system-assigned managed identity to virtual machines hosted in Azure that are supported by Guest Configuration and have at least one user-assigned identity but do not have a system-assigned managed identity. A system-assigned managed identity is a prerequisite for all Guest Configuration assignments and must be added to machines before using any Guest Configuration policy definitions. For more information on Guest Configuration, visit https://aka.ms/gcpol. Fixed: modifyContributor
2022-03-18 17:53:47
change: Major (3.0.0 > 4.0.0)
Kubernetes64def556-fbad-4622-930e-72d1d5589bf5[Preview]: Configure Azure Kubernetes Service clusters to enable Defender profileMicrosoft Defender for Containers provides cloud-native Kubernetes security capabilities including environment hardening, workload protection, and run-time protection. When you enable the SecurityProfile.AzureDefender on your Azure Kubernetes Service cluster, an agent is deployed to your cluster to collect security event data. Learn more about Microsoft Defender for Containers: https://docs.microsoft.com/azure/defender-for-cloud/defender-for-containers-introduction?tabs=defender-for-container-arch-aks. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Contributor
Log Analytics Contributor
2022-03-18 17:53:47
change: Major, suffix remains equal (2.0.0-preview > 3.0.1-preview)
Guest Configuration3cf2ab00-13f1-4d0c-8971-2ac904541a7eAdd system-assigned managed identity to enable Guest Configuration assignments on virtual machines with no identitiesThis policy adds a system-assigned managed identity to virtual machines hosted in Azure that are supported by Guest Configuration but do not have any managed identities. A system-assigned managed identity is a prerequisite for all Guest Configuration assignments and must be added to machines before using any Guest Configuration policy definitions. For more information on Guest Configuration, visit https://aka.ms/gcpol. Fixed: modifyContributor
2022-03-18 17:53:47
change: Major (3.0.0 > 4.0.0)
Kubernetes450d2877-ebea-41e8-b00c-e286317d21bfAzure Kubernetes Service Clusters should enable Azure Active Directory integrationAKS-managed Azure Active Directory integration can manage the access to the clusters by configuring Kubernetes role-based access control (Kubernetes RBAC) based on a user's identity or directory group membership. Learn more at: https://aka.ms/aks-managed-aad. Default: Audit
Allowed: (Audit, Disabled)
2022-03-18 17:53:47
add: 450d2877-ebea-41e8-b00c-e286317d21bf
Storage06695360-db88-47f6-b976-7500d4297475Configure Azure File Sync to use private DNS zonesTo access the private endpoint(s) for Storage Sync Service resource interfaces from a registered server, you need to configure your DNS to resolve the correct names to your private endpoint's private IP addresses. This policy creates the requisite Azure Private DNS Zone and A records for the interfaces of your Storage Sync Service private endpoint(s). Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Private DNS Zone Contributor
Network Contributor
2022-03-18 17:53:47
change: Minor (1.0.0 > 1.1.0)
Monitoring244efd75-0d92-453c-b9a3-7d73ca36ed52Configure Windows Virtual Machines to be associated with a Data Collection RuleDeploy Association to link Windows virtual machines to specified Data Collection Rule. The list of locations and OS images are updated over time as support is increased. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Monitoring Contributor
Log Analytics Contributor
2022-03-18 17:53:47
change: Minor (1.0.1 > 1.1.0)
Monitoringeab1f514-22e3-42e3-9a1f-e1dc9199355cConfigure Windows Machines to be associated with a Data Collection RuleDeploy Association to link Windows virtual machines, virtual machine scale sets, and Arc machines to specified Data Collection Rule. The list of locations and OS images are updated over time as support is increased. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Monitoring Contributor
Log Analytics Contributor
2022-03-18 17:53:47
change: Minor (2.0.1 > 2.1.0)
Update Management Centerba0df93e-e4ac-479a-aac2-134bbae39a1a[Preview]: Schedule recurring updates using Update Management CenterYou can use update management center (private preview) in Azure to save recurring deployment schedules to install operating system updates for your Windows Server and Linux machines in Azure, in on-premises environments, and in other cloud environments connected using Azure Arc-enabled servers. This policy will also change the patch mode for the Azure Virtual Machine to 'AutomaticByPlatform'. See more: https://aka.ms/umc-scheduled-patching Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Contributor
2022-03-18 17:53:47
add: ba0df93e-e4ac-479a-aac2-134bbae39a1a
Monitoring0a3b9bf4-d30e-424a-af6b-9a93f6f78792Configure Windows Virtual Machine Scale Sets to be associated with a Data Collection RuleDeploy Association to link Windows virtual machine scale sets to specified Data Collection Rule. The list of locations and OS images are updated over time as support is increased. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Monitoring Contributor
Log Analytics Contributor
2022-03-18 17:53:47
change: Minor (1.0.1 > 1.1.0)
Monitoringf17d891d-ff20-46f2-bad3-9e0a5403a4d3Linux Arc-enabled machines should have Azure Monitor Agent installedLinux Arc-enabled machines should be monitored and secured through the deployed Azure Monitor Agent. The Azure Monitor Agent collects telemetry data from the guest OS. This policy will audit Arc-enabled machines in supported regions. Learn more: https://aka.ms/AMAOverview. Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2022-03-11 18:16:48
change: Patch (1.0.0 > 1.0.1)
Kubernetesf85eb0dd-92ee-40e9-8a76-db25a507d6d3Kubernetes cluster containers should only use allowed ProcMountTypePod containers can only use allowed ProcMountTypes in a Kubernetes cluster. This recommendation is part of Pod Security Policies which are intended to improve the security of your Kubernetes environments. This policy is generally available for Kubernetes Service (AKS), and preview for AKS Engine and Azure Arc enabled Kubernetes. For more information, see https://aka.ms/kubepolicydoc. Default: Audit
Allowed: (audit, Audit, deny, Deny, disabled, Disabled)
2022-03-11 18:16:48
change: Major (5.0.2 > 6.0.0)
SQLb79fa14e-238a-4c2d-b376-442ce508fc84Deploy - Configure diagnostic settings for SQL Databases to Log Analytics workspaceDeploys the diagnostic settings for SQL Databases to stream resource logs to a Log Analytics workspace when any SQL Database which is missing this diagnostic settings is created or updated. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Monitoring Contributor
Log Analytics Contributor
2022-03-11 18:16:48
change: Major (3.0.0 > 4.0.0)
Monitoring244efd75-0d92-453c-b9a3-7d73ca36ed52Configure Windows Virtual Machines to be associated with a Data Collection RuleDeploy Association to link Windows virtual machines to specified Data Collection Rule. The list of locations and OS images are updated over time as support is increased. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Monitoring Contributor
Log Analytics Contributor
2022-03-11 18:16:48
change: Patch (1.0.0 > 1.0.1)
SQL32e6bbec-16b6-44c2-be37-c5b672d103cfAzure SQL Database should be running TLS version 1.2 or newerSetting TLS version to 1.2 or newer improves security by ensuring your Azure SQL Database can only be accessed from clients using TLS 1.2 or newer. Using versions of TLS less than 1.2 is not recommended since they have well documented security vulnerabilities. Default: Audit
Allowed: (Audit, Disabled, Deny)
2022-03-11 18:16:48
change: Major (1.0.1 > 2.0.0)
Kubernetes13cd7ae3-5bc0-4ac4-a62d-4f7c120b9759[Preview]: Kubernetes clusters should gate deployment of vulnerable imagesProtect your Kubernetes clusters and container workloads from potential threats by restricting deployment of container images with vulnerable software components. Use Azure Defender CI/CD scanning (https://aka.ms/AzureDefenderCICDscanning) and Azure defender for container registries (https://aka.ms/AzureDefenderForContainerRegistries) to identify and patch vulnerabilities prior to deployment. Evaluation prerequisite: Policy Addon and Azure Defender Profile. Only applicable for private preview customers. Default: Audit
Allowed: (Audit, Deny, Disabled)
2022-03-11 18:16:48
change: Patch, suffix remains equal (1.0.2-preview > 1.0.3-preview)
Kubernetes64def556-fbad-4622-930e-72d1d5589bf5[Preview]: Configure Azure Kubernetes Service clusters to enable Defender profileMicrosoft Defender for Containers provides cloud-native Kubernetes security capabilities including environment hardening, workload protection, and run-time protection. When you enable the SecurityProfile.AzureDefender on your Azure Kubernetes Service cluster, an agent is deployed to your cluster to collect security event data. Learn more about Microsoft Defender for Containers: https://docs.microsoft.com/azure/defender-for-cloud/defender-for-containers-introduction?tabs=defender-for-container-arch-aks. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Contributor
Log Analytics Contributor
2022-03-11 18:16:48
change: Major, suffix remains equal (1.1.0-preview > 2.0.0-preview)
Security Centeradbe85b5-83e6-4350-ab58-bf3a4f736e5eMicrosoft Defender for Azure Cosmos DB should be enabledMicrosoft Defender for Azure Cosmos DB is an Azure-native layer of security that detects attempts to exploit databases in your Azure Cosmos DB accounts. Defender for Azure Cosmos DB detects potential SQL injections, known bad actors based on Microsoft Threat Intelligence, suspicious access patterns, and potential exploitations of your database through compromised identities or malicious insiders. Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2022-03-11 18:16:48
add: adbe85b5-83e6-4350-ab58-bf3a4f736e5e
Kubernetese1e6c427-07d9-46ab-9689-bfa85431e636Kubernetes cluster pods and containers should only use allowed SELinux optionsPods and containers should only use allowed SELinux options in a Kubernetes cluster. This recommendation is part of Pod Security Policies which are intended to improve the security of your Kubernetes environments. This policy is generally available for Kubernetes Service (AKS), and preview for AKS Engine and Azure Arc enabled Kubernetes. For more information, see https://aka.ms/kubepolicydoc. Default: Audit
Allowed: (audit, Audit, deny, Deny, disabled, Disabled)
2022-03-11 18:16:48
change: Major (4.0.2 > 5.0.0)
Backup8015d6ed-3641-4534-8d0b-5c67b67ff7de[Preview]: Configure Recovery Services vaults to use private endpoints for backupPrivate endpoints connect your virtual networks to Azure services without a public IP address at the source or destination. By mapping private endpoints to Recovery Services vaults, you can reduce data leakage risks. Note that your vaults need to meet certain pre-requisites to be eligible for private endpoint configuration. Learn more at : https://go.microsoft.com/fwlink/?linkid=2187162. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Network Contributor
2022-03-11 18:16:48
add: 8015d6ed-3641-4534-8d0b-5c67b67ff7de
SQL25da7dfb-0666-4a15-a8f5-402127efd8bbConfigure SQL servers to have auditing enabled to Log Analytics workspaceTo ensure the operations performed against your SQL assets are captured, SQL servers should have auditing enabled. If auditing is not enabled, this policy will configure auditing events to flow to the specified Log Analytics workspace. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Log Analytics Contributor
SQL Security Manager
2022-03-11 18:16:48
add: 25da7dfb-0666-4a15-a8f5-402127efd8bb
Synapse32ba8d30-07c0-4136-ab18-9a11bf4a67b7Configure Synapse workspaces to have auditing enabled to Log Analytics workspaceTo ensure the operations performed against your SQL assets are captured, Synapse workspaces should have auditing enabled. If auditing is not enabled, this policy will configure auditing events to flow to the specified Log Analytics workspace. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Log Analytics Contributor
Owner
2022-03-11 18:16:48
add: 32ba8d30-07c0-4136-ab18-9a11bf4a67b7
Kubernetes9a5f4e39-e427-4d5d-ae73-93db00328becKubernetes resources should have required annotationsEnsure that required annotations are attached on a given Kubernetes resource kind for improved resource management of your Kubernetes resources. This policy is generally available for Kubernetes Service (AKS), and preview for AKS Engine and Azure Arc enabled Kubernetes. For more information, see https://aka.ms/kubepolicydoc. Default: Audit
Allowed: (Audit, Deny, Disabled)
2022-03-11 18:16:48
add: 9a5f4e39-e427-4d5d-ae73-93db00328bec
Kubernetesa1840de2-8088-4ea8-b153-b4c723e9cb01[Preview]: Azure Kubernetes Service clusters should have Defender profile enabledMicrosoft Defender for Containers provides cloud-native Kubernetes security capabilities including environment hardening, workload protection, and run-time protection. When you enable the SecurityProfile.AzureDefender on your Azure Kubernetes Service cluster, an agent is deployed to your cluster to collect security event data. Learn more about Microsoft Defender for Containers in https://docs.microsoft.com/azure/defender-for-cloud/defender-for-containers-introduction?tabs=defender-for-container-arch-aks Default: Audit
Allowed: (Audit, Disabled)
2022-03-11 18:16:48
change: Patch, suffix remains equal (1.0.1-preview > 1.0.2-preview)
Monitoringc24c537f-2516-4c2f-aac5-2cd26baa3d26Configure Windows Arc Machines to be associated with a Data Collection RuleDeploy Association to link Windows Arc machines to specified Data Collection Rule. The list of locations are updated over time as support is increased. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Monitoring Contributor
Log Analytics Contributor
2022-03-11 18:16:48
change: Patch (1.0.0 > 1.0.1)
Monitoring58e891b9-ce13-4ac3-86e4-ac3e1f20cb07Configure Linux Virtual Machines to be associated with a Data Collection RuleDeploy Association to link Linux virtual machines to the specified Data Collection Rule. The list of locations and OS images are updated over time as support is increased. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Monitoring Contributor
Log Analytics Contributor
2022-03-11 18:16:48
change: Patch (1.0.0 > 1.0.1)
Monitoringeab1f514-22e3-42e3-9a1f-e1dc9199355cConfigure Windows Machines to be associated with a Data Collection RuleDeploy Association to link Windows virtual machines, virtual machine scale sets, and Arc machines to specified Data Collection Rule. The list of locations and OS images are updated over time as support is increased. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Monitoring Contributor
Log Analytics Contributor
2022-03-11 18:16:48
change: Patch (2.0.0 > 2.0.1)
Monitoringd5c37ce1-5f52-4523-b949-f19bf945b73aConfigure Linux Arc Machines to be associated with a Data Collection RuleDeploy Association to link Linux Arc machines to specified Data Collection Rule. The list of locations are updated over time as support is increased. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Monitoring Contributor
Log Analytics Contributor
2022-03-11 18:16:48
change: Patch (1.0.0 > 1.0.1)
Kubernetes56d0a13f-712f-466b-8416-56fb354fb823Kubernetes cluster containers should not use forbidden sysctl interfacesContainers should not use forbidden sysctl interfaces in a Kubernetes cluster. This recommendation is part of Pod Security Policies which are intended to improve the security of your Kubernetes environments. This policy is generally available for Kubernetes Service (AKS), and preview for AKS Engine and Azure Arc enabled Kubernetes. For more information, see https://aka.ms/kubepolicydoc. Default: Audit
Allowed: (audit, Audit, deny, Deny, disabled, Disabled)
2022-03-11 18:16:48
change: Major (4.0.2 > 5.0.0)
Monitoring0a3b9bf4-d30e-424a-af6b-9a93f6f78792Configure Windows Virtual Machine Scale Sets to be associated with a Data Collection RuleDeploy Association to link Windows virtual machine scale sets to specified Data Collection Rule. The list of locations and OS images are updated over time as support is increased. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Monitoring Contributor
Log Analytics Contributor
2022-03-11 18:16:48
change: Patch (1.0.0 > 1.0.1)
Monitoring845857af-0333-4c5d-bbbc-6076697da122Configure Linux Arc-enabled machines to run Azure Monitor AgentAutomate the deployment of Azure Monitor Agent extension on your Linux Arc-enabled machines for collecting telemetry data from the guest OS. This policy will install the extension if the region is supported. Learn more: https://aka.ms/AMAOverview. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Azure Connected Machine Resource Administrator
2022-03-11 18:16:48
change: Major (1.0.0 > 2.0.0)
Monitoring94f686d6-9a24-4e19-91f1-de937dc171a4Configure Windows Arc-enabled machines to run Azure Monitor AgentAutomate the deployment of Azure Monitor Agent extension on your Windows Arc-enabled machines for collecting telemetry data from the guest OS. This policy will install the extension if the OS and region are supported and system-assigned managed identity is enabled, and skip install otherwise. Learn more: https://aka.ms/AMAOverview. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Azure Connected Machine Resource Administrator
2022-03-11 18:16:48
change: Major (1.0.0 > 2.0.0)
Monitoring2ea82cdd-f2e8-4500-af75-67a2e084ca74Configure Linux Machines to be associated with a Data Collection RuleDeploy Association to link Linux virtual machines, virtual machine scale sets, and Arc machines to the specified Data Collection Rule. The list of locations and OS images are updated over time as support is increased. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Monitoring Contributor
Log Analytics Contributor
2022-03-11 18:16:48
change: Patch (3.0.0 > 3.0.1)
Monitoringec621e21-8b48-403d-a549-fc9023d4747fWindows Arc-enabled machines should have Azure Monitor Agent installedWindows Arc-enabled machines should be monitored and secured through the deployed Azure Monitor Agent. The Azure Monitor Agent collects telemetry data from the guest OS. Windows Arc-enabled machines in supported regions are monitored for Azure Monitor Agent deployment. Learn more: https://aka.ms/AMAOverview. Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2022-03-11 18:16:48
change: Patch (1.0.0 > 1.0.1)
Monitoring050a90d5-7cce-483f-8f6c-0df462036ddaConfigure Linux Virtual Machine Scale Sets to be associated with a Data Collection RuleDeploy Association to link Linux virtual machine scale sets to the specified Data Collection Rule. The list of locations and OS images are updated over time as support is increased. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Monitoring Contributor
Log Analytics Contributor
2022-03-11 18:16:48
change: Patch (1.0.0 > 1.0.1)
Security Center82bf5b87-728b-4a74-ba4d-6123845cf542Configure Microsoft Defender for Azure Cosmos DB to be enabledMicrosoft Defender for Azure Cosmos DB is an Azure-native layer of security that detects attempts to exploit databases in your Azure Cosmos DB accounts. Defender for Azure Cosmos DB detects potential SQL injections, known bad actors based on Microsoft Threat Intelligence, suspicious access patterns, and potential exploitations of your database through compromised identities or malicious insiders. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Security Admin
2022-03-11 18:16:48
add: 82bf5b87-728b-4a74-ba4d-6123845cf542
Kubernetes36a27de4-199b-40fb-b336-945a8475d6c5Configure AAD integrated Azure Kubernetes Service Clusters with required Admin Group AccessEnsure to improve cluster security by centrally govern Administrator access to Azure Active Directory integrated AKS clusters. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Azure Kubernetes Service Contributor Role
Azure Kubernetes Service Policy Add-on Deployment
2022-03-11 18:16:48
change: Major (1.0.0 > 2.0.0)
Guest Configuration3cf2ab00-13f1-4d0c-8971-2ac904541a7eAdd system-assigned managed identity to enable Guest Configuration assignments on virtual machines with no identitiesThis policy adds a system-assigned managed identity to virtual machines hosted in Azure that are supported by Guest Configuration but do not have any managed identities. A system-assigned managed identity is a prerequisite for all Guest Configuration assignments and must be added to machines before using any Guest Configuration policy definitions. For more information on Guest Configuration, visit https://aka.ms/gcpol. Fixed: modifyContributor
2022-02-18 17:44:00
change: Major (2.0.0 > 3.0.0)
Machine Learning438c38d2-3772-465a-a9cc-7a6666a275ceAzure Machine Learning workspaces should disable public network accessDisabling public network access improves security by ensuring that the machine learning workspaces aren't exposed on the public internet. You can limit exposure of your workspaces by creating private endpoints instead. Learn more at: https://aka.ms/privateendpoints. Default: Audit
Allowed: (Audit, Deny, Disabled)
2022-02-18 17:44:00
change: Minor (1.0.0 > 1.2.0)
Storagef0e5abd0-2554-4736-b7c0-4ffef23475efQueue Storage should use customer-managed key for encryptionSecure your queue storage with greater flexibility using customer-managed keys. When you specify a customer-managed key, that key is used to protect and control access to the key that encrypts your data. Using customer-managed keys provides additional capabilities to control rotation of the key encryption key or cryptographically erase data. Default: Audit
Allowed: (Audit, Deny, Disabled)
2022-02-18 17:44:00
add: f0e5abd0-2554-4736-b7c0-4ffef23475ef
Kubernetesd2e7ea85-6b44-4317-a0be-1b951587f626Kubernetes clusters should not grant CAP_SYS_ADMIN security capabilitiesTo reduce the attack surface of your containers, restrict CAP_SYS_ADMIN Linux capabilities. For more information, see https://aka.ms/kubepolicydoc. Default: Audit
Allowed: (audit, Audit, deny, Deny, disabled, Disabled)
2022-02-18 17:44:00
change: Minor (3.0.2 > 3.1.0)
Security Centercc9835f2-9f6b-4cc8-ab4a-f8ef615eb349[Deprecated]: Sensitive data in your SQL databases should be classifiedAzure Security Center monitors the data discovery and classification scan results for your SQL databases and provides recommendations to classify the sensitive data in your databases for better monitoring and security Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2022-02-18 17:44:00
change: Version remains equal, suffix changed: new suffix: deprecated; old suffix: preview (3.0.0-preview > 3.0.0-deprecated)
Stream Analyticsfe8684d6-3c5b-45c0-a08b-fa92653c2e1cStream Analytics job should connect to trusted inputs and outputsEnsure that Stream Analytics jobs do not have arbitrary Input or Output connections that are not defined in the allow-list. This checks that Stream Analytics jobs don't exfiltrate data by connecting to arbitrary sinks outside your organization. Default: Audit
Allowed: (Deny, Disabled, Audit)
2022-02-18 17:44:00
change: Minor (1.0.0 > 1.1.0)
Monitoring244efd75-0d92-453c-b9a3-7d73ca36ed52Configure Windows Virtual Machines to be associated with a Data Collection RuleDeploy Association to link Windows virtual machines to specified Data Collection Rule. The list of locations and OS images are updated over time as support is increased. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Monitoring Contributor
Log Analytics Contributor
2022-02-18 17:44:00
add: 244efd75-0d92-453c-b9a3-7d73ca36ed52
Monitoringd5c37ce1-5f52-4523-b949-f19bf945b73aConfigure Linux Arc Machines to be associated with a Data Collection RuleDeploy Association to link Linux Arc machines to specified Data Collection Rule. The list of locations are updated over time as support is increased. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Monitoring Contributor
Log Analytics Contributor
2022-02-18 17:44:00
add: d5c37ce1-5f52-4523-b949-f19bf945b73a
Monitoring58e891b9-ce13-4ac3-86e4-ac3e1f20cb07Configure Linux Virtual Machines to be associated with a Data Collection RuleDeploy Association to link Linux virtual machines to the specified Data Collection Rule. The list of locations and OS images are updated over time as support is increased. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Monitoring Contributor
Log Analytics Contributor
2022-02-18 17:44:00
add: 58e891b9-ce13-4ac3-86e4-ac3e1f20cb07
Security Center4eb909e7-6d64-656d-6465-2eeb297a1625[Preview]: Deploy Microsoft Defender for Endpoint agent on Linux hybrid machinesDeploys Microsoft Defender for Endpoint agent on Linux hybrid machines Default: DeployIfNotExists
Allowed: (DeployIfNotExists, AuditIfNotExists, Disabled)
Security Admin
2022-02-18 17:44:00
add: 4eb909e7-6d64-656d-6465-2eeb297a1625
Kubernetesa8eff44f-8c92-45c3-a3fb-9880802d67a7Deploy Azure Policy Add-on to Azure Kubernetes Service clustersUse Azure Policy Add-on to manage and report on the compliance state of your Azure Kubernetes Service (AKS) clusters. For more information, see https://aka.ms/akspolicydoc. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Azure Kubernetes Service Contributor Role
Azure Kubernetes Service Policy Add-on Deployment
2022-02-18 17:44:00
change: Major (3.0.0 > 4.0.0)
Guest Configuration497dff13-db2a-4c0f-8603-28fa3b331ab6Add system-assigned managed identity to enable Guest Configuration assignments on VMs with a user-assigned identityThis policy adds a system-assigned managed identity to virtual machines hosted in Azure that are supported by Guest Configuration and have at least one user-assigned identity but do not have a system-assigned managed identity. A system-assigned managed identity is a prerequisite for all Guest Configuration assignments and must be added to machines before using any Guest Configuration policy definitions. For more information on Guest Configuration, visit https://aka.ms/gcpol. Fixed: modifyContributor
2022-02-18 17:44:00
change: Major (2.0.0 > 3.0.0)
Guest Configuratione6ebf138-3d71-4935-a13b-9c7fdddd94dfAudit Windows machines on which the specified services are not installed and 'Running'Requires that prerequisites are deployed to the policy assignment scope. For details, visit https://aka.ms/gcpol. Machines are non-compliant if result of the Windows PowerShell command Get-Service do not include the service name with matching status as specified by the policy parameter. Fixed: auditIfNotExists
2022-02-18 17:44:00
change: Major (2.0.0 > 3.0.0)
Monitoring2ea82cdd-f2e8-4500-af75-67a2e084ca74Configure Linux Machines to be associated with a Data Collection RuleDeploy Association to link Linux virtual machines, virtual machine scale sets, and Arc machines to the specified Data Collection Rule. The list of locations and OS images are updated over time as support is increased. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Monitoring Contributor
Log Analytics Contributor
2022-02-18 17:44:00
change: Major (2.0.0 > 3.0.0)
Security Centerd30025d0-6d64-656d-6465-67688881b632[Preview]: Deploy Microsoft Defender for Endpoint agent on Linux virtual machinesDeploys Microsoft Defender for Endpoint agent on applicable Linux VM images. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, AuditIfNotExists, Disabled)
Security Admin
2022-02-18 17:44:00
add: d30025d0-6d64-656d-6465-67688881b632
Guest Configuration934345e1-4dfb-4c70-90d7-41990dc9608bAudit Windows machines that do not contain the specified certificates in Trusted RootRequires that prerequisites are deployed to the policy assignment scope. For details, visit https://aka.ms/gcpol. Machines are non-compliant if the machine Trusted Root certificate store (Cert:\LocalMachine\Root) does not contain one or more of the certificates listed by the policy parameter. Fixed: auditIfNotExists
2022-02-18 17:44:00
change: Major (2.0.0 > 3.0.0)
Monitoringc24c537f-2516-4c2f-aac5-2cd26baa3d26Configure Windows Arc Machines to be associated with a Data Collection RuleDeploy Association to link Windows Arc machines to specified Data Collection Rule. The list of locations are updated over time as support is increased. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Monitoring Contributor
Log Analytics Contributor
2022-02-18 17:44:00
add: c24c537f-2516-4c2f-aac5-2cd26baa3d26
Security Center1ec9c2c2-6d64-656d-6465-3ec3309b8579[Preview]: Deploy Microsoft Defender for Endpoint agent on Windows virtual machinesDeploys Microsoft Defender for Endpoint on applicable Windows VM images. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, AuditIfNotExists, Disabled)
Security Admin
2022-02-18 17:44:00
add: 1ec9c2c2-6d64-656d-6465-3ec3309b8579
Automanagef889cab7-da27-4c41-a3b0-de1f6f87c550Configure virtual machines to be onboarded to Azure AutomanageAzure Automanage enrolls, configures, and monitors virtual machines with best practice as defined in the Microsoft Cloud Adoption Framework for Azure. Use this policy to apply Automanage to your selected scope. Default: DeployIfNotExists
Allowed: (AuditIfNotExists, DeployIfNotExists, Disabled)
Contributor
2022-02-18 17:44:00
change: Major (1.0.0 > 2.0.0)
SQLc9299215-ae47-4f50-9c54-8a392f68a052Public network access should be disabled for MySQL flexible serversDisabling the public network access property improves security by ensuring your Azure Database for MySQL flexible servers can only be accessed from a private endpoint. This configuration strictly disables access from any public address space outside of Azure IP range and denies all logins that match IP or virtual network-based firewall rules. Default: Audit
Allowed: (Audit, Deny, Disabled)
2022-02-18 17:44:00
change: Major (1.0.0 > 2.0.0)
SQL5e1de0e3-42cb-4ebc-a86d-61d0c619ca48Public network access should be disabled for PostgreSQL flexible serversDisabling the public network access property improves security by ensuring your Azure Database for PostgreSQL flexible servers can only be accessed from a private endpoint. This configuration strictly disables access from any public address space outside of Azure IP range and denies all logins that match IP or virtual network-based firewall rules. Default: Audit
Allowed: (Audit, Deny, Disabled)
2022-02-18 17:44:00
change: Major (1.0.0 > 2.0.0)
Monitoringeab1f514-22e3-42e3-9a1f-e1dc9199355cConfigure Windows Machines to be associated with a Data Collection RuleDeploy Association to link Windows virtual machines, virtual machine scale sets, and Arc machines to specified Data Collection Rule. The list of locations and OS images are updated over time as support is increased. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Monitoring Contributor
Log Analytics Contributor
2022-02-18 17:44:00
change: Major (1.0.1 > 2.0.0)
Monitoring050a90d5-7cce-483f-8f6c-0df462036ddaConfigure Linux Virtual Machine Scale Sets to be associated with a Data Collection RuleDeploy Association to link Linux virtual machine scale sets to the specified Data Collection Rule. The list of locations and OS images are updated over time as support is increased. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Monitoring Contributor
Log Analytics Contributor
2022-02-18 17:44:00
add: 050a90d5-7cce-483f-8f6c-0df462036dda
Guest Configurationc648fbbb-591c-4acd-b465-ce9b176ca173Audit Windows machines that do not have the specified Windows PowerShell execution policyRequires that prerequisites are deployed to the policy assignment scope. For details, visit https://aka.ms/gcpol. Machines are non-compliant if the Windows PowerShell command Get-ExecutionPolicy returns a value other than what was selected in the policy parameter. Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2022-02-18 17:44:00
change: Major (2.0.0 > 3.0.0)
Storage7c322315-e26d-4174-a99e-f49d351b4688Table Storage should use customer-managed key for encryptionSecure your table storage with greater flexibility using customer-managed keys. When you specify a customer-managed key, that key is used to protect and control access to the key that encrypts your data. Using customer-managed keys provides additional capabilities to control rotation of the key encryption key or cryptographically erase data. Default: Audit
Allowed: (Audit, Deny, Disabled)
2022-02-18 17:44:00
add: 7c322315-e26d-4174-a99e-f49d351b4688
Security Center37c043a6-6d64-656d-6465-b362dfeb354a[Preview]: Deploy Microsoft Defender for Endpoint agent on Windows Azure Arc machinesDeploys Microsoft Defender for Endpoint on Windows Azure Arc machines. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, AuditIfNotExists, Disabled)
Security Admin
2022-02-18 17:44:00
add: 37c043a6-6d64-656d-6465-b362dfeb354a
SQLfd2d1a6e-6d95-4df2-ad00-504bf0273406Configure Arc-enabled machines running SQL Server to have SQL Server extension installed.To ensure that SQL Server - Azure Arc resources are created by default when SQL Server instance is found on Azure Arc enabled Windows Server, the latter should have SQL Server extension installed and the server's managed identity should be configured with Azure Connected SQL Server Onboarding role Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Log Analytics Contributor
User Access Administrator
2022-02-18 17:44:00
change: Minor (2.0.0 > 2.1.0)
Monitoring0a3b9bf4-d30e-424a-af6b-9a93f6f78792Configure Windows Virtual Machine Scale Sets to be associated with a Data Collection RuleDeploy Association to link Windows virtual machine scale sets to specified Data Collection Rule. The list of locations and OS images are updated over time as support is increased. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Monitoring Contributor
Log Analytics Contributor
2022-02-18 17:44:00
add: 0a3b9bf4-d30e-424a-af6b-9a93f6f78792
Guest Configurationc633f6a2-7f8b-4d9e-9456-02f0f04f5505Audit Windows machines that are not set to the specified time zoneRequires that prerequisites are deployed to the policy assignment scope. For details, visit https://aka.ms/gcpol. Machines are non-compliant if the value of the property StandardName in WMI class Win32_TimeZone does not match the selected time zone for the policy parameter. Fixed: auditIfNotExists
2022-02-18 17:44:00
change: Major (2.0.0 > 3.0.0)
Guest Configuration58c460e9-7573-4bb2-9676-339c2f2486bbAudit Windows machines on which Windows Serial Console is not enabledRequires that prerequisites are deployed to the policy assignment scope. For details, visit https://aka.ms/gcpol. Machines are non-compliant if the machine does not have the Serial Console software installed or if the EMS port number or baud rate are not configured with the same values as the policy parameters. Fixed: auditIfNotExists
2022-02-18 17:44:00
change: Major (2.0.0 > 3.0.0)
Guest Configuration08a2f2d2-94b2-4a7b-aa3b-bb3f523ee6fdAudit Windows machines on which the DSC configuration is not compliantRequires that prerequisites are deployed to the policy assignment scope. For details, visit https://aka.ms/gcpol. Machines are non-compliant if the Windows PowerShell command Get-DSCConfigurationStatus returns that the DSC configuration for the machine is not compliant. Fixed: auditIfNotExists
2022-02-18 17:44:00
change: Major (2.0.0 > 3.0.0)
Backup345fa903-145c-4fe1-8bcd-93ec2adccde8Configure backup on virtual machines with a given tag to an existing recovery services vault in the same locationEnforce backup for all virtual machines by backing them up to an existing central recovery services vault in the same location and subscription as the virtual machine. Doing this is useful when there is a central team in your organization managing backups for all resources in a subscription. You can optionally include virtual machines containing a specified tag to control the scope of assignment. See https://aka.ms/AzureVMCentralBackupIncludeTag. Default: DeployIfNotExists
Allowed: (auditIfNotExists, AuditIfNotExists, deployIfNotExists, DeployIfNotExists, disabled, Disabled)
Virtual Machine Contributor
Backup Contributor
2022-02-11 18:30:22
change: Major (5.0.0 > 6.0.0)
Security Center3b1a8e0a-b2e1-48be-9365-28be2fbef550[Preview]: Configure Arc machines to automatically create the Security Center pipeline for Azure Monitor AgentConfigure Arc machines to automatically create the Azure Security Center pipeline for Azure Monitor Agent. Security Center collects events from the agent and uses them to provide security alerts and tailored hardening tasks (recommendations). Create a resource group and Log Analytics workspace in the same region as the machine to store audit records. Target virtual machines must be in a supported location. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Contributor
2022-02-11 18:30:22
add: 3b1a8e0a-b2e1-48be-9365-28be2fbef550
Storageddcf4b94-9dfa-4a80-aca6-22bb654fde72Azure NetApp Files SMB Volumes should use SMB3 encryptionDisallow the creation of SMB Volumes without SMB3 encryption to ensure data integrity and data privacy. Default: Audit
Allowed: (Audit, Deny, Disabled)
2022-02-11 18:30:22
add: ddcf4b94-9dfa-4a80-aca6-22bb654fde72
Storage16f4af95-96b1-4220-805a-367ca59cd72eAzure NetApp Files Volumes of type NFSv4.1 should use Kerberos data integrity or data privacyEnsure that at least either Kerberos integrity (krb5i) or Kerberos privacy (krb5p) is selected to ensure data integrity and data privacy. Default: Audit
Allowed: (Audit, Deny, Disabled)
2022-02-11 18:30:22
add: 16f4af95-96b1-4220-805a-367ca59cd72e
App Service2d048aca-6479-4923-88f5-e2ac295d9af3App Service Environment apps should not be reachable over public internetTo ensure apps deployed in an App Service Environment are not accessible over public internet, one should deploy App Service Environment with an IP address in virtual network. To set the IP address to a virtual network IP, the App Service Environment must be deployed with an internal load balancer. Default: Audit
Allowed: (Audit, Deny, Disabled)
2022-02-11 18:30:22
change: Major (1.0.0 > 2.0.0)
Container Registryff05e24e-195c-447e-b322-5e90c9f9f366Container registries should have repository scoped access token disabled.Disable repository scoped access tokens for your registry so that repositories are not accessible by tokens. Disabling local authentication methods like admin user, repository scoped access tokens and anonymous pull improves security by ensuring that container registries exclusively require Azure Active Directory identities for authentication. Learn more at: https://aka.ms/acr/authentication. Default: Audit
Allowed: (Audit, Deny, Disabled)
2022-02-11 18:30:22
add: ff05e24e-195c-447e-b322-5e90c9f9f366
Container Registrydc921057-6b28-4fbe-9b83-f7bec05db6c2Container registries should have local admin account disabled.Disable admin account for your registry so that it is not accessible by local admin. Disabling local authentication methods like admin user, repository scoped access tokens and anonymous pull improves security by ensuring that container registries exclusively require Azure Active Directory identities for authentication. Learn more at: https://aka.ms/acr/authentication. Default: Audit
Allowed: (Audit, Deny, Disabled)
2022-02-11 18:30:22
change: Patch (1.0.0 > 1.0.1)
Backup09ce66bc-1220-4153-8104-e3f51c936913Configure backup on virtual machines without a given tag to an existing recovery services vault in the same locationEnforce backup for all virtual machines by backing them up to an existing central recovery services vault in the same location and subscription as the virtual machine. Doing this is useful when there is a central team in your organization managing backups for all resources in a subscription. You can optionally exclude virtual machines containing a specified tag to control the scope of assignment. See https://aka.ms/AzureVMCentralBackupExcludeTag. Default: DeployIfNotExists
Allowed: (auditIfNotExists, AuditIfNotExists, deployIfNotExists, DeployIfNotExists, disabled, Disabled)
Virtual Machine Contributor
Backup Contributor
2022-02-11 18:30:22
change: Major (5.0.0 > 6.0.0)
Backup98d0b9f8-fd90-49c9-88e2-d3baf3b0dd86Configure backup on virtual machines without a given tag to a new recovery services vault with a default policyEnforce backup for all virtual machines by deploying a recovery services vault in the same location and resource group as the virtual machine. Doing this is useful when different application teams in your organization are allocated separate resource groups and need to manage their own backups and restores. You can optionally exclude virtual machines containing a specified tag to control the scope of assignment. See https://aka.ms/AzureVMAppCentricBackupExcludeTag. Default: DeployIfNotExists
Allowed: (auditIfNotExists, AuditIfNotExists, deployIfNotExists, DeployIfNotExists, disabled, Disabled)
Virtual Machine Contributor
Backup Contributor
2022-02-11 18:30:22
change: Major (5.0.0 > 6.0.0)
Security Center30f52897-df47-4ca0-81a8-a3be3e8dd226[Preview]: Configure Association to link Arc machines to default Azure Security Center Data Collection RuleConfigure Arc machines to automatically create an association with the default data collection rule for Azure Security Center. Deleting this association will break the detection of security vulnerabilities for this Arc machine. Target Arc machines must be in a supported location. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Monitoring Contributor
2022-02-11 18:30:22
add: 30f52897-df47-4ca0-81a8-a3be3e8dd226
Security Center8b5ad9ab-3d44-4a6e-9ac3-75b04ea5fd28[Preview]: Configure machines to automatically create the Azure Security Center pipeline for Azure Monitor AgentConfigure machines to automatically create the Azure Security Center pipeline for Azure Monitor Agent. Security Center collects events from the agent and uses them to provide security alerts and tailored hardening tasks (recommendations). Create a resource group and Log Analytics workspace in the same region as the machine to store audit records. Target virtual machines must be in a supported location. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Contributor
2022-02-11 18:30:22
change: Patch, suffix remains equal (5.0.0-preview > 5.0.1-preview)
Container Registry79fdfe03-ffcb-4e55-b4d0-b925b8241759Configure container registries to disable local admin account.Disable admin account for your registry so that it is not accessible by local admin. Disabling local authentication methods like admin user, repository scoped access tokens and anonymous pull improves security by ensuring that container registries exclusively require Azure Active Directory identities for authentication. Learn more at: https://aka.ms/acr/authentication. Default: Modify
Allowed: (Modify, Disabled)
Contributor
2022-02-11 18:30:22
change: Patch (1.0.0 > 1.0.1)
Container Registrya9b426fe-8856-4945-8600-18c5dd1cca2aConfigure container registries to disable repository scoped access token.Disable repository scoped access tokens for your registry so that repositories are not accessible by tokens. Disabling local authentication methods like admin user, repository scoped access tokens and anonymous pull improves security by ensuring that container registries exclusively require Azure Active Directory identities for authentication. Learn more at: https://aka.ms/acr/authentication. Default: Modify
Allowed: (Modify, Disabled)
Contributor
2022-02-11 18:30:22
add: a9b426fe-8856-4945-8600-18c5dd1cca2a
Container Registrycced2946-b08a-44fe-9fd9-e4ed8a779897Configure container registries to disable anonymous authentication.Disable anonymous pull for your registry so that data not accessible by unauthenticated user. Disabling local authentication methods like admin user, repository scoped access tokens and anonymous pull improves security by ensuring that container registries exclusively require Azure Active Directory identities for authentication. Learn more at: https://aka.ms/acr/authentication. Default: Modify
Allowed: (Modify, Disabled)
Contributor
2022-02-11 18:30:22
add: cced2946-b08a-44fe-9fd9-e4ed8a779897
Storage7c6c7139-7d8e-45d0-9d94-72386a61308bAzure NetApp Files Volumes of type NFSv4.1 should use Kerberos data encryptionOnly allow the use of Kerberos privacy (5p) security mode to ensure data is encrypted. Default: Audit
Allowed: (Audit, Deny, Disabled)
2022-02-11 18:30:22
add: 7c6c7139-7d8e-45d0-9d94-72386a61308b
Storaged558e1a6-296d-4fbb-81a5-ea25822639f6Azure NetApp Files Volumes should not use NFSv3 protocol typeDisallow the use of NFSv3 protocol type to prevent unsecure access to volumes. NFSv4.1 with Kerberos protocol should be used to access NFS volumes to ensure data integrity and encryption. Default: Audit
Allowed: (Audit, Deny, Disabled)
2022-02-11 18:30:22
add: d558e1a6-296d-4fbb-81a5-ea25822639f6
Security Centerc9ae938d-3d6f-4466-b7c3-351761d9c890[Preview]: Configure Association to link Arc machines to user-defined Azure Security Center Data Collection RuleConfigure Arc machines to automatically create an association with the user-defined data collection rule for Azure Security Center. Deleting this association will break the detection of security vulnerabilities for this Arc machine. Target Arc machines must be in a supported location. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Monitoring Contributor
2022-02-11 18:30:22
add: c9ae938d-3d6f-4466-b7c3-351761d9c890
Container Registry9f2dea28-e834-476c-99c5-3507b4728395Container registries should have anonymous authentication disabled.Disable anonymous pull for your registry so that data is not accessible by unauthenticated user. Disabling local authentication methods like admin user, repository scoped access tokens and anonymous pull improves security by ensuring that container registries exclusively require Azure Active Directory identities for authentication. Learn more at: https://aka.ms/acr/authentication. Default: Audit
Allowed: (Audit, Deny, Disabled)
2022-02-11 18:30:22
add: 9f2dea28-e834-476c-99c5-3507b4728395
Backup83644c87-93dd-49fe-bf9f-6aff8fd0834eConfigure backup on virtual machines with a given tag to a new recovery services vault with a default policyEnforce backup for all virtual machines by deploying a recovery services vault in the same location and resource group as the virtual machine. Doing this is useful when different application teams in your organization are allocated separate resource groups and need to manage their own backups and restores. You can optionally include virtual machines containing a specified tag to control the scope of assignment. See https://aka.ms/AzureVMAppCentricBackupIncludeTag. Default: DeployIfNotExists
Allowed: (auditIfNotExists, AuditIfNotExists, deployIfNotExists, DeployIfNotExists, disabled, Disabled)
Virtual Machine Contributor
Backup Contributor
2022-02-11 18:30:22
change: Major (5.0.0 > 6.0.0)
Security Centeraba46665-c3a7-4319-ace1-a0282deebac2[Preview]: Configure Arc machines to automatically create the Security Center user-defined pipeline for Azure Monitor AgentConfigure Arc machines to automatically create the Azure Security Center user-defined pipeline for Azure Monitor Agent. Security Center collects events from the agent and uses them to provide security alerts and tailored hardening tasks (recommendations). Create a resource group and Log Analytics workspace in the same region as the machine to store audit records. Target Arc machines must be in a supported location Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Contributor
2022-02-11 18:30:22
add: aba46665-c3a7-4319-ace1-a0282deebac2
Security Center9c0aa188-e5fe-4569-8f74-b6e155624d9a[Preview]: Configure Association to link virtual machines to user-defined Azure Security Center Data Collection RuleConfigure machines to automatically create an association with the user-defined data collection rule for Azure Security Center. Deleting this association will break the detection of security vulnerabilities for this virtual machine. Target virtual machines must be in a supported location. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Monitoring Contributor
2022-02-04 18:25:37
add: 9c0aa188-e5fe-4569-8f74-b6e155624d9a
SQLb79fa14e-238a-4c2d-b376-442ce508fc84Deploy - Configure diagnostic settings for SQL Databases to Log Analytics workspaceDeploys the diagnostic settings for SQL Databases to stream resource logs to a Log Analytics workspace when any SQL Database which is missing this diagnostic settings is created or updated. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Monitoring Contributor
Log Analytics Contributor
2022-02-04 18:25:37
change: Major (2.0.0 > 3.0.0)
Automanage6d02d2f7-e38b-4bdc-96f3-adc0a8726abcHotpatch should be enabled for Windows Server Azure Edition VMsMinimize reboots and install updates quickly with hotpatch. Learn more at https://docs.microsoft.com/azure/automanage/automanage-hotpatch Default: Audit
Allowed: (Audit, Deny, Disabled)
2022-02-04 18:25:37
add: 6d02d2f7-e38b-4bdc-96f3-adc0a8726abc
Monitoringca817e41-e85a-4783-bc7f-dc532d36235eConfigure Windows virtual machines to run Azure Monitor Agent using system-assigned managed identityAutomate the deployment of Azure Monitor Agent extension on your Windows virtual machines for collecting telemetry data from the guest OS. This policy will install the extension if the OS and region are supported and system-assigned managed identity is enabled, and skip install otherwise. Learn more: https://aka.ms/AMAOverview. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Virtual Machine Contributor
2022-02-04 18:25:37
change: Major (2.0.1 > 3.0.0)
Monitoring4efbd9d8-6bc6-45f6-9be2-7fe9dd5d89ffConfigure Windows virtual machine scale sets to run Azure Monitor Agent using system-assigned managed identityAutomate the deployment of Azure Monitor Agent extension on your Windows virtual machine scale sets for collecting telemetry data from the guest OS. This policy will install the extension if the OS and region are supported and system-assigned managed identity is enabled, and skip install otherwise. Learn more: https://aka.ms/AMAOverview. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Virtual Machine Contributor
2022-02-04 18:25:37
change: Major (1.0.0 > 2.0.0)
Security Centerc15c5978-ab6e-4599-a1c3-90a7918f5371[Preview]: Configure machines to automatically create the Azure Security Center user-defined pipeline for Azure Monitor AgentConfigure machines to automatically create the Azure Security Center user-defined pipeline for Azure Monitor Agent. Security Center collects events from the agent and uses them to provide security alerts and tailored hardening tasks (recommendations). Create a resource group and Log Analytics workspace in the same region as the machine to store audit records. Target virtual machines must be in a supported location. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Contributor
2022-02-04 18:25:37
add: c15c5978-ab6e-4599-a1c3-90a7918f5371
SQLa9934fd7-29f2-4e6d-ab3d-607ea38e9079SQL Managed Instances should avoid using GRS backup redundancyManaged Instances should avoid using the default geo-redundant storage for backups, if data residency rules require data to stay within a specific region. Note: Azure Policy is not enforced when creating a database using T-SQL. If not explicitly specified, database with geo-redundant backup storage is created via T-SQL. Default: Deny
Allowed: (Deny, Disabled)
2022-02-04 18:25:37
change: Major (1.0.1 > 2.0.0)
Monitoring3672e6f7-a74d-4763-b138-fcf332042f8fWindows virtual machine scale sets should have Azure Monitor Agent installedWindows virtual machine scale sets should be monitored and secured through the deployed Azure Monitor Agent. The Azure Monitor Agent collects telemetry data from the guest OS. Virtual machine scale sets with supported OS and in supported regions are monitored for Azure Monitor Agent deployment. Learn more: https://aka.ms/AMAOverview. Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2022-02-04 18:25:37
change: Major (1.0.0 > 2.0.0)
Security Center8b5ad9ab-3d44-4a6e-9ac3-75b04ea5fd28[Preview]: Configure machines to automatically create the Azure Security Center pipeline for Azure Monitor AgentConfigure machines to automatically create the Azure Security Center pipeline for Azure Monitor Agent. Security Center collects events from the agent and uses them to provide security alerts and tailored hardening tasks (recommendations). Create a resource group and Log Analytics workspace in the same region as the machine to store audit records. Target virtual machines must be in a supported location. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Contributor
2022-02-04 18:25:37
change: Major, suffix remains equal (4.0.0-preview > 5.0.0-preview)
Security Centera2ea54a3-9707-45e3-8230-bbda8309d17e[Preview]: Configure Association to link virtual machines to default Azure Security Center Data Collection RuleConfigure machines to automatically create an association with the default data collection rule for Azure Security Center. Deleting this association will break the detection of security vulnerabilities for this virtual machine. Target virtual machines must be in a supported location. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Monitoring Contributor
2022-02-04 18:25:37
change: Major, suffix remains equal (1.0.0-preview > 2.0.0-preview)
Kubernetesb1a9997f-2883-4f12-bdff-2280f99b5915Ensure cluster containers have readiness or liveness probes configuredThis policy enforces that all pods have a readiness and/or liveness probes configured. Probe Types can be any of tcpSocket, httpGet and exec. This policy is generally available for Kubernetes Service (AKS), and preview for AKS Engine and Azure Arc enabled Kubernetes. For instructions on using this policy, visit https://aka.ms/kubepolicydoc. Default: Audit
Allowed: (Audit, Deny, Disabled)
2022-02-04 18:25:37
add: b1a9997f-2883-4f12-bdff-2280f99b5915
Security Center13ce0167-8ca6-4048-8e6b-f996402e3c1bConfigure machines to receive a vulnerability assessment providerAzure Defender includes vulnerability scanning for your machines at no extra cost. You don't need a Qualys license or even a Qualys account - everything's handled seamlessly inside Security Center. When you enable this policy, Azure Defender automatically deploys the Qualys vulnerability assessment provider to all supported machines that don't already have it installed. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Security Admin
2022-02-04 18:25:37
change: Major, suffix remains equal (2.2.0-preview > 3.0.0-preview)
Kubernetes708b60a6-d253-4fe0-9114-4be4c00f012c[Preview]: Configure Azure Arc enabled Kubernetes clusters to install Microsoft Defender for Cloud extensionMicrosoft Defender for Cloud extension for Azure Arc provides threat protection for your Arc enabled Kubernetes clusters. The extension collects data from all nodes in the cluster and sends it to the Azure Defender for Kubernetes backend in the cloud for further analysis. Learn more in https://docs.microsoft.com/azure/defender-for-cloud/defender-for-containers-enable?pivots=defender-for-container-arc. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Contributor
Log Analytics Contributor
2022-02-04 18:25:37
change: Major, suffix remains equal (3.0.0-preview > 4.0.0-preview)
Monitoringc02729e5-e5e7-4458-97fa-2b5ad0661f28Windows virtual machines should have Azure Monitor Agent installedWindows virtual machines should be monitored and secured through the deployed Azure Monitor Agent. The Azure Monitor Agent collects telemetry data from the guest OS. Windows virtual machines with supported OS and in supported regions are monitored for Azure Monitor Agent deployment. Learn more: https://aka.ms/AMAOverview. Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2022-02-04 18:25:37
change: Major (1.0.0 > 2.0.0)
Guest Configuration1417908b-4bff-46ee-a2a6-4acc899320abAudit Windows machines that contain certificates expiring within the specified number of daysRequires that prerequisites are deployed to the policy assignment scope. For details, visit https://aka.ms/gcpol. Machines are non-compliant if certificates in the specified store have an expiration date out of range for the number of days given as parameter. The policy also provides the option to only check for specific certificates or exclude specific certificates, and whether to report on expired certificates. Fixed: auditIfNotExists
2022-01-28 17:51:01
change: Major (1.0.0 > 2.0.0)
Guest Configuration2f262ace-812a-4fd0-b731-b38ba9e9708dWindows machines should meet requirements for 'Security Options - System objects'Windows machines should have the specified Group Policy settings in the category 'Security Options - System objects' for case insensitivity for non-Windows subsystems and permissions of internal system objects. This policy requires that the Guest Configuration prerequisites have been deployed to the policy assignment scope. For details, visit https://aka.ms/gcpol. Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2022-01-28 17:51:01
change: Major (2.0.0 > 3.0.0)
Guest Configurationf2143251-70de-4e81-87a8-36cee5a2f29dWindows machines should meet requirements for 'Security Settings - Account Policies'Windows machines should have the specified Group Policy settings in the category 'Security Settings - Account Policies' for password history, age, length, complexity, and storing passwords using reversible encryption. This policy requires that the Guest Configuration prerequisites have been deployed to the policy assignment scope. For details, visit https://aka.ms/gcpol. Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2022-01-28 17:51:01
change: Major (2.0.0 > 3.0.0)
Guest Configuration237b38db-ca4d-4259-9e47-7882441ca2c0Audit Windows machines that do not have a minimum password age of 1 dayRequires that prerequisites are deployed to the policy assignment scope. For details, visit https://aka.ms/gcpol. Machines are non-compliant if Windows machines that do not have a minimum password age of 1 day Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2022-01-28 17:51:01
change: Major (1.0.0 > 2.0.0)
Guest Configurationf71be03e-e25b-4d0f-b8bc-9b3e309b66c0Windows machines should meet requirements for 'Security Options - Recovery console'Windows machines should have the specified Group Policy settings in the category 'Security Options - Recovery console' for allowing floppy copy and access to all drives and folders. This policy requires that the Guest Configuration prerequisites have been deployed to the policy assignment scope. For details, visit https://aka.ms/gcpol. Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2022-01-28 17:51:01
change: Major (2.0.0 > 3.0.0)
Guest Configurationea53dbee-c6c9-4f0e-9f9e-de0039b78023Audit Linux machines that allow remote connections from accounts without passwordsRequires that prerequisites are deployed to the policy assignment scope. For details, visit https://aka.ms/gcpol. Machines are non-compliant if Linux machines that allow remote connections from accounts without passwords Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2022-01-28 17:51:01
change: Major (1.2.0 > 2.0.0)
Guest Configuratione0a7e899-2ce2-4253-8a13-d808fdeb75afWindows machines should meet requirements for 'Administrative Templates - MSS (Legacy)'Windows machines should have the specified Group Policy settings in the category 'Administrative Templates - MSS (Legacy)' for automatic logon, screen saver, network behavior, safe DLL, and event log. This policy requires that the Guest Configuration prerequisites have been deployed to the policy assignment scope. For details, visit https://aka.ms/gcpol. Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2022-01-28 17:51:01
change: Major (2.0.0 > 3.0.0)
Guest Configuratione6955644-301c-44b5-a4c4-528577de6861Audit Linux machines that do not have the passwd file permissions set to 0644Requires that prerequisites are deployed to the policy assignment scope. For details, visit https://aka.ms/gcpol. Machines are non-compliant if Linux machines that do not have the passwd file permissions set to 0644 Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2022-01-28 17:51:01
change: Major (1.2.0 > 2.0.0)
Guest Configuration4ceb8dc2-559c-478b-a15b-733fbf1e3738Audit Windows machines that do not have a maximum password age of 70 daysRequires that prerequisites are deployed to the policy assignment scope. For details, visit https://aka.ms/gcpol. Machines are non-compliant if Windows machines that do not have a maximum password age of 70 days Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2022-01-28 17:51:01
change: Major (1.0.0 > 2.0.0)
Guest Configuration630c64f9-8b6b-4c64-b511-6544ceff6fd6Authentication to Linux machines should require SSH keysAlthough SSH itself provides an encrypted connection, using passwords with SSH still leaves the VM vulnerable to brute-force attacks. The most secure option for authenticating to an Azure Linux virtual machine over SSH is with a public-private key pair, also known as SSH keys. Learn more: https://docs.microsoft.com/azure/virtual-machines/linux/create-ssh-keys-detailed. Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2022-01-28 17:51:01
change: Major (2.2.0 > 3.0.0)
Guest Configuration3e4e2bd5-15a2-4628-b3e1-58977e9793f3Audit Windows machines that do not have the specified Windows PowerShell modules installedRequires that prerequisites are deployed to the policy assignment scope. For details, visit https://aka.ms/gcpol. Machines are non-compliant if a module isn't available in a location specified by the environment variable PSModulePath. Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2022-01-28 17:51:01
change: Major (2.0.0 > 3.0.0)
Guest Configuration43bb60fe-1d7e-4b82-9e93-496bfc99e7d5Windows machines should meet requirements for 'System Audit Policies - Account Logon'Windows machines should have the specified Group Policy settings in the category 'System Audit Policies - Account Logon' for auditing credential validation and other account logon events. This policy requires that the Guest Configuration prerequisites have been deployed to the policy assignment scope. For details, visit https://aka.ms/gcpol. Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2022-01-28 17:51:01
change: Major (2.0.0 > 3.0.0)
Guest Configuration19be9779-c776-4dfa-8a15-a2fd5dc843d6Windows machines should meet requirements for 'System Audit Policies - Logon-Logoff'Windows machines should have the specified Group Policy settings in the category 'System Audit Policies - Logon-Logoff' for auditing IPSec, network policy, claims, account lockout, group membership, and logon/logoff events. This policy requires that the Guest Configuration prerequisites have been deployed to the policy assignment scope. For details, visit https://aka.ms/gcpol. Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2022-01-28 17:51:01
change: Major (2.0.0 > 3.0.0)
Guest Configuration08a2f2d2-94b2-4a7b-aa3b-bb3f523ee6fdAudit Windows machines on which the DSC configuration is not compliantRequires that prerequisites are deployed to the policy assignment scope. For details, visit https://aka.ms/gcpol. Machines are non-compliant if the Windows PowerShell command Get-DSCConfigurationStatus returns that the DSC configuration for the machine is not compliant. Fixed: auditIfNotExists
2022-01-28 17:51:01
change: Major (1.0.0 > 2.0.0)
Guest Configurationf19aa1c1-6b91-4c27-ae6a-970279f03db9[Deprecated]: Deploy prerequisites to audit Linux VMs that do not have the passwd file permissions set to 0644This policy creates a Guest Configuration assignment to audit Linux virtual machines that do not have the passwd file permissions set to 0644. It also creates a system-assigned managed identity and deploys the VM extension for Guest Configuration. This policy should only be used along with its corresponding audit policy in an initiative. For more information on Guest Configuration policies, please visit https://aka.ms/gcpol Fixed: deployIfNotExistsContributor
2022-01-28 17:51:01
change: Major, suffix remains equal (3.1.0-deprecated > 4.0.0-deprecated)
Guest Configurationbf16e0bb-31e1-4646-8202-60a235cc7e74Audit Windows machines that do not have the password complexity setting enabledRequires that prerequisites are deployed to the policy assignment scope. For details, visit https://aka.ms/gcpol. Machines are non-compliant if Windows machines that do not have the password complexity setting enabled Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2022-01-28 17:51:01
change: Major (1.0.0 > 2.0.0)
Guest Configuratione068b215-0026-4354-b347-8fb2766f73a2Windows machines should meet requirements for 'User Rights Assignment'Windows machines should have the specified Group Policy settings in the category 'User Rights Assignment' for allowing log on locally, RDP, access from the network, and many other user activities. This policy requires that the Guest Configuration prerequisites have been deployed to the policy assignment scope. For details, visit https://aka.ms/gcpol. Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2022-01-28 17:51:01
change: Major (2.0.0 > 3.0.0)
Guest Configuration8316fa92-d69c-4810-8124-62414f560dcfWindows machines should meet requirements for 'System Audit Policies - System'Windows machines should have the specified Group Policy settings in the category 'System Audit Policies - System' for auditing IPsec driver, system integrity, system extension, state change, and other system events. This policy requires that the Guest Configuration prerequisites have been deployed to the policy assignment scope. For details, visit https://aka.ms/gcpol. Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2022-01-28 17:51:01
change: Major (2.0.0 > 3.0.0)
Guest Configuration6265018c-d7e2-432f-a75d-094d5f6f4465Audit Windows machines on which the Log Analytics agent is not connected as expectedRequires that prerequisites are deployed to the policy assignment scope. For details, visit https://aka.ms/gcpol. Machines are non-compliant if the agent is not installed, or if it is installed but the COM object AgentConfigManager.MgmtSvcCfg returns that it is registered to a workspace other than the ID specified in the policy parameter. Fixed: auditIfNotExists
2022-01-28 17:51:01
change: Major (1.0.0 > 2.0.0)
Guest Configurationc40c9087-1981-4e73-9f53-39743eda9d05[Deprecated]: Show audit results from Linux VMs that have accounts without passwordsThis policy should only be used along with its corresponding deploy policy in an initiative. This definition allows Azure Policy to process the results of auditing Linux virtual machines that have accounts without passwords. For more information on Guest Configuration policies, please visit https://aka.ms/gcpol Fixed: auditIfNotExists
2022-01-28 17:51:01
change: Major, suffix remains equal (3.1.0-deprecated > 4.0.0-deprecated)
Guest Configuration5752e6d6-1206-46d8-8ab1-ecc2f71a8112Windows web servers should be configured to use secure communication protocolsTo protect the privacy of information communicated over the Internet, your web servers should use the latest version of the industry-standard cryptographic protocol, Transport Layer Security (TLS). TLS secures communications over a network by using security certificates to encrypt a connection between machines. Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2022-01-28 17:51:01
change: Major (3.0.0 > 4.0.0)
Guest Configuration3cf2ab00-13f1-4d0c-8971-2ac904541a7eAdd system-assigned managed identity to enable Guest Configuration assignments on virtual machines with no identitiesThis policy adds a system-assigned managed identity to virtual machines hosted in Azure that are supported by Guest Configuration but do not have any managed identities. A system-assigned managed identity is a prerequisite for all Guest Configuration assignments and must be added to machines before using any Guest Configuration policy definitions. For more information on Guest Configuration, visit https://aka.ms/gcpol. Fixed: modifyContributor
2022-01-28 17:51:01
change: Major (1.1.0 > 2.0.0)
App Service91a78b24-f231-4a8a-8da9-02c35b2b6510Resource logs in App Services should be enabledAudit enabling of resource logs on the app. This enables you to recreate activity trails for investigation purposes if a security incident occurs or your network is compromised. Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2022-01-28 17:51:01
change: Major (1.0.0 > 2.0.0)
Guest Configuration33936777-f2ac-45aa-82ec-07958ec9ade4Windows machines should meet requirements for 'Security Options - Audit'Windows machines should have the specified Group Policy settings in the category 'Security Options - Audit' for forcing audit policy subcategory and shutting down if unable to log security audits. This policy requires that the Guest Configuration prerequisites have been deployed to the policy assignment scope. For details, visit https://aka.ms/gcpol. Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2022-01-28 17:51:01
change: Major (2.0.0 > 3.0.0)
Guest Configurationb18175dd-c599-4c64-83ba-bb018a06d35b[Deprecated]: Show audit results from Linux VMs that do not have the passwd file permissions set to 0644This policy should only be used along with its corresponding deploy policy in an initiative. This definition allows Azure Policy to process the results of auditing Linux virtual machines that do not have the passwd file permissions set to 0644. For more information on Guest Configuration policies, please visit https://aka.ms/gcpol Fixed: auditIfNotExists
2022-01-28 17:51:01
change: Major, suffix remains equal (3.1.0-deprecated > 4.0.0-deprecated)
Guest Configuration3d2a3320-2a72-4c67-ac5f-caa40fbee2b2Audit Windows machines that have extra accounts in the Administrators groupRequires that prerequisites are deployed to the policy assignment scope. For details, visit https://aka.ms/gcpol. Machines are non-compliant if the local Administrators group contains members that are not listed in the policy parameter. Fixed: auditIfNotExists
2022-01-28 17:51:01
change: Major (1.0.0 > 2.0.0)
Guest Configuration3aa2661b-02d7-4ba6-99bc-dc36b10489fdWindows machines should meet requirements for 'Administrative Templates - Control Panel'Windows machines should have the specified Group Policy settings in the category 'Administrative Templates - Control Panel' for input personalization and prevention of enabling lock screens. This policy requires that the Guest Configuration prerequisites have been deployed to the policy assignment scope. For details, visit https://aka.ms/gcpol. Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2022-01-28 17:51:01
change: Major (2.0.0 > 3.0.0)
Guest Configurationc5b85cba-6e6f-4de4-95e1-f0233cd712acAudit Windows machines that have the specified applications installedRequires that prerequisites are deployed to the policy assignment scope. For details, visit https://aka.ms/gcpol. Machines are non-compliant if the application name is found in any of the following registry paths: HKLM:SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall, HKLM:SOFTWARE\Wow6432node\Microsoft\Windows\CurrentVersion\Uninstall, HKCU:Software\Microsoft\Windows\CurrentVersion\Uninstall. Fixed: auditIfNotExists
2022-01-28 17:51:01
change: Major (1.0.0 > 2.0.0)
Guest Configurationc633f6a2-7f8b-4d9e-9456-02f0f04f5505Audit Windows machines that are not set to the specified time zoneRequires that prerequisites are deployed to the policy assignment scope. For details, visit https://aka.ms/gcpol. Machines are non-compliant if the value of the property StandardName in WMI class Win32_TimeZone does not match the selected time zone for the policy parameter. Fixed: auditIfNotExists
2022-01-28 17:51:01
change: Major (1.0.0 > 2.0.0)
Guest Configurationcaf2d518-f029-4f6b-833b-d7081702f253Windows machines should meet requirements for 'Security Options - Microsoft Network Server'Windows machines should have the specified Group Policy settings in the category 'Security Options - Microsoft Network Server' for disabling SMB v1 server. This policy requires that the Guest Configuration prerequisites have been deployed to the policy assignment scope. For details, visit https://aka.ms/gcpol. Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2022-01-28 17:51:01
change: Major (2.0.0 > 3.0.0)
Guest Configuration58c460e9-7573-4bb2-9676-339c2f2486bbAudit Windows machines on which Windows Serial Console is not enabledRequires that prerequisites are deployed to the policy assignment scope. For details, visit https://aka.ms/gcpol. Machines are non-compliant if the machine does not have the Serial Console software installed or if the EMS port number or baud rate are not configured with the same values as the policy parameters. Fixed: auditIfNotExists
2022-01-28 17:51:01
change: Major (1.0.0 > 2.0.0)
Guest Configurationc648fbbb-591c-4acd-b465-ce9b176ca173Audit Windows machines that do not have the specified Windows PowerShell execution policyRequires that prerequisites are deployed to the policy assignment scope. For details, visit https://aka.ms/gcpol. Machines are non-compliant if the Windows PowerShell command Get-ExecutionPolicy returns a value other than what was selected in the policy parameter. Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2022-01-28 17:51:01
change: Major (1.1.0 > 2.0.0)
Guest Configurationebb67efd-3c46-49b0-adfe-5599eb944998Audit Windows machines that don't have the specified applications installedRequires that prerequisites are deployed to the policy assignment scope. For details, visit https://aka.ms/gcpol. Machines are non-compliant if the application name is not found in any of the following registry paths: HKLM:SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall, HKLM:SOFTWARE\Wow6432node\Microsoft\Windows\CurrentVersion\Uninstall, HKCU:Software\Microsoft\Windows\CurrentVersion\Uninstall. Fixed: auditIfNotExists
2022-01-28 17:51:01
change: Major (1.0.0 > 2.0.0)
Guest Configurationec49586f-4939-402d-a29e-6ff502b20592[Deprecated]: Deploy prerequisites to audit Linux VMs that allow remote connections from accounts without passwordsThis policy creates a Guest Configuration assignment to audit Linux virtual machines that allow remote connections from accounts without passwords. It also creates a system-assigned managed identity and deploys the VM extension for Guest Configuration. This policy should only be used along with its corresponding audit policy in an initiative. For more information on Guest Configuration policies, please visit https://aka.ms/gcpol Fixed: deployIfNotExistsContributor
2022-01-28 17:51:01
change: Major, suffix remains equal (3.1.0-deprecated > 4.0.0-deprecated)
Guest Configuration3470477a-b35a-49db-aca5-1073d04524fe[Deprecated]: Deploy prerequisites to audit Linux VMs that have accounts without passwordsThis policy creates a Guest Configuration assignment to audit Linux virtual machines that have accounts without passwords. It also creates a system-assigned managed identity and deploys the VM extension for Guest Configuration. This policy should only be used along with its corresponding audit policy in an initiative. For more information on Guest Configuration policies, please visit https://aka.ms/gcpol Fixed: deployIfNotExistsContributor
2022-01-28 17:51:01
change: Major, suffix remains equal (3.1.0-deprecated > 4.0.0-deprecated)
Guest Configurationf79fef0d-0050-4c18-a303-5babb9c14ac7Windows machines should only have local accounts that are allowedRequires that prerequisites are deployed to the policy assignment scope. For details, visit https://aka.ms/gcpol. This definition is not supported on Windows Server 2012 or 2012 R2. Managing user accounts using Azure Active Directory is a best practice for management of identities. Reducing local machine accounts helps prevent the proliferation of identities managed outside a central system. Machines are non-compliant if local user accounts exist that are enabled and not listed in the policy parameter. Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2022-01-28 17:51:01
change: Major (1.0.0 > 2.0.0)
Guest Configuration73db37c4-f180-4b0f-ab2c-8ee96467686bLinux machines should only have local accounts that are allowedRequires that prerequisites are deployed to the policy assignment scope. For details, visit https://aka.ms/gcpol. Managing user accounts using Azure Active Directory is a best practice for management of identities. Reducing local machine accounts helps prevent the proliferation of identities managed outside a central system. Machines are non-compliant if local user accounts exist that are enabled and not listed in the policy parameter. Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2022-01-28 17:51:01
change: Major (1.1.0 > 2.0.0)
Guest Configuration35781875-8026-4628-b19b-f6efb4d88a1dWindows machines should meet requirements for 'System Audit Policies - Object Access'Windows machines should have the specified Group Policy settings in the category 'System Audit Policies - Object Access' for auditing file, registry, SAM, storage, filtering, kernel, and other system types. This policy requires that the Guest Configuration prerequisites have been deployed to the policy assignment scope. For details, visit https://aka.ms/gcpol. Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2022-01-28 17:51:01
change: Major (2.0.0 > 3.0.0)
Guest Configurationfb27e9e0-526e-4ae1-89f2-a2a0bf0f8a50[Deprecated]: Deploy prerequisites to enable Guest Configuration Policy on Linux VMs.This policy creates a system-assigned managed identity and deploys the VM extension for Guest Configuration on Linux VMs. This is a prerequisite for Guest Configuration Policy and must be assigned to the scope before using any Guest Configuration policy. For more information on Guest Configuration policies, please visit https://aka.ms/gcpol. Fixed: deployIfNotExistsContributor
2022-01-28 17:51:01
change: Major, suffix remains equal (3.1.0-deprecated > 4.0.0-deprecated)
Guest Configuration0447bc18-e2f7-4c0d-aa20-bff034275be1Audit Linux machines that have the specified applications installedRequires that prerequisites are deployed to the policy assignment scope. For details, visit https://aka.ms/gcpol. Machines are non-compliant if the Chef InSpec resource indicates that one or more of the packages provided by the parameter are installed. Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2022-01-28 17:51:01
change: Major (3.2.0 > 4.0.0)
Guest Configuration497dff13-db2a-4c0f-8603-28fa3b331ab6Add system-assigned managed identity to enable Guest Configuration assignments on VMs with a user-assigned identityThis policy adds a system-assigned managed identity to virtual machines hosted in Azure that are supported by Guest Configuration and have at least one user-assigned identity but do not have a system-assigned managed identity. A system-assigned managed identity is a prerequisite for all Guest Configuration assignments and must be added to machines before using any Guest Configuration policy definitions. For more information on Guest Configuration, visit https://aka.ms/gcpol. Fixed: modifyContributor
2022-01-28 17:51:01
change: Major (1.1.0 > 2.0.0)
Guest Configurationf6ec09a3-78bf-4f8f-99dc-6c77182d0f99Audit Linux machines that have accounts without passwordsRequires that prerequisites are deployed to the policy assignment scope. For details, visit https://aka.ms/gcpol. Machines are non-compliant if Linux machines that have accounts without passwords Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2022-01-28 17:51:01
change: Major (1.2.0 > 2.0.0)
Guest Configuration630ac30f-a234-4533-ac2d-e0df77acda51Audit Windows machines network connectivityRequires that prerequisites are deployed to the policy assignment scope. For details, visit https://aka.ms/gcpol. Machines are non-compliant if a network connection status to an IP and TCP port does not match the policy parameter. Fixed: auditIfNotExists
2022-01-28 17:51:01
change: Major (1.0.0 > 2.0.0)
Guest Configuration4078e558-bda6-41fb-9b3c-361e8875200dWindows machines should have Log Analytics agent installed on Azure ArcMachines are non-compliant if Log Analytics agent is not installed on Azure Arc enabled windows server. Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2022-01-28 17:51:01
change: Major (1.0.0 > 2.0.0)
Guest Configuration4221adbc-5c0f-474f-88b7-037a99e6114cAudit Windows VMs with a pending rebootRequires that prerequisites are deployed to the policy assignment scope. For details, visit https://aka.ms/gcpol. Machines are non-compliant if the machine is pending reboot for any of the following reasons: component based servicing, Windows Update, pending file rename, pending computer rename, configuration manager pending reboot. Each detection has a unique registry path. Fixed: auditIfNotExists
2022-01-28 17:51:01
change: Major (1.0.0 > 2.0.0)
Guest Configuration2d67222d-05fd-4526-a171-2ee132ad9e83[Deprecated]: Show audit results from Linux VMs that allow remote connections from accounts without passwordsThis policy should only be used along with its corresponding deploy policy in an initiative. This definition allows Azure Policy to process the results of auditing Linux virtual machines that allow remote connections from accounts without passwords. For more information on Guest Configuration policies, please visit https://aka.ms/gcpol Fixed: auditIfNotExists
2022-01-28 17:51:01
change: Major, suffix remains equal (3.1.0-deprecated > 4.0.0-deprecated)
Guest Configuratione6ebf138-3d71-4935-a13b-9c7fdddd94dfAudit Windows machines on which the specified services are not installed and 'Running'Requires that prerequisites are deployed to the policy assignment scope. For details, visit https://aka.ms/gcpol. Machines are non-compliant if result of the Windows PowerShell command Get-Service do not include the service name with matching status as specified by the policy parameter. Fixed: auditIfNotExists
2022-01-28 17:51:01
change: Major (1.0.0 > 2.0.0)
Guest Configurationb4a4d1eb-0263-441b-84cb-a44073d8372dWindows machines should meet requirements for 'Security Options - Shutdown'Windows machines should have the specified Group Policy settings in the category 'Security Options - Shutdown' for allowing shutdown without logon and clearing the virtual memory pagefile. This policy requires that the Guest Configuration prerequisites have been deployed to the policy assignment scope. For details, visit https://aka.ms/gcpol. Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2022-01-28 17:51:01
change: Major (2.0.0 > 3.0.0)
Guest Configuration492a29ed-d143-4f03-b6a4-705ce081b463Windows machines should meet requirements for 'Security Options - User Account Control'Windows machines should have the specified Group Policy settings in the category 'Security Options - User Account Control' for mode for admins, behavior of elevation prompt, and virtualizing file and registry write failures. This policy requires that the Guest Configuration prerequisites have been deployed to the policy assignment scope. For details, visit https://aka.ms/gcpol. Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2022-01-28 17:51:01
change: Major (2.0.0 > 3.0.0)
Guest Configurationd3b823c9-e0fc-4453-9fb2-8213b7338523Audit Linux machines that don't have the specified applications installedRequires that prerequisites are deployed to the policy assignment scope. For details, visit https://aka.ms/gcpol. Machines are non-compliant if the Chef InSpec resource indicates that one or more of the packages provided by the parameter are not installed. Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2022-01-28 17:51:01
change: Major (3.1.0 > 4.0.0)
Guest Configurationfee5cb2b-9d9b-410e-afe3-2902d90d0004[Deprecated]: Show audit results from Linux VMs that do not have the specified applications installedThis policy should only be used along with its corresponding deploy policy in an initiative. This definition allows Azure Policy to process the results of auditing Linux virtual machines that do not have the specified applications installed. For more information on Guest Configuration policies, please visit https://aka.ms/gcpol Fixed: auditIfNotExists
2022-01-28 17:51:01
change: Major, suffix remains equal (3.1.0-deprecated > 4.0.0-deprecated)
Guest Configuration2a7a701e-dff3-4da9-9ec5-42cb98594c0bWindows machines should meet requirements for 'System Audit Policies - Policy Change'Windows machines should have the specified Group Policy settings in the category 'System Audit Policies - Policy Change' for auditing changes to system audit policies. This policy requires that the Guest Configuration prerequisites have been deployed to the policy assignment scope. For details, visit https://aka.ms/gcpol. Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2022-01-28 17:51:01
change: Major (2.0.0 > 3.0.0)
Guest Configurationa2d0e922-65d0-40c4-8f87-ea6da2d307a2Audit Windows machines that do not restrict the minimum password length to 14 charactersRequires that prerequisites are deployed to the policy assignment scope. For details, visit https://aka.ms/gcpol. Machines are non-compliant if Windows machines that do not restrict the minimum password length to 14 characters Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2022-01-28 17:51:01
change: Major (1.0.0 > 2.0.0)
Guest Configurationda0f98fe-a24b-4ad5-af69-bd0400233661Audit Windows machines that do not store passwords using reversible encryptionRequires that prerequisites are deployed to the policy assignment scope. For details, visit https://aka.ms/gcpol. Machines are non-compliant if Windows machines that do not store passwords using reversible encryption Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2022-01-28 17:51:01
change: Major (1.0.0 > 2.0.0)
Guest Configuration934345e1-4dfb-4c70-90d7-41990dc9608bAudit Windows machines that do not contain the specified certificates in Trusted RootRequires that prerequisites are deployed to the policy assignment scope. For details, visit https://aka.ms/gcpol. Machines are non-compliant if the machine Trusted Root certificate store (Cert:\LocalMachine\Root) does not contain one or more of the certificates listed by the policy parameter. Fixed: auditIfNotExists
2022-01-28 17:51:01
change: Major (1.0.1 > 2.0.0)
Guest Configuration69bf4abd-ca1e-4cf6-8b5a-762d42e61d4fAudit Windows machines that have the specified members in the Administrators groupRequires that prerequisites are deployed to the policy assignment scope. For details, visit https://aka.ms/gcpol. Machines are non-compliant if the local Administrators group contains one or more of the members listed in the policy parameter. Fixed: auditIfNotExists
2022-01-28 17:51:01
change: Major (1.0.0 > 2.0.0)
Guest Configuration1221c620-d201-468c-81e7-2817e6107e84Windows machines should meet requirements for 'Security Options - Network Security'Windows machines should have the specified Group Policy settings in the category 'Security Options - Network Security' for including Local System behavior, PKU2U, LAN Manager, LDAP client, and NTLM SSP. This policy requires that the Guest Configuration prerequisites have been deployed to the policy assignment scope. For details, visit https://aka.ms/gcpol. Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2022-01-28 17:51:01
change: Major (2.0.0 > 3.0.0)
Guest Configuration3ff60f98-7fa4-410a-9f7f-0b00f5afdbddWindows machines should meet requirements for 'Security Options - Network Access'Windows machines should have the specified Group Policy settings in the category 'Security Options - Network Access' for including access for anonymous users, local accounts, and remote access to the registry. This policy requires that the Guest Configuration prerequisites have been deployed to the policy assignment scope. For details, visit https://aka.ms/gcpol. Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2022-01-28 17:51:01
change: Major (2.0.0 > 3.0.0)
Guest Configuration5b054a0d-39e2-4d53-bea3-9734cad2c69bAudit Windows machines that allow re-use of the previous 24 passwordsRequires that prerequisites are deployed to the policy assignment scope. For details, visit https://aka.ms/gcpol. Machines are non-compliant if Windows machines that allow re-use of the previous 24 passwords Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2022-01-28 17:51:01
change: Major (1.0.0 > 2.0.0)
Guest Configuration84662df4-0e37-44a6-9ce1-c9d2150db18cAudit Windows machines that are not joined to the specified domainRequires that prerequisites are deployed to the policy assignment scope. For details, visit https://aka.ms/gcpol. Machines are non-compliant if the value of the Domain property in WMI class win32_computersystem does not match the value in the policy parameter. Fixed: auditIfNotExists
2022-01-28 17:51:01
change: Major (1.0.0 > 2.0.0)
Guest Configurationbed48b13-6647-468e-aa2f-1af1d3f4dd40Windows Defender Exploit Guard should be enabled on your machinesWindows Defender Exploit Guard uses the Azure Policy Guest Configuration agent. Exploit Guard has four components that are designed to lock down devices against a wide variety of attack vectors and block behaviors commonly used in malware attacks while enabling enterprises to balance their security risk and productivity requirements (Windows only). Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2022-01-28 17:51:01
change: Major (1.1.1 > 2.0.0)
Guest Configuration884b209a-963b-4520-8006-d20cb3c213e0[Deprecated]: Deploy prerequisites to audit Linux VMs that have the specified applications installedThis policy creates a Guest Configuration assignment to audit Linux virtual machines that have the specified applications installed. It also creates a system-assigned managed identity and deploys the VM extension for Guest Configuration. This policy should only be used along with its corresponding audit policy in an initiative. For more information on Guest Configuration policies, please visit https://aka.ms/gcpol Fixed: deployIfNotExistsContributor
2022-01-28 17:51:01
change: Major, suffix remains equal (3.1.0-deprecated > 4.0.0-deprecated)
Guest Configurationd472d2c9-d6a3-4500-9f5f-b15f123005aaWindows machines should meet requirements for 'Security Options - Interactive Logon'Windows machines should have the specified Group Policy settings in the category 'Security Options - Interactive Logon' for displaying last user name and requiring ctrl-alt-del. This policy requires that the Guest Configuration prerequisites have been deployed to the policy assignment scope. For details, visit https://aka.ms/gcpol. Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2022-01-28 17:51:01
change: Major (2.0.0 > 3.0.0)
Monitoring594c1276-f44f-482d-9910-71fac2ce5ae0[Preview]: Configure Azure Arc-enabled Windows machines with Log Analytics agents connected to default Log Analytics workspaceProtect your Azure Arc-enabled Windows machines with Microsoft Defender for Cloud capabilities, by installing Log Analytics agents that send data to a default Log Analytics workspace created by Microsoft Defender for Cloud. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Contributor
2022-01-28 17:51:01
change: Minor, suffix remains equal (1.0.0-preview > 1.1.0-preview)
Guest Configuration30f71ea1-ac77-4f26-9fc5-2d926bbd4ba7Audit Windows machines missing any of specified members in the Administrators groupRequires that prerequisites are deployed to the policy assignment scope. For details, visit https://aka.ms/gcpol. Machines are non-compliant if the local Administrators group does not contain one or more members that are listed in the policy parameter. Fixed: auditIfNotExists
2022-01-28 17:51:01
change: Major (1.0.0 > 2.0.0)
Guest Configuration35d9882c-993d-44e6-87d2-db66ce21b636Windows machines should meet requirements for 'Windows Firewall Properties'Windows machines should have the specified Group Policy settings in the category 'Windows Firewall Properties' for firewall state, connections, rule management, and notifications. This policy requires that the Guest Configuration prerequisites have been deployed to the policy assignment scope. For details, visit https://aka.ms/gcpol. Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2022-01-28 17:51:01
change: Major (2.0.0 > 3.0.0)
Guest Configuration58383b73-94a9-4414-b382-4146eb02611bWindows machines should meet requirements for 'System Audit Policies - Detailed Tracking'Windows machines should have the specified Group Policy settings in the category 'System Audit Policies - Detailed Tracking' for auditing DPAPI, process creation/termination, RPC events, and PNP activity. This policy requires that the Guest Configuration prerequisites have been deployed to the policy assignment scope. For details, visit https://aka.ms/gcpol. Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2022-01-28 17:51:01
change: Major (2.0.0 > 3.0.0)
Guest Configuration94d9aca8-3757-46df-aa51-f218c5f11954Windows machines should meet requirements for 'System Audit Policies - Account Management'Windows machines should have the specified Group Policy settings in the category 'System Audit Policies - Account Management' for auditing application, security, and user group management, and other management events. This policy requires that the Guest Configuration prerequisites have been deployed to the policy assignment scope. For details, visit https://aka.ms/gcpol. Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2022-01-28 17:51:01
change: Major (2.0.0 > 3.0.0)
Kubernetes098fc59e-46c7-4d99-9b16-64990e543d75Kubernetes cluster pod hostPath volumes should only use allowed host pathsLimit pod HostPath volume mounts to the allowed host paths in a Kubernetes Cluster. This recommendation is part of Pod Security Policies which are intended to improve the security of your Kubernetes environments. This policy is generally available for Kubernetes Service (AKS), and preview for AKS Engine and Azure Arc enabled Kubernetes. For more information, see https://aka.ms/kubepolicydoc. Default: Audit
Allowed: (audit, Audit, deny, Deny, disabled, Disabled)
2022-01-28 17:51:01
change: Patch (4.0.2 > 4.0.3)
Guest Configuration72650e9f-97bc-4b2a-ab5f-9781a9fcecbcWindows machines should meet requirements of the Azure compute security baselineRequires that prerequisites are deployed to the policy assignment scope. For details, visit https://aka.ms/gcpol. Machines are non-compliant if the machine is not configured correctly for one of the recommendations in the Azure compute security baseline. Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2022-01-28 17:51:01
change: Major (1.0.1 > 2.0.0)
Guest Configurationd6c69680-54f0-4349-af10-94dd05f4225eWindows machines should meet requirements for 'Security Options - Microsoft Network Client'Windows machines should have the specified Group Policy settings in the category 'Security Options - Microsoft Network Client' for Microsoft network client/server and SMB v1. This policy requires that the Guest Configuration prerequisites have been deployed to the policy assignment scope. For details, visit https://aka.ms/gcpol. Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2022-01-28 17:51:01
change: Major (2.0.0 > 3.0.0)
Guest Configuration4d1c04de-2172-403f-901b-90608c35c721[Deprecated]: Deploy prerequisites to audit Linux VMs that do not have the specified applications installedThis policy creates a Guest Configuration assignment to audit Linux virtual machines that do not have the specified applications installed. It also creates a system-assigned managed identity and deploys the VM extension for Guest Configuration. This policy should only be used along with its corresponding audit policy in an initiative. For more information on Guest Configuration policies, please visit https://aka.ms/gcpol Fixed: deployIfNotExistsContributor
2022-01-28 17:51:01
change: Major, suffix remains equal (3.1.0-deprecated > 4.0.0-deprecated)
Guest Configurationee984370-154a-4ee8-9726-19d900e56fc0Windows machines should meet requirements for 'Security Options - Accounts'Windows machines should have the specified Group Policy settings in the category 'Security Options - Accounts' for limiting local account use of blank passwords and guest account status. This policy requires that the Guest Configuration prerequisites have been deployed to the policy assignment scope. For details, visit https://aka.ms/gcpol. Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2022-01-28 17:51:01
change: Major (2.0.0 > 3.0.0)
Guest Configuration331e8ea8-378a-410f-a2e5-ae22f38bb0daDeploy the Linux Guest Configuration extension to enable Guest Configuration assignments on Linux VMsThis policy deploys the Linux Guest Configuration extension to Linux virtual machines hosted in Azure that are supported by Guest Configuration. The Linux Guest Configuration extension is a prerequisite for all Linux Guest Configuration assignments and must be deployed to machines before using any Linux Guest Configuration policy definition. For more information on Guest Configuration, visit https://aka.ms/gcpol. Fixed: deployIfNotExistsContributor
2022-01-28 17:51:01
change: Major (1.2.0 > 2.0.0)
Guest Configuration67e010c1-640d-438e-a3a5-feaccb533a98Windows machines should meet requirements for 'Administrative Templates - Network'Windows machines should have the specified Group Policy settings in the category 'Administrative Templates - Network' for guest logons, simultaneous connections, network bridge, ICS, and multicast name resolution. This policy requires that the Guest Configuration prerequisites have been deployed to the policy assignment scope. For details, visit https://aka.ms/gcpol. Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2022-01-28 17:51:01
change: Major (2.0.0 > 3.0.0)
Guest Configuration12017595-5a75-4bb1-9d97-4c2c939ea3c3Windows machines should meet requirements for 'Security Options - System settings'Windows machines should have the specified Group Policy settings in the category 'Security Options - System settings' for certificate rules on executables for SRP and optional subsystems. This policy requires that the Guest Configuration prerequisites have been deployed to the policy assignment scope. For details, visit https://aka.ms/gcpol. Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2022-01-28 17:51:01
change: Major (2.0.0 > 3.0.0)
Guest Configuration968410dc-5ca0-4518-8a5b-7b55f0530ea9Windows machines should meet requirements for 'Administrative Templates - System'Windows machines should have the specified Group Policy settings in the category 'Administrative Templates - System' for settings that control the administrative experience and Remote Assistance. This policy requires that the Guest Configuration prerequisites have been deployed to the policy assignment scope. For details, visit https://aka.ms/gcpol. Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2022-01-28 17:51:01
change: Major (2.0.0 > 3.0.0)
Guest Configuration8537fe96-8cbe-43de-b0ef-131bc72bc22aWindows machines should meet requirements for 'Windows Components'Windows machines should have the specified Group Policy settings in the category 'Windows Components' for basic authentication, unencrypted traffic, Microsoft accounts, telemetry, Cortana, and other Windows behaviors. This policy requires that the Guest Configuration prerequisites have been deployed to the policy assignment scope. For details, visit https://aka.ms/gcpol. Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2022-01-28 17:51:01
change: Major (2.0.0 > 3.0.0)
Guest Configuration5b842acb-0fe7-41b0-9f40-880ec4ad84d8[Deprecated]: Show audit results from Linux VMs that have the specified applications installedThis policy should only be used along with its corresponding deploy policy in an initiative. This definition allows Azure Policy to process the results of auditing Linux virtual machines that have the specified applications installed. For more information on Guest Configuration policies, please visit https://aka.ms/gcpol Fixed: auditIfNotExists
2022-01-28 17:51:01
change: Major, suffix remains equal (3.1.0-deprecated > 4.0.0-deprecated)
Guest Configuration8794ff4f-1a35-4e18-938f-0b22055067cdWindows machines should meet requirements for 'Security Options - Devices'Windows machines should have the specified Group Policy settings in the category 'Security Options - Devices' for undocking without logging on, installing print drivers, and formatting/ejecting media. This policy requires that the Guest Configuration prerequisites have been deployed to the policy assignment scope. For details, visit https://aka.ms/gcpol. Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2022-01-28 17:51:01
change: Major (2.0.0 > 3.0.0)
Guest Configurationfc9b3da7-8347-4380-8e70-0a0361d8deddLinux machines should meet requirements for the Azure compute security baselineRequires that prerequisites are deployed to the policy assignment scope. For details, visit https://aka.ms/gcpol. Machines are non-compliant if the machine is not configured correctly for one of the recommendations in the Azure compute security baseline. Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2022-01-28 17:51:01
change: Major (1.3.0 > 2.0.0)
Guest Configurationbeb6ccee-b6b8-4e91-9801-a5fa4260a104Audit Windows machines that have not restarted within the specified number of daysRequires that prerequisites are deployed to the policy assignment scope. For details, visit https://aka.ms/gcpol. Machines are non-compliant if the WMI property LastBootUpTime in class Win32_Operatingsystem is outside the range of days provided by the policy parameter. Fixed: auditIfNotExists
2022-01-28 17:51:01
change: Major (1.0.0 > 2.0.0)
Guest Configuration87845465-c458-45f3-af66-dcd62176f397Windows machines should meet requirements for 'System Audit Policies - Privilege Use'Windows machines should have the specified Group Policy settings in the category 'System Audit Policies - Privilege Use' for auditing nonsensitive and other privilege use. This policy requires that the Guest Configuration prerequisites have been deployed to the policy assignment scope. For details, visit https://aka.ms/gcpol. Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2022-01-28 17:51:01
change: Major (2.0.0 > 3.0.0)
Automanagef889cab7-da27-4c41-a3b0-de1f6f87c550Configure virtual machines to be onboarded to Azure AutomanageAzure Automanage enrolls, configures, and monitors virtual machines with best practice as defined in the Microsoft Cloud Adoption Framework for Azure. Use this policy to apply Automanage to your selected scope. Default: DeployIfNotExists
Allowed: (AuditIfNotExists, DeployIfNotExists, Disabled)
Contributor
2022-01-21 21:53:22
add: f889cab7-da27-4c41-a3b0-de1f6f87c550
Kubernetes511f5417-5d12-434d-ab2e-816901e72a5eKubernetes cluster containers should only use allowed AppArmor profilesContainers should only use allowed AppArmor profiles in a Kubernetes cluster. This recommendation is part of Pod Security Policies which are intended to improve the security of your Kubernetes environments. This policy is generally available for Kubernetes Service (AKS), and preview for AKS Engine and Azure Arc enabled Kubernetes. For more information, see https://aka.ms/kubepolicydoc. Default: Audit
Allowed: (audit, Audit, deny, Deny, disabled, Disabled)
2022-01-21 21:53:22
change: Patch (4.0.2 > 4.0.3)
App Service7261b898-8a84-4db8-9e04-18527132abb3Ensure that 'PHP version' is the latest, if used as a part of the WEB appPeriodically, newer versions are released for PHP software either due to security flaws or to include additional functionality. Using the latest PHP version for web apps is recommended in order to take advantage of security fixes, if any, and/or new functionalities of the latest version. Currently, this policy only applies to Linux web apps. Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2022-01-21 21:53:22
change: Minor (2.1.0 > 2.2.0)
General10ee2ea2-fb4d-45b8-a7e9-a2e770044cd9[Deprecated]: Custom subscription owner roles should not existThis policy is deprecated. Default: Audit
Allowed: (Audit, Disabled)
2022-01-21 21:53:22
change: Version remains equal, new suffix: deprecated (2.0.0 > 2.0.0-deprecated)
App Service546fe8d2-368d-4029-a418-6af48a7f61e5App Service apps should use a SKU that supports private linkWith supported SKUs, Azure Private Link lets you connect your virtual network to Azure services without a public IP address at the source or destination. The Private Link platform handles the connectivity between the consumer and services over the Azure backbone network. By mapping private endpoints to apps, you can reduce data leakage risks. Learn more about private links at: https://aka.ms/private-link. Default: Audit
Allowed: (Audit, Deny, Disabled)
2022-01-21 21:53:22
change: Major (1.0.0 > 2.0.0)
Automanage270610db-8c04-438a-a739-e8e6745b22d3[Deprecated]: Configure virtual machines to be onboarded to Azure AutomanageAzure Automanage enrolls, configures, and monitors virtual machines with best practice as defined in the Microsoft Cloud Adoption Framework for Azure. Use this policy to apply Automanage to your selected scope. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Contributor
2022-01-21 21:53:22
change: Version remains equal, new suffix: version (4.1.0 > 4.1.0-version-deprecated)
Machine Learning6a6f7384-63de-11ea-bc55-0242ac130003[Preview]: Configure code signing for training code for specified Azure Machine Learning computesProvide code signing for training code in specified Azure Machine Learning computes and can be assigned at the workspace. For more information, visit https://aka.ms/amlpolicydoc. Default: enforceSetting
Allowed: (enforceSetting, disabled)
2022-01-14 17:44:09
change: Major, suffix remains equal (3.1.0-preview > 4.0.0-preview)
Azure Edge Hardware Center08a6b96f-576e-47a2-8511-119a212d344dAzure Edge Hardware Center devices should have double encryption support enabledEnsure that devices ordered from Azure Edge Hardware Center have double encryption support enabled, to secure the data at rest on the device. This option adds a second layer of data encryption. Default: Audit
Allowed: (Audit, Deny, Disabled)
2022-01-14 17:44:09
change: Major (1.0.0 > 2.0.0)
Machine Learning5853517a-63de-11ea-bc55-0242ac130003[Preview]: Configure allowed registries for specified Azure Machine Learning computesProvide registries that are allowed in specified Azure Machine Learning computes and can be assigned at the workspace. For more information, visit https://aka.ms/amlpolicydoc. Default: enforceSetting
Allowed: (enforceSetting, disabled)
2022-01-14 17:44:09
change: Major, suffix remains equal (3.0.0-preview > 4.0.0-preview)
Machine Learning53c70b02-63dd-11ea-bc55-0242ac130003[Preview]: Configure allowed module authors for specified Azure Machine Learning computesProvide allowed module authors in specified Azure Machine Learning computes and can be assigned at the workspace. For more information, visit https://aka.ms/amlpolicydoc. Default: enforceSetting
Allowed: (enforceSetting, disabled)
2022-01-14 17:44:09
change: Major, suffix remains equal (3.0.0-preview > 4.0.0-preview)
Monitoring04c4380f-3fae-46e8-96c9-30193528f602[Preview]: Network traffic data collection agent should be installed on Linux virtual machinesSecurity Center uses the Microsoft Dependency agent to collect network traffic data from your Azure virtual machines to enable advanced network protection features such as traffic visualization on the network map, network hardening recommendations and specific network threats. Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2022-01-07 18:14:35
change: Patch, suffix remains equal (1.0.1-preview > 1.0.2-preview)
Bot Service52152f42-0dda-40d9-976e-abb1acdd611eBot Service should have isolated mode enabledBots should be set to 'isolated only' mode. This setting configures Bot Service channels that require traffic over the public internet to be disabled. Default: Audit
Allowed: (audit, Audit, deny, Deny, disabled, Disabled)
2022-01-07 18:14:35
change: Major (1.0.0 > 2.0.0)
Security Centerae89ebca-1c92-4898-ac2c-9f63decb045cGuest Configuration extension should be installed on your machinesTo ensure secure configurations of in-guest settings of your machine, install the Guest Configuration extension. In-guest settings that the extension monitors include the configuration of the operating system, application configuration or presence, and environment settings. Once installed, in-guest policies will be available such as 'Windows Exploit guard should be enabled'. Learn more at https://aka.ms/gcpol. Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2022-01-07 18:14:35
change: Patch (1.0.1 > 1.0.2)
Monitoringbacd7fca-1938-443d-aad6-a786107b1bfb[Preview]: Configure Azure Arc-enabled Linux machines with Log Analytics agents connected to default Log Analytics workspaceProtect your Azure Arc-enabled Linux machines with Microsoft Defender for Cloud capabilities, by installing Log Analytics agents that send data to a default Log Analytics workspace created by Microsoft Defender for Cloud. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Contributor
2022-01-07 18:14:35
add: bacd7fca-1938-443d-aad6-a786107b1bfb
Monitoring594c1276-f44f-482d-9910-71fac2ce5ae0[Preview]: Configure Azure Arc-enabled Windows machines with Log Analytics agents connected to default Log Analytics workspaceProtect your Azure Arc-enabled Windows machines with Microsoft Defender for Cloud capabilities, by installing Log Analytics agents that send data to a default Log Analytics workspace created by Microsoft Defender for Cloud. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Contributor
2022-01-07 18:14:35
add: 594c1276-f44f-482d-9910-71fac2ce5ae0
Azure Purview9259053b-ddb8-40ab-842a-0aef19d0ade4Azure Purview accounts should use private linkAzure Private Link lets you connect your virtual network to Azure services without a public IP address at the source or destination. The private link platform handles the connectivity between the consumer and services over the Azure backbone network. By mapping private endpoints to your Azure Purview accounts instead of the entire service, you'll also be protected against data leakage risks. Learn more at: https://aka.ms/purview-private-link. Default: Audit
Allowed: (Audit, Disabled)
2022-01-07 18:14:35
add: 9259053b-ddb8-40ab-842a-0aef19d0ade4
Backup615b01c4-d565-4f6f-8c6e-d130268e3a1a[Preview]: Configure backup for blobs on storage accounts with a given tag to an existing backup vault in the same regionEnforce backup for blobs on all storage accounts that contain a given tag to a central backup vault. Doing this can help you manage backup of blobs contained across multiple storage accounts at scale. For more details, refer to https://aka.ms/AB-BlobBackupAzPolicies Default: DeployIfNotExists
Allowed: (DeployIfNotExists, AuditIfNotExists, Disabled)
Backup Contributor
2022-01-07 18:14:35
change: Major, suffix remains equal (1.0.0-preview > 2.0.0-preview)
Storagebc1b984e-ddae-40cc-801a-050a030e4fbeStorage accounts should have shared access signature (SAS) policies configuredEnsure storage accounts have shared access signature (SAS) expiration policy enabled. Users use a SAS to delegate access to resources in Azure Storage account. And SAS expiration policy recommend upper expiration limit when a user creates a SAS token. Default: Audit
Allowed: (Audit, Deny, Disabled)
2022-01-07 18:14:35
add: bc1b984e-ddae-40cc-801a-050a030e4fbe
SQL0a370ff3-6cab-4e85-8995-295fd854c5b8SQL servers should use customer-managed keys to encrypt data at restImplementing Transparent Data Encryption (TDE) with your own key provides increased transparency and control over the TDE Protector, increased security with an HSM-backed external service, and promotion of separation of duties. This recommendation applies to organizations with a related compliance requirement. Default: Audit
Allowed: (Audit, Deny, Disabled)
2022-01-07 18:14:35
change: Patch (2.0.0 > 2.0.1)
App Serviceb607c5de-e7d9-4eee-9e5c-83f1bcee4fa0[Deprecated]: Diagnostic logs in App Services should be enabledAudit enabling of diagnostic logs on the app. This enables you to recreate activity trails for investigation purposes if a security incident occurs or your network is compromised Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2022-01-07 18:14:35
change: Version remains equal, new suffix: deprecated (2.0.0 > 2.0.0-deprecated)
Internet of Things27d4c5ec-8820-443f-91fe-1215e96f64b2Azure Device Update for IoT Hub accounts should use private linkAzure Private Link lets you connect your virtual network to Azure services without a public IP address at the source or destination. The Private Link platform handles the connectivity between the consumer and services over the Azure backbone network. By mapping private endpoints to Azure Device Update for IoT Hub accounts, data leakage risks are reduced. Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2022-01-07 18:14:35
add: 27d4c5ec-8820-443f-91fe-1215e96f64b2
Kubernetes440b515e-a580-421e-abeb-b159a61ddcbc[Deprecated]: Kubernetes cluster containers should only listen on allowed portsRestrict containers to listen only on allowed ports to secure access to the Kubernetes cluster. The policy is deprecating since container port is only informative field which cannot decide the port container is actually using. For more information, see https://aka.ms/kubepolicydoc. Default: Deny
Allowed: (audit, Audit, deny, Deny, disabled, Disabled)
2022-01-07 18:14:35
change: Patch, new suffix: deprecated (6.1.2 > 6.1.3-deprecated)
Backup958dbd4e-0e20-4385-a082-d3f20c2a6ad8[Preview]: Configure blob backup for all storage accounts that do not contain a given tag to a backup vault in the same regionEnforce backup for blobs on all storage accounts that do not contain a given tag to a central backup vault. Doing this can help you manage backup of blobs contained across multiple storage accounts at scale. For more details, refer to https://aka.ms/AB-BlobBackupAzPolicies Default: DeployIfNotExists
Allowed: (DeployIfNotExists, AuditIfNotExists, Disabled)
Backup Contributor
2022-01-07 18:14:35
change: Major, suffix remains equal (1.0.0-preview > 2.0.0-preview)
Monitoring2f2ee1de-44aa-4762-b6bd-0893fc3f306d[Preview]: Network traffic data collection agent should be installed on Windows virtual machinesSecurity Center uses the Microsoft Dependency agent to collect network traffic data from your Azure virtual machines to enable advanced network protection features such as traffic visualization on the network map, network hardening recommendations and specific network threats. Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2022-01-07 18:14:35
change: Patch, suffix remains equal (1.0.1-preview > 1.0.2-preview)
Monitoring8e3e61b3-0b32-22d5-4edf-55f87fdb5955Configure Log Analytics workspace and automation account to centralize logs and monitoringDeploy resource group containing Log Analytics workspace and linked automation account to centralize logs and monitoring. The automation account is aprerequisite for solutions like Updates and Change Tracking. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, AuditIfNotExists, Disabled)
Contributor
2022-01-07 18:14:35
change: Major (1.0.0 > 2.0.0)
Security Center0fc39691-5a3f-4e3e-94ee-2e6447309ad9Running container images should have vulnerability findings resolvedContainer image vulnerability assessment scans container images running on your Kubernetes clusters for security vulnerabilities and exposes detailed findings for each image. Resolving the vulnerabilities can greatly improve your containers' security posture and protect them from attacks. Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2022-01-07 18:14:35
change: Patch (1.0.0 > 1.0.1)
Monitoring7f89b1eb-583c-429a-8828-af049802c1d9Audit diagnostic settingAudit diagnostic setting for selected resource types Fixed: AuditIfNotExists
2022-01-07 18:14:35
change: Minor (1.0.0 > 1.1.0)
Security Center5f0f936f-2f01-4bf5-b6be-d423792fa562Container registry images should have vulnerability findings resolvedContainer image vulnerability assessment scans your registry for security vulnerabilities and exposes detailed findings for each image. Resolving the vulnerabilities can greatly improve your containers' security posture and protect them from attacks. Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2022-01-07 18:14:35
change: Patch (2.0.0 > 2.0.1)
Kubernetesa6f560f4-f582-4b67-b123-a37dcd1bf7eaConfigure Kubernetes clusters with specified GitOps configuration using HTTPS secretsDeploy a 'sourceControlConfiguration' to Kubernetes clusters to assure that the clusters get their source of truth for workloads and configurations from the defined git repo. This definition requires HTTPS user and key secrets stored in Key Vault. For instructions, visit https://aka.ms/K8sGitOpsPolicy. Default: DeployIfNotExists
Allowed: (auditIfNotExists, AuditIfNotExists, deployIfNotExists, DeployIfNotExists, disabled, Disabled)
Contributor
2021-12-10 17:29:56
change: Patch (1.0.0 > 1.0.1)
Network0db34a60-64f4-4bf6-bd44-f95c16cf34b9Deploy a flow log resource with target network security groupConfigures flow log for specific network security group. It will allow to log information about IP traffic flowing through an network security group. Flow log helps to identify unknown or undesired traffic, verify network isolation and compliance with enterprise access rules, analyze network flows from compromised IPs and network interfaces. Fixed: deployIfNotExistsContributor
2021-12-10 17:29:56
change: Patch (1.0.0 > 1.0.1)
Network5e1cd26a-5090-4fdb-9d6a-84a90335e22dConfigure network security groups to use specific workspace for traffic analyticsIf it already has traffic analytics enabled, then policy will overwrite its existing settings with the ones provided during policy creation. Traffic analytics is a cloud-based solution that provides visibility into user and application activity in cloud networks. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Contributor
2021-12-10 17:29:56
change: Patch (1.0.0 > 1.0.1)
Networke920df7f-9a64-4066-9b58-52684c02a091Configure network security groups to enable traffic analyticsTraffic analytics can be enabled for all network security groups hosted in a particular region with the settings provided during policy creation. If it already has Traffic analytics enabled, then policy does not overwrite its settings. Flow Logs are also enabled for the Network security groups that do not have it. Traffic analytics is a cloud-based solution that provides visibility into user and application activity in cloud networks. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Contributor
2021-12-10 17:29:56
change: Patch (1.0.0 > 1.0.1)
Kubernetesc050047b-b21b-4822-8a2d-c1e37c3c0c6aConfigure Kubernetes clusters with specified GitOps configuration using SSH secretsDeploy a 'sourceControlConfiguration' to Kubernetes clusters to assure that the clusters get their source of truth for workloads and configurations from the defined git repo. This definition requires a SSH private key secret in Key Vault. For instructions, visit https://aka.ms/K8sGitOpsPolicy. Default: DeployIfNotExists
Allowed: (auditIfNotExists, AuditIfNotExists, deployIfNotExists, DeployIfNotExists, disabled, Disabled)
Contributor
2021-12-10 17:29:56
change: Patch (1.0.0 > 1.0.1)
Guest Configuration497dff13-db2a-4c0f-8603-28fa3b331ab6Add system-assigned managed identity to enable Guest Configuration assignments on VMs with a user-assigned identityThis policy adds a system-assigned managed identity to virtual machines hosted in Azure that are supported by Guest Configuration and have at least one user-assigned identity but do not have a system-assigned managed identity. A system-assigned managed identity is a prerequisite for all Guest Configuration assignments and must be added to machines before using any Guest Configuration policy definitions. For more information on Guest Configuration, visit https://aka.ms/gcpol. Fixed: modifyContributor
2021-12-06 22:17:57
change: Minor (1.0.0 > 1.1.0)
Kubernetes56d0a13f-712f-466b-8416-56fb354fb823Kubernetes cluster containers should not use forbidden sysctl interfacesContainers should not use forbidden sysctl interfaces in a Kubernetes cluster. This recommendation is part of Pod Security Policies which are intended to improve the security of your Kubernetes environments. This policy is generally available for Kubernetes Service (AKS), and preview for AKS Engine and Azure Arc enabled Kubernetes. For more information, see https://aka.ms/kubepolicydoc. Default: Audit
Allowed: (audit, Audit, deny, Deny, disabled, Disabled)
2021-12-06 22:17:57
change: Patch (4.0.1 > 4.0.2)
Kubernetes3fc4dc25-5baf-40d8-9b05-7fe74c1bc64eKubernetes clusters should use internal load balancersUse internal load balancers to make a Kubernetes service accessible only to applications running in the same virtual network as the Kubernetes cluster. For more information, see https://aka.ms/kubepolicydoc. Default: Deny
Allowed: (audit, Audit, deny, Deny, disabled, Disabled)
2021-12-06 22:17:57
change: Patch (6.0.0 > 6.0.1)
Guest Configurationc40c9087-1981-4e73-9f53-39743eda9d05[Deprecated]: Show audit results from Linux VMs that have accounts without passwordsThis policy should only be used along with its corresponding deploy policy in an initiative. This definition allows Azure Policy to process the results of auditing Linux virtual machines that have accounts without passwords. For more information on Guest Configuration policies, please visit https://aka.ms/gcpol Fixed: auditIfNotExists
2021-12-06 22:17:57
change: Minor, suffix remains equal (3.0.0-deprecated > 3.1.0-deprecated)
Security Center1c988dd6-ade4-430f-a608-2a3e5b0a6d38Microsoft Defender for Containers should be enabledMicrosoft Defender for Containers provides hardening, vulnerability assessment and run-time protections for your Azure, hybrid, and multi-cloud Kubernetes environments. Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2021-12-06 22:17:57
add: 1c988dd6-ade4-430f-a608-2a3e5b0a6d38
Kubernetesc26596ff-4d70-4e6a-9a30-c2506bd2f80cKubernetes cluster containers should only use allowed capabilitiesRestrict the capabilities to reduce the attack surface of containers in a Kubernetes cluster. This recommendation is part of CIS 5.2.8 and CIS 5.2.9 which are intended to improve the security of your Kubernetes environments. This policy is generally available for Kubernetes Service (AKS), and preview for AKS Engine and Azure Arc enabled Kubernetes. For more information, see https://aka.ms/kubepolicydoc. Default: Audit
Allowed: (audit, Audit, deny, Deny, disabled, Disabled)
2021-12-06 22:17:57
change: Patch (4.0.1 > 4.0.2)
Security Centerb40e7bcd-a1e5-47fe-b9cf-2f534d0bfb7dConfigure Azure Defender for App Service to be enabledAzure Defender for App Service leverages the scale of the cloud, and the visibility that Azure has as a cloud provider, to monitor for common web app attacks. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Security Admin
2021-12-06 22:17:57
change: Patch (1.0.0 > 1.0.1)
Guest Configurationf6ec09a3-78bf-4f8f-99dc-6c77182d0f99Audit Linux machines that have accounts without passwordsRequires that prerequisites are deployed to the policy assignment scope. For details, visit https://aka.ms/gcpol. Machines are non-compliant if Linux machines that have accounts without passwords Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2021-12-06 22:17:57
change: Minor (1.1.0 > 1.2.0)
SQL0d134df8-db83-46fb-ad72-fe0c9428c8dd[Deprecated]: SQL servers should use customer-managed keys to encrypt data at restThis policy is deprecated. Please use /providers/Microsoft.Authorization/policyDefinitions/0a370ff3-6cab-4e85-8995-295fd854c5b8 instead. Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2021-12-06 22:17:57
change: Version remains equal, new suffix: deprecated (2.0.1 > 2.0.1-deprecated)
Security Center523b5cd1-3e23-492f-a539-13118b6d1e3a[Deprecated]: Azure Defender for Kubernetes should be enabledAzure Defender for Kubernetes provides real-time threat protection for containerized environments and generates alerts for suspicious activities. Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2021-12-06 22:17:57
change: Version remains equal, new suffix: deprecated (1.0.3 > 1.0.3-deprecated)
Backup345fa903-145c-4fe1-8bcd-93ec2adccde8Configure backup on virtual machines with a given tag to an existing recovery services vault in the same locationEnforce backup for all virtual machines by backing them up to an existing central recovery services vault in the same location and subscription as the virtual machine. Doing this is useful when there is a central team in your organization managing backups for all resources in a subscription. You can optionally include virtual machines containing a specified tag to control the scope of assignment. See https://aka.ms/AzureVMCentralBackupIncludeTag. Default: DeployIfNotExists
Allowed: (auditIfNotExists, AuditIfNotExists, deployIfNotExists, DeployIfNotExists, disabled, Disabled)
Virtual Machine Contributor
Backup Contributor
2021-12-06 22:17:57
change: Major (4.0.0 > 5.0.0)
Guest Configuration1e7fed80-8321-4605-b42c-65fc300f23a3Linux machines should have Log Analytics agent installed on Azure ArcMachines are non-compliant if Log Analytics agent is not installed on Azure Arc enabled Linux server. Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2021-12-06 22:17:57
change: Minor (1.0.0 > 1.1.0)
SQL048248b0-55cd-46da-b1ff-39efd52db260[Deprecated]: SQL managed instances should use customer-managed keys to encrypt data at restThis policy is deprecated. Please use /providers/Microsoft.Authorization/policyDefinitions/ac01ad65-10e5-46df-bdd9-6b0cad13e1d2 instead Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2021-12-06 22:17:57
change: Version remains equal, new suffix: deprecated (1.0.2 > 1.0.2-deprecated)
Kubernetes1c6e92c9-99f0-4e55-9cf2-0c234dc48f99Kubernetes clusters should not allow container privilege escalationDo not allow containers to run with privilege escalation to root in a Kubernetes cluster. This recommendation is part of CIS 5.2.5 which is intended to improve the security of your Kubernetes environments. This policy is generally available for Kubernetes Service (AKS), and preview for AKS Engine and Azure Arc enabled Kubernetes. For more information, see https://aka.ms/kubepolicydoc. Default: Audit
Allowed: (audit, Audit, deny, Deny, disabled, Disabled)
2021-12-06 22:17:57
change: Patch (4.0.0 > 4.0.1)
Security Centerb7021b2b-08fd-4dc0-9de7-3c6ece09faf9Configure Azure Defender for Resource Manager to be enabledAzure Defender for Resource Manager automatically monitors the resource management operations in your organization. Azure Defender detects threats and alerts you about suspicious activity. Learn more about the capabilities of Azure Defender for Resource Manager at https://aka.ms/defender-for-resource-manager . Enabling this Azure Defender plan results in charges. Learn about the pricing details per region on Security Center's pricing page: https://aka.ms/pricing-security-center . Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Security Admin
2021-12-06 22:17:57
change: Patch (1.0.0 > 1.0.1)
Kubernetes47a1ee2f-2a2a-4576-bf2a-e0e36709c2b8Kubernetes cluster containers should not share host process ID or host IPC namespaceBlock pod containers from sharing the host process ID namespace and host IPC namespace in a Kubernetes cluster. This recommendation is part of CIS 5.2.2 and CIS 5.2.3 which are intended to improve the security of your Kubernetes environments. This policy is generally available for Kubernetes Service (AKS), and preview for AKS Engine and Azure Arc enabled Kubernetes. For more information, see https://aka.ms/kubepolicydoc. Default: Audit
Allowed: (audit, Audit, deny, Deny, disabled, Disabled)
2021-12-06 22:17:57
change: Patch (3.0.1 > 3.0.2)
Kubernetes511f5417-5d12-434d-ab2e-816901e72a5eKubernetes cluster containers should only use allowed AppArmor profilesContainers should only use allowed AppArmor profiles in a Kubernetes cluster. This recommendation is part of Pod Security Policies which are intended to improve the security of your Kubernetes environments. This policy is generally available for Kubernetes Service (AKS), and preview for AKS Engine and Azure Arc enabled Kubernetes. For more information, see https://aka.ms/kubepolicydoc. Default: Audit
Allowed: (audit, Audit, deny, Deny, disabled, Disabled)
2021-12-06 22:17:57
change: Patch (4.0.1 > 4.0.2)
Monitoringc9c29499-c1d1-4195-99bd-2ec9e3a9dc89Deploy Diagnostic Settings for Network Security GroupsThis policy automatically deploys diagnostic settings to network security groups. A storage account with name '{storagePrefixParameter}{NSGLocation}' will be automatically created. Fixed: deployIfNotExistsMonitoring Contributor
Storage Account Contributor
2021-12-06 22:17:57
change: Major (1.0.0 > 2.0.0)
Guest Configuration884b209a-963b-4520-8006-d20cb3c213e0[Deprecated]: Deploy prerequisites to audit Linux VMs that have the specified applications installedThis policy creates a Guest Configuration assignment to audit Linux virtual machines that have the specified applications installed. It also creates a system-assigned managed identity and deploys the VM extension for Guest Configuration. This policy should only be used along with its corresponding audit policy in an initiative. For more information on Guest Configuration policies, please visit https://aka.ms/gcpol Fixed: deployIfNotExistsContributor
2021-12-06 22:17:57
change: Minor, suffix remains equal (3.0.0-deprecated > 3.1.0-deprecated)
Kubernetes233a2a17-77ca-4fb1-9b6b-69223d272a44Kubernetes cluster services should listen only on allowed portsRestrict services to listen only on allowed ports to secure access to the Kubernetes cluster. This policy is generally available for Kubernetes Service (AKS), and preview for AKS Engine and Azure Arc enabled Kubernetes. For more information, see https://aka.ms/kubepolicydoc. Default: Deny
Allowed: (audit, Audit, deny, Deny, disabled, Disabled)
2021-12-06 22:17:57
change: Patch (6.1.1 > 6.1.2)
Video Analyzers165a4137-c3ed-4fd0-a17f-1c8a80266580Video Analyzer accounts should use customer-managed keys to encrypt data at restUse customer-managed keys to manage the encryption at rest of your Video Analyzer accounts. By default, customer data is encrypted with service-managed keys, but customer-managed keys are commonly required to meet regulatory compliance standards. Customer-managed keys enable the data to be encrypted with an Azure Key Vault key created and owned by you. You have full control and responsibility for the key lifecycle, including rotation and management. Learn more at https://aka.ms/videoanalyzerscmkdocs. Default: Audit
Allowed: (Audit, Deny, Disabled)
2021-12-06 22:17:57
add: 165a4137-c3ed-4fd0-a17f-1c8a80266580
Guest Configuration2d67222d-05fd-4526-a171-2ee132ad9e83[Deprecated]: Show audit results from Linux VMs that allow remote connections from accounts without passwordsThis policy should only be used along with its corresponding deploy policy in an initiative. This definition allows Azure Policy to process the results of auditing Linux virtual machines that allow remote connections from accounts without passwords. For more information on Guest Configuration policies, please visit https://aka.ms/gcpol Fixed: auditIfNotExists
2021-12-06 22:17:57
change: Minor, suffix remains equal (3.0.0-deprecated > 3.1.0-deprecated)
Guest Configurationc648fbbb-591c-4acd-b465-ce9b176ca173Audit Windows machines that do not have the specified Windows PowerShell execution policyRequires that prerequisites are deployed to the policy assignment scope. For details, visit https://aka.ms/gcpol. Machines are non-compliant if the Windows PowerShell command Get-ExecutionPolicy returns a value other than what was selected in the policy parameter. Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2021-12-06 22:17:57
change: Minor (1.0.0 > 1.1.0)
Kubernetese345eecc-fa47-480f-9e88-67dcc122b164Kubernetes cluster containers CPU and memory resource limits should not exceed the specified limitsEnforce container CPU and memory resource limits to prevent resource exhaustion attacks in a Kubernetes cluster. This policy is generally available for Kubernetes Service (AKS), and preview for AKS Engine and Azure Arc enabled Kubernetes. For more information, see https://aka.ms/kubepolicydoc. Default: Deny
Allowed: (audit, Audit, deny, Deny, disabled, Disabled)
2021-12-06 22:17:57
change: Patch (7.0.0 > 7.0.1)
App Platformaf35e2a4-ef96-44e7-a9ae-853dd97032c4Azure Spring Cloud should use network injectionAzure Spring Cloud instances should use virtual network injection for the following purposes: 1. Isolate Azure Spring Cloud from Internet. 2. Enable Azure Spring Cloud to interact with systems in either on premises data centers or Azure service in other virtual networks. 3. Empower customers to control inbound and outbound network communications for Azure Spring Cloud. Default: Audit
Allowed: (Audit, Disabled, Deny)
2021-12-06 22:17:57
change: Minor (1.0.0 > 1.1.0)
Kubernetes82985f06-dc18-4a48-bc1c-b9f4f0098cfeKubernetes cluster pods should only use approved host network and port rangeRestrict pod access to the host network and the allowable host port range in a Kubernetes cluster. This recommendation is part of CIS 5.2.4 which is intended to improve the security of your Kubernetes environments. This policy is generally available for Kubernetes Service (AKS), and preview for AKS Engine and Azure Arc enabled Kubernetes. For more information, see https://aka.ms/kubepolicydoc. Default: Audit
Allowed: (audit, Audit, deny, Deny, disabled, Disabled)
2021-12-06 22:17:57
change: Patch (4.0.1 > 4.0.2)
Guest Configuration3470477a-b35a-49db-aca5-1073d04524fe[Deprecated]: Deploy prerequisites to audit Linux VMs that have accounts without passwordsThis policy creates a Guest Configuration assignment to audit Linux virtual machines that have accounts without passwords. It also creates a system-assigned managed identity and deploys the VM extension for Guest Configuration. This policy should only be used along with its corresponding audit policy in an initiative. For more information on Guest Configuration policies, please visit https://aka.ms/gcpol Fixed: deployIfNotExistsContributor
2021-12-06 22:17:57
change: Minor, suffix remains equal (3.0.0-deprecated > 3.1.0-deprecated)
Network564feb30-bf6a-4854-b4bb-0d2d2d1e6c66Web Application Firewall (WAF) should be enabled for Application GatewayDeploy Azure Web Application Firewall (WAF) in front of public facing web applications for additional inspection of incoming traffic. Web Application Firewall (WAF) provides centralized protection of your web applications from common exploits and vulnerabilities such as SQL injections, Cross-Site Scripting, local and remote file executions. You can also restrict access to your web applications by countries, IP address ranges, and other http(s) parameters via custom rules. Default: Audit
Allowed: (Audit, Deny, Disabled)
2021-12-06 22:17:57
change: Major (1.0.1 > 2.0.0)
Guest Configuration3cf2ab00-13f1-4d0c-8971-2ac904541a7eAdd system-assigned managed identity to enable Guest Configuration assignments on virtual machines with no identitiesThis policy adds a system-assigned managed identity to virtual machines hosted in Azure that are supported by Guest Configuration but do not have any managed identities. A system-assigned managed identity is a prerequisite for all Guest Configuration assignments and must be added to machines before using any Guest Configuration policy definitions. For more information on Guest Configuration, visit https://aka.ms/gcpol. Fixed: modifyContributor
2021-12-06 22:17:57
change: Minor (1.0.0 > 1.1.0)
Kubernetes098fc59e-46c7-4d99-9b16-64990e543d75Kubernetes cluster pod hostPath volumes should only use allowed host pathsLimit pod HostPath volume mounts to the allowed host paths in a Kubernetes Cluster. This recommendation is part of Pod Security Policies which are intended to improve the security of your Kubernetes environments. This policy is generally available for Kubernetes Service (AKS), and preview for AKS Engine and Azure Arc enabled Kubernetes. For more information, see https://aka.ms/kubepolicydoc. Default: Audit
Allowed: (audit, Audit, deny, Deny, disabled, Disabled)
2021-12-06 22:17:57
change: Patch (4.0.1 > 4.0.2)
Kubernetes36a27de4-199b-40fb-b336-945a8475d6c5Configure AAD integrated Azure Kubernetes Service Clusters with required Admin Group AccessEnsure to improve cluster security by centrally govern Administrator access to Azure Active Directory integrated AKS clusters. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Azure Kubernetes Service Contributor Role
Azure Kubernetes Service Policy Add-on Deployment
2021-12-06 22:17:57
add: 36a27de4-199b-40fb-b336-945a8475d6c5
Kubernetes95edb821-ddaf-4404-9732-666045e056b4Kubernetes cluster should not allow privileged containersDo not allow privileged containers creation in a Kubernetes cluster. This recommendation is part of CIS 5.2.1 which is intended to improve the security of your Kubernetes environments. This policy is generally available for Kubernetes Service (AKS), and preview for AKS Engine and Azure Arc enabled Kubernetes. For more information, see https://aka.ms/kubepolicydoc. Default: Deny
Allowed: (audit, Audit, deny, Deny, disabled, Disabled)
2021-12-06 22:17:57
change: Patch (7.0.0 > 7.0.1)
Security Center133047bf-1369-41e3-a3be-74a11ed1395a[Deprecated]: Configure Azure Defender for Kubernetes to be enabledAzure Defender for Kubernetes provides real-time threat protection for containerized environments and generates alerts for suspicious activities. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Security Admin
2021-12-06 22:17:57
change: Version remains equal, new suffix: deprecated (1.0.0 > 1.0.0-deprecated)
Kubernetesb2fd3e59-6390-4f2b-8247-ea676bd03e2d[Deprecated]: Enforce unique ingress hostnames across namespaces in Kubernetes clusterThis policy enforces unique ingress hostnames across namespaces in a Kubernetes cluster. For instructions on using this policy, please go to https://aka.ms/kubepolicydoc. Default: Deny
Allowed: (audit, Audit, deny, Deny, disabled, Disabled)
2021-12-06 22:17:57
change: Patch, suffix remains equal (4.0.1-deprecated > 4.0.2-deprecated)
Compute702dd420-7fcc-42c5-afe8-4026edd20fe0OS and data disks should be encrypted with a customer-managed keyUse customer-managed keys to manage the encryption at rest of the contents of your managed disks. By default, the data is encrypted at rest with platform-managed keys, but customer-managed keys are commonly required to meet regulatory compliance standards. Customer-managed keys enable the data to be encrypted with an Azure Key Vault key created and owned by you. You have full control and responsibility for the key lifecycle, including rotation and management. Learn more at https://aka.ms/disks-cmk. Default: Audit
Allowed: (Audit, Deny, Disabled)
2021-12-06 22:17:57
change: Major (2.0.0 > 3.0.0)
Guest Configurationea53dbee-c6c9-4f0e-9f9e-de0039b78023Audit Linux machines that allow remote connections from accounts without passwordsRequires that prerequisites are deployed to the policy assignment scope. For details, visit https://aka.ms/gcpol. Machines are non-compliant if Linux machines that allow remote connections from accounts without passwords Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2021-12-06 22:17:57
change: Minor (1.1.0 > 1.2.0)
Guest Configurationfb27e9e0-526e-4ae1-89f2-a2a0bf0f8a50[Deprecated]: Deploy prerequisites to enable Guest Configuration Policy on Linux VMs.This policy creates a system-assigned managed identity and deploys the VM extension for Guest Configuration on Linux VMs. This is a prerequisite for Guest Configuration Policy and must be assigned to the scope before using any Guest Configuration policy. For more information on Guest Configuration policies, please visit https://aka.ms/gcpol. Fixed: deployIfNotExistsContributor
2021-12-06 22:17:57
change: Minor, suffix remains equal (3.0.0-deprecated > 3.1.0-deprecated)
Kubernetesa8eff44f-8c92-45c3-a3fb-9880802d67a7Deploy Azure Policy Add-on to Azure Kubernetes Service clustersUse Azure Policy Add-on to manage and report on the compliance state of your Azure Kubernetes Service (AKS) clusters. For more information, see https://aka.ms/akspolicydoc. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Azure Kubernetes Service Contributor Role
Azure Kubernetes Service Policy Add-on Deployment
2021-12-06 22:17:57
change: Major (2.0.0 > 3.0.0)
Security Centerc9ddb292-b203-4738-aead-18e2716e858fConfigure Microsoft Defender for Containers to be enabledMicrosoft Defender for Containers provides hardening, vulnerability assessment and run-time protections for your Azure, hybrid, and multi-cloud Kubernetes environments. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Security Admin
2021-12-06 22:17:57
add: c9ddb292-b203-4738-aead-18e2716e858f
Backup958dbd4e-0e20-4385-a082-d3f20c2a6ad8[Preview]: Configure blob backup for all storage accounts that do not contain a given tag to a backup vault in the same regionEnforce backup for blobs on all storage accounts that do not contain a given tag to a central backup vault. Doing this can help you manage backup of blobs contained across multiple storage accounts at scale. For more details, refer to https://aka.ms/AB-BlobBackupAzPolicies Default: DeployIfNotExists
Allowed: (DeployIfNotExists, AuditIfNotExists, Disabled)
Backup Contributor
2021-12-06 22:17:57
add: 958dbd4e-0e20-4385-a082-d3f20c2a6ad8
Kubernetese1e6c427-07d9-46ab-9689-bfa85431e636Kubernetes cluster pods and containers should only use allowed SELinux optionsPods and containers should only use allowed SELinux options in a Kubernetes cluster. This recommendation is part of Pod Security Policies which are intended to improve the security of your Kubernetes environments. This policy is generally available for Kubernetes Service (AKS), and preview for AKS Engine and Azure Arc enabled Kubernetes. For more information, see https://aka.ms/kubepolicydoc. Default: Audit
Allowed: (audit, Audit, deny, Deny, disabled, Disabled)
2021-12-06 22:17:57
change: Patch (4.0.1 > 4.0.2)
Guest Configuration385f5831-96d4-41db-9a3c-cd3af78aaae6Deploy the Windows Guest Configuration extension to enable Guest Configuration assignments on Windows VMsThis policy deploys the Windows Guest Configuration extension to Windows virtual machines hosted in Azure that are supported by Guest Configuration. The Windows Guest Configuration extension is a prerequisite for all Windows Guest Configuration assignments and must be deployed to machines before using any Windows Guest Configuration policy definition. For more information on Guest Configuration, visit https://aka.ms/gcpol. Fixed: deployIfNotExistsContributor
2021-12-06 22:17:57
change: Minor (1.1.0 > 1.2.0)
Guest Configuratione6955644-301c-44b5-a4c4-528577de6861Audit Linux machines that do not have the passwd file permissions set to 0644Requires that prerequisites are deployed to the policy assignment scope. For details, visit https://aka.ms/gcpol. Machines are non-compliant if Linux machines that do not have the passwd file permissions set to 0644 Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2021-12-06 22:17:57
change: Minor (1.1.0 > 1.2.0)
Kubernetesd2e7ea85-6b44-4317-a0be-1b951587f626Kubernetes clusters should not grant CAP_SYS_ADMIN security capabilitiesTo reduce the attack surface of your containers, restrict CAP_SYS_ADMIN Linux capabilities. For more information, see https://aka.ms/kubepolicydoc. Default: Audit
Allowed: (audit, Audit, deny, Deny, disabled, Disabled)
2021-12-06 22:17:57
change: Patch (3.0.1 > 3.0.2)
Security Centerc25d9a16-bc35-4e15-a7e5-9db606bf9ed4[Deprecated]: Azure Defender for container registries should be enabledAzure Defender for container registries provides vulnerability scanning of any images pulled within the last 30 days, pushed to your registry, or imported, and exposes detailed findings per image. Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2021-12-06 22:17:57
change: Version remains equal, new suffix: deprecated (1.0.3 > 1.0.3-deprecated)
Guest Configuration5b842acb-0fe7-41b0-9f40-880ec4ad84d8[Deprecated]: Show audit results from Linux VMs that have the specified applications installedThis policy should only be used along with its corresponding deploy policy in an initiative. This definition allows Azure Policy to process the results of auditing Linux virtual machines that have the specified applications installed. For more information on Guest Configuration policies, please visit https://aka.ms/gcpol Fixed: auditIfNotExists
2021-12-06 22:17:57
change: Minor, suffix remains equal (3.0.0-deprecated > 3.1.0-deprecated)
Kubernetes9f061a12-e40d-4183-a00e-171812443373Kubernetes clusters should not use the default namespacePrevent usage of the default namespace in Kubernetes clusters to protect against unauthorized access for ConfigMap, Pod, Secret, Service, and ServiceAccount resource types. For more information, see https://aka.ms/kubepolicydoc. Default: Audit
Allowed: (audit, Audit, deny, Deny, disabled, Disabled)
2021-12-06 22:17:57
change: Patch (2.1.1 > 2.1.2)
Guest Configuration4d1c04de-2172-403f-901b-90608c35c721[Deprecated]: Deploy prerequisites to audit Linux VMs that do not have the specified applications installedThis policy creates a Guest Configuration assignment to audit Linux virtual machines that do not have the specified applications installed. It also creates a system-assigned managed identity and deploys the VM extension for Guest Configuration. This policy should only be used along with its corresponding audit policy in an initiative. For more information on Guest Configuration policies, please visit https://aka.ms/gcpol Fixed: deployIfNotExistsContributor
2021-12-06 22:17:57
change: Minor, suffix remains equal (3.0.0-deprecated > 3.1.0-deprecated)
Monitoringa499fed8-bcc8-4195-b154-641f14743757Azure Monitor Private Link Scope should block access to non private link resourcesAzure Private Link lets you connect your virtual networks to Azure resources through a private endpoint to an Azure Monitor Private Link scope (AMPLS). Private Link Access modes are set on your AMPLS to control whether ingestion and query requests from your networks can reach all resources, or only Private Link resources (to prevent data exfiltration). Learn more about private links at: https://docs.microsoft.com/azure/azure-monitor/logs/private-link-security#private-link-access-modes-private-only-vs-open. Default: Audit
Allowed: (Audit, Deny, Disabled)
2021-12-06 22:17:57
add: a499fed8-bcc8-4195-b154-641f14743757
Compute7c1b1214-f927-48bf-8882-84f0af6588b1Resource logs in Virtual Machine Scale Sets should be enabledIt is recommended to enable Logs so that activity trail can be recreated when investigations are required in the event of an incident or a compromise. Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2021-12-06 22:17:57
change: Minor (2.0.1 > 2.1.0)
Kubernetesf06ddb64-5fa3-4b77-b166-acb36f7f6042Kubernetes cluster pods and containers should only run with approved user and group IDsControl the user, primary group, supplemental group and file system group IDs that pods and containers can use to run in a Kubernetes Cluster. This recommendation is part of Pod Security Policies which are intended to improve the security of your Kubernetes environments. This policy is generally available for Kubernetes Service (AKS), and preview for AKS Engine and Azure Arc enabled Kubernetes. For more information, see https://aka.ms/kubepolicydoc. Default: Audit
Allowed: (audit, Audit, deny, Deny, disabled, Disabled)
2021-12-06 22:17:57
change: Patch (4.0.2 > 4.0.3)
Guest Configurationb18175dd-c599-4c64-83ba-bb018a06d35b[Deprecated]: Show audit results from Linux VMs that do not have the passwd file permissions set to 0644This policy should only be used along with its corresponding deploy policy in an initiative. This definition allows Azure Policy to process the results of auditing Linux virtual machines that do not have the passwd file permissions set to 0644. For more information on Guest Configuration policies, please visit https://aka.ms/gcpol Fixed: auditIfNotExists
2021-12-06 22:17:57
change: Minor, suffix remains equal (3.0.0-deprecated > 3.1.0-deprecated)
Kubernetes975ce327-682c-4f2e-aa46-b9598289b86cKubernetes cluster containers should only use allowed seccomp profilesPod containers can only use allowed seccomp profiles in a Kubernetes cluster. This recommendation is part of Pod Security Policies which are intended to improve the security of your Kubernetes environments. This policy is generally available for Kubernetes Service (AKS), and preview for AKS Engine and Azure Arc enabled Kubernetes. For more information, see https://aka.ms/kubepolicydoc. Default: Audit
Allowed: (audit, Audit, deny, Deny, disabled, Disabled)
2021-12-06 22:17:57
change: Patch (4.0.1 > 4.0.2)
Guest Configurationec49586f-4939-402d-a29e-6ff502b20592[Deprecated]: Deploy prerequisites to audit Linux VMs that allow remote connections from accounts without passwordsThis policy creates a Guest Configuration assignment to audit Linux virtual machines that allow remote connections from accounts without passwords. It also creates a system-assigned managed identity and deploys the VM extension for Guest Configuration. This policy should only be used along with its corresponding audit policy in an initiative. For more information on Guest Configuration policies, please visit https://aka.ms/gcpol Fixed: deployIfNotExistsContributor
2021-12-06 22:17:57
change: Minor, suffix remains equal (3.0.0-deprecated > 3.1.0-deprecated)
Security Center0fc39691-5a3f-4e3e-94ee-2e6447309ad9Running container images should have vulnerability findings resolvedContainer image vulnerability assessment scans container images running on your Kubernetes clusters for security vulnerabilities and exposes detailed findings for each image. Resolving the vulnerabilities can greatly improve your containers' security posture and protect them from attacks. Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2021-12-06 22:17:57
add: 0fc39691-5a3f-4e3e-94ee-2e6447309ad9
Kubernetesfebd0533-8e55-448f-b837-bd0e06f16469Kubernetes cluster containers should only use allowed imagesUse images from trusted registries to reduce the Kubernetes cluster's exposure risk to unknown vulnerabilities, security issues and malicious images. This policy is generally available for Kubernetes Service (AKS), and preview for AKS Engine and Azure Arc enabled Kubernetes. For more information, see https://aka.ms/kubepolicydoc. Default: Deny
Allowed: (audit, Audit, deny, Deny, disabled, Disabled)
2021-12-06 22:17:57
change: Patch (7.0.3 > 7.0.4)
Guest Configuration0447bc18-e2f7-4c0d-aa20-bff034275be1Audit Linux machines that have the specified applications installedRequires that prerequisites are deployed to the policy assignment scope. For details, visit https://aka.ms/gcpol. Machines are non-compliant if the Chef InSpec resource indicates that one or more of the packages provided by the parameter are installed. Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2021-12-06 22:17:57
change: Minor (3.1.0 > 3.2.0)
Guest Configurationf19aa1c1-6b91-4c27-ae6a-970279f03db9[Deprecated]: Deploy prerequisites to audit Linux VMs that do not have the passwd file permissions set to 0644This policy creates a Guest Configuration assignment to audit Linux virtual machines that do not have the passwd file permissions set to 0644. It also creates a system-assigned managed identity and deploys the VM extension for Guest Configuration. This policy should only be used along with its corresponding audit policy in an initiative. For more information on Guest Configuration policies, please visit https://aka.ms/gcpol Fixed: deployIfNotExistsContributor
2021-12-06 22:17:57
change: Minor, suffix remains equal (3.0.0-deprecated > 3.1.0-deprecated)
Guest Configuration331e8ea8-378a-410f-a2e5-ae22f38bb0daDeploy the Linux Guest Configuration extension to enable Guest Configuration assignments on Linux VMsThis policy deploys the Linux Guest Configuration extension to Linux virtual machines hosted in Azure that are supported by Guest Configuration. The Linux Guest Configuration extension is a prerequisite for all Linux Guest Configuration assignments and must be deployed to machines before using any Linux Guest Configuration policy definition. For more information on Guest Configuration, visit https://aka.ms/gcpol. Fixed: deployIfNotExistsContributor
2021-12-06 22:17:57
change: Minor (1.1.1 > 1.2.0)
Backup615b01c4-d565-4f6f-8c6e-d130268e3a1a[Preview]: Configure backup for blobs on storage accounts with a given tag to an existing backup vault in the same regionEnforce backup for blobs on all storage accounts that contain a given tag to a central backup vault. Doing this can help you manage backup of blobs contained across multiple storage accounts at scale. For more details, refer to https://aka.ms/AB-BlobBackupAzPolicies Default: DeployIfNotExists
Allowed: (DeployIfNotExists, AuditIfNotExists, Disabled)
Backup Contributor
2021-12-06 22:17:57
add: 615b01c4-d565-4f6f-8c6e-d130268e3a1a
Security Centerd3d1e68e-49d4-4b56-acff-93cef644b432[Deprecated]: Configure Azure Defender for container registries to be enabledAzure Defender for container registries provides vulnerability scanning of any images pulled within the last 30 days, pushed to your registry, or imported, and exposes detailed findings per image. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Security Admin
2021-12-06 22:17:57
change: Version remains equal, new suffix: deprecated (1.0.0 > 1.0.0-deprecated)
Kubernetes13cd7ae3-5bc0-4ac4-a62d-4f7c120b9759[Preview]: Kubernetes clusters should gate deployment of vulnerable imagesProtect your Kubernetes clusters and container workloads from potential threats by restricting deployment of container images with vulnerable software components. Use Azure Defender CI/CD scanning (https://aka.ms/AzureDefenderCICDscanning) and Azure defender for container registries (https://aka.ms/AzureDefenderForContainerRegistries) to identify and patch vulnerabilities prior to deployment. Evaluation prerequisite: Policy Addon and Azure Defender Profile. Only applicable for private preview customers. Default: Audit
Allowed: (Audit, Deny, Disabled)
2021-12-06 22:17:57
change: Patch, suffix remains equal (1.0.1-preview > 1.0.2-preview)
Kubernetes1a5b4dca-0b6f-4cf5-907c-56316bc1bf3dKubernetes clusters should be accessible only over HTTPSUse of HTTPS ensures authentication and protects data in transit from network layer eavesdropping attacks. This capability is currently generally available for Kubernetes Service (AKS), and in preview for AKS Engine and Azure Arc enabled Kubernetes. For more info, visit https://aka.ms/kubepolicydoc Default: Deny
Allowed: (audit, Audit, deny, Deny, disabled, Disabled)
2021-12-06 22:17:57
change: Patch (6.0.0 > 6.0.1)
Kubernetesf85eb0dd-92ee-40e9-8a76-db25a507d6d3Kubernetes cluster containers should only use allowed ProcMountTypePod containers can only use allowed ProcMountTypes in a Kubernetes cluster. This recommendation is part of Pod Security Policies which are intended to improve the security of your Kubernetes environments. This policy is generally available for Kubernetes Service (AKS), and preview for AKS Engine and Azure Arc enabled Kubernetes. For more information, see https://aka.ms/kubepolicydoc. Default: Audit
Allowed: (audit, Audit, deny, Deny, disabled, Disabled)
2021-12-06 22:17:57
change: Patch (5.0.1 > 5.0.2)
Kubernetes440b515e-a580-421e-abeb-b159a61ddcbc[Deprecated]: Kubernetes cluster containers should only listen on allowed portsRestrict containers to listen only on allowed ports to secure access to the Kubernetes cluster. The policy is deprecating since container port is only informative field which cannot decide the port container is actually using. For more information, see https://aka.ms/kubepolicydoc. Default: Deny
Allowed: (audit, Audit, deny, Deny, disabled, Disabled)
2021-12-06 22:17:57
change: Patch (6.1.1 > 6.1.2)
Guest Configuration630c64f9-8b6b-4c64-b511-6544ceff6fd6Authentication to Linux machines should require SSH keysAlthough SSH itself provides an encrypted connection, using passwords with SSH still leaves the VM vulnerable to brute-force attacks. The most secure option for authenticating to an Azure Linux virtual machine over SSH is with a public-private key pair, also known as SSH keys. Learn more: https://docs.microsoft.com/azure/virtual-machines/linux/create-ssh-keys-detailed. Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2021-12-06 22:17:57
change: Minor (2.1.0 > 2.2.0)
Backup98d0b9f8-fd90-49c9-88e2-d3baf3b0dd86Configure backup on virtual machines without a given tag to a new recovery services vault with a default policyEnforce backup for all virtual machines by deploying a recovery services vault in the same location and resource group as the virtual machine. Doing this is useful when different application teams in your organization are allocated separate resource groups and need to manage their own backups and restores. You can optionally exclude virtual machines containing a specified tag to control the scope of assignment. See https://aka.ms/AzureVMAppCentricBackupExcludeTag. Default: DeployIfNotExists
Allowed: (auditIfNotExists, AuditIfNotExists, deployIfNotExists, DeployIfNotExists, disabled, Disabled)
Virtual Machine Contributor
Backup Contributor
2021-12-06 22:17:57
change: Major (4.0.0 > 5.0.0)
SQLac01ad65-10e5-46df-bdd9-6b0cad13e1d2SQL managed instances should use customer-managed keys to encrypt data at restImplementing Transparent Data Encryption (TDE) with your own key provides you with increased transparency and control over the TDE Protector, increased security with an HSM-backed external service, and promotion of separation of duties. This recommendation applies to organizations with a related compliance requirement. Default: Audit
Allowed: (Audit, Deny, Disabled)
2021-12-06 22:17:57
change: Major, old suffix: preview (1.0.0-preview > 2.0.0)
Kubernetes1ddac26b-ed48-4c30-8cc5-3a68c79b8001Kubernetes clusters should not allow endpoint edit permissions of ClusterRole/system:aggregate-to-editClusterRole/system:aggregate-to-edit should not allow endpoint edit permissions due to CVE-2021-25740, Endpoint & EndpointSlice permissions allow cross-Namespace forwarding, https://github.com/kubernetes/kubernetes/issues/103675. This policy is generally available for Kubernetes Service (AKS), and preview for AKS Engine and Azure Arc enabled Kubernetes. For more information, see https://aka.ms/kubepolicydoc. Default: Audit
Allowed: (Audit, Disabled)
2021-12-06 22:17:57
change: Patch (1.0.0 > 1.0.1)
Guest Configurationfee5cb2b-9d9b-410e-afe3-2902d90d0004[Deprecated]: Show audit results from Linux VMs that do not have the specified applications installedThis policy should only be used along with its corresponding deploy policy in an initiative. This definition allows Azure Policy to process the results of auditing Linux virtual machines that do not have the specified applications installed. For more information on Guest Configuration policies, please visit https://aka.ms/gcpol Fixed: auditIfNotExists
2021-12-06 22:17:57
change: Minor, suffix remains equal (3.0.0-deprecated > 3.1.0-deprecated)
Kubernetesdf49d893-a74c-421d-bc95-c663042e5b80Kubernetes cluster containers should run with a read only root file systemRun containers with a read only root file system to protect from changes at run-time with malicious binaries being added to PATH in a Kubernetes cluster. This policy is generally available for Kubernetes Service (AKS), and preview for AKS Engine and Azure Arc enabled Kubernetes. For more information, see https://aka.ms/kubepolicydoc. Default: Audit
Allowed: (audit, Audit, deny, Deny, disabled, Disabled)
2021-12-06 22:17:57
change: Patch (4.0.1 > 4.0.2)
SQL0a370ff3-6cab-4e85-8995-295fd854c5b8SQL servers should use customer-managed keys to encrypt data at restImplementing Transparent Data Encryption (TDE) with your own key provides increased transparency and control over the TDE Protector, increased security with an HSM-backed external service, and promotion of separation of duties. This recommendation applies to organizations with a related compliance requirement. Default: Audit
Allowed: (Audit, Deny, Disabled)
2021-12-06 22:17:57
change: Major, old suffix: preview (1.0.0-preview > 2.0.0)
Kubernetes423dd1ba-798e-40e4-9c4d-b6902674b423Kubernetes clusters should disable automounting API credentialsDisable automounting API credentials to prevent a potentially compromised Pod resource to run API commands against Kubernetes clusters. For more information, see https://aka.ms/kubepolicydoc. Default: Audit
Allowed: (audit, Audit, deny, Deny, disabled, Disabled)
2021-12-06 22:17:57
change: Patch (2.0.1 > 2.0.2)
Backup09ce66bc-1220-4153-8104-e3f51c936913Configure backup on virtual machines without a given tag to an existing recovery services vault in the same locationEnforce backup for all virtual machines by backing them up to an existing central recovery services vault in the same location and subscription as the virtual machine. Doing this is useful when there is a central team in your organization managing backups for all resources in a subscription. You can optionally exclude virtual machines containing a specified tag to control the scope of assignment. See https://aka.ms/AzureVMCentralBackupExcludeTag. Default: DeployIfNotExists
Allowed: (auditIfNotExists, AuditIfNotExists, deployIfNotExists, DeployIfNotExists, disabled, Disabled)
Virtual Machine Contributor
Backup Contributor
2021-12-06 22:17:57
change: Major (4.0.0 > 5.0.0)
Kubernetes46592696-4c7b-4bf3-9e45-6c2763bdc0a6Kubernetes cluster pods should use specified labelsUse specified labels to identify the pods in a Kubernetes cluster. This policy is generally available for Kubernetes Service (AKS), and preview for AKS Engine and Azure Arc enabled Kubernetes. For more information, see https://aka.ms/kubepolicydoc. Default: Deny
Allowed: (audit, Audit, deny, Deny, disabled, Disabled)
2021-12-06 22:17:57
change: Patch (6.0.0 > 6.0.1)
Monitoringbec5db8e-c4e3-40f9-a545-e0bd00065c82Configure Azure Monitor Private Link Scope to block access to non private link resourcesAzure Private Link lets you connect your virtual networks to Azure resources through a private endpoint to an Azure Monitor Private Link scope (AMPLS). Private Link Access modes are set on your AMPLS to control whether ingestion and query requests from your networks can reach all resources, or only Private Link resources (to prevent data exfiltration). Learn more about private links at: https://docs.microsoft.com/azure/azure-monitor/logs/private-link-security#private-link-access-modes-private-only-vs-open. Default: Modify
Allowed: (Modify, Disabled)
Contributor
2021-12-06 22:17:57
add: bec5db8e-c4e3-40f9-a545-e0bd00065c82
Kubernetesf4a8fce0-2dd5-4c21-9a36-8f0ec809d663Kubernetes cluster pod FlexVolume volumes should only use allowed driversPod FlexVolume volumes should only use allowed drivers in a Kubernetes cluster. This recommendation is part of Pod Security Policies which are intended to improve the security of your Kubernetes environments. This policy is generally available for Kubernetes Service (AKS), and preview for AKS Engine and Azure Arc enabled Kubernetes. For more information, see https://aka.ms/kubepolicydoc. Default: Audit
Allowed: (audit, Audit, deny, Deny, disabled, Disabled)
2021-12-06 22:17:57
change: Patch (3.0.1 > 3.0.2)
Kubernetes6b2122c1-8120-4ff5-801b-17625a355590[Preview]: Azure Arc enabled Kubernetes clusters should have the Azure Policy extension installedThe Azure Policy extension for Azure Arc provides at-scale enforcements and safeguards on your Arc enabled Kubernetes clusters in a centralized, consistent manner. Learn more at https://aka.ms/akspolicydoc. Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2021-12-06 22:17:57
add: 6b2122c1-8120-4ff5-801b-17625a355590
Backup83644c87-93dd-49fe-bf9f-6aff8fd0834eConfigure backup on virtual machines with a given tag to a new recovery services vault with a default policyEnforce backup for all virtual machines by deploying a recovery services vault in the same location and resource group as the virtual machine. Doing this is useful when different application teams in your organization are allocated separate resource groups and need to manage their own backups and restores. You can optionally include virtual machines containing a specified tag to control the scope of assignment. See https://aka.ms/AzureVMAppCentricBackupIncludeTag. Default: DeployIfNotExists
Allowed: (auditIfNotExists, AuditIfNotExists, deployIfNotExists, DeployIfNotExists, disabled, Disabled)
Virtual Machine Contributor
Backup Contributor
2021-12-06 22:17:57
change: Major (4.0.0 > 5.0.0)
Kubernetesd46c275d-1680-448d-b2ec-e495a3b6cc89Kubernetes cluster services should only use allowed external IPsUse allowed external IPs to avoid the potential attack (CVE-2020-8554) in a Kubernetes cluster. For more information, see https://aka.ms/kubepolicydoc. Default: Audit
Allowed: (audit, Audit, deny, Deny, disabled, Disabled)
2021-12-06 22:17:57
change: Patch (3.0.1 > 3.0.2)
Kubernetes16697877-1118-4fb1-9b65-9898ec2509ecKubernetes cluster pods should only use allowed volume typesPods can only use allowed volume types in a Kubernetes cluster. This recommendation is part of Pod Security Policies which are intended to improve the security of your Kubernetes environments. This policy is generally available for Kubernetes Service (AKS), and preview for AKS Engine and Azure Arc enabled Kubernetes. For more information, see https://aka.ms/kubepolicydoc. Default: Audit
Allowed: (audit, Audit, deny, Deny, disabled, Disabled)
2021-12-06 22:17:57
change: Patch (3.0.1 > 3.0.2)
Kubernetes0adc5395-9169-4b9b-8687-af838d69410a[Preview]: Configure Azure Arc enabled Kubernetes clusters to install the Azure Policy extensionDeploy Azure Policy's extension for Azure Arc to provide at-scale enforcements and safeguard your Arc enabled Kubernetes clusters in a centralized, consistent manner. Learn more at https://aka.ms/akspolicydoc. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Kubernetes Extension Contributor
2021-12-06 22:17:57
add: 0adc5395-9169-4b9b-8687-af838d69410a
Security Center1f725891-01c0-420a-9059-4fa46cb770b7Configure Azure Defender for Key Vaults to be enabledAzure Defender for Key Vault provides an additional layer of protection and security intelligence by detecting unusual and potentially harmful attempts to access or exploit key vault accounts. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Security Admin
2021-12-06 22:17:57
change: Patch (1.0.0 > 1.0.1)
Guest Configurationfc9b3da7-8347-4380-8e70-0a0361d8deddLinux machines should meet requirements for the Azure compute security baselineRequires that prerequisites are deployed to the policy assignment scope. For details, visit https://aka.ms/gcpol. Machines are non-compliant if the machine is not configured correctly for one of the recommendations in the Azure compute security baseline. Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2021-12-06 22:17:57
change: Minor (1.2.0 > 1.3.0)
Security Center2370a3c1-4a25-4283-a91a-c9c1a145fb2fConfigure Azure Defender for DNS to be enabledAzure Defender for DNS provides an additional layer of protection for your cloud resources by continuously monitoring all DNS queries from your Azure resources. Azure Defender alerts you about suspicious activity at the DNS layer. Learn more about the capabilities of Azure Defender for DNS at https://aka.ms/defender-for-dns . Enabling this Azure Defender plan results in charges. Learn about the pricing details per region on Security Center's pricing page: https://aka.ms/pricing-security-center . Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Security Admin
2021-12-06 22:17:57
change: Patch (1.0.0 > 1.0.1)
Kubernetesa27c700f-8a22-44ec-961c-41625264370bKubernetes clusters should not use specific security capabilitiesPrevent specific security capabilities in Kubernetes clusters to prevent ungranted privileges on the Pod resource. For more information, see https://aka.ms/kubepolicydoc. Default: Audit
Allowed: (audit, Audit, deny, Deny, disabled, Disabled)
2021-12-06 22:17:57
change: Patch (3.0.1 > 3.0.2)
Guest Configurationd3b823c9-e0fc-4453-9fb2-8213b7338523Audit Linux machines that don't have the specified applications installedRequires that prerequisites are deployed to the policy assignment scope. For details, visit https://aka.ms/gcpol. Machines are non-compliant if the Chef InSpec resource indicates that one or more of the packages provided by the parameter are not installed. Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2021-12-06 22:17:57
change: Minor (3.0.0 > 3.1.0)
Security Center1288c8d7-4b05-4e3a-bc88-9053caefc021[Preview]: Configure ChangeTracking Extension for Linux virtual machine scale setsConfigure Linux virtual machine scale sets to automatically install the ChangeTracking Extension to enable File Integrity Monitoring(FIM) in Azure Security Center. FIM examines operating system files, Windows registries, application software, Linux system files, and more, for changes that might indicate an attack. The extension can be installed in virtual machines and locations supported by Azure Monitor Agent. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Virtual Machine Contributor
2021-11-12 16:23:07
add: 1288c8d7-4b05-4e3a-bc88-9053caefc021
Security Center1cb4d9c2-f88f-4069-bee0-dba239a57b09[Preview]: Guest Attestation extension should be installed on supported Windows virtual machinesInstall Guest Attestation extension on supported virtual machines to allow Azure Security Center to proactively attest and monitor the boot integrity. Once installed, boot integrity will be attested via Remote Attestation. This assessment only applies to trusted launch enabled virtual machines. Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2021-11-12 16:23:07
change: Major, suffix remains equal (1.0.0-preview > 3.0.0-preview)
Security Center6074e9a3-c711-4856-976d-24d51f9e065b[Preview]: Configure supported Linux virtual machines to automatically install the Guest Attestation extensionConfigure supported Linux virtual machines to automatically install the Guest Attestation extension to allow Azure Security Center to proactively attest and monitor the boot integrity. Boot integrity is attested via Remote Attestation. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Virtual Machine Contributor
2021-11-12 16:23:07
change: Major, suffix remains equal (3.0.0-preview > 6.0.0-preview)
Security Centere71c1e29-9c76-4532-8c4b-cb0573b0014c[Preview]: ChangeTracking extension should be installed on your Linux virtual machine scale setsInstall ChangeTracking Extension on Linux virtual machine scale sets to enable File Integrity Monitoring(FIM) in Azure Security Center. FIM examines operating system files, Windows registries, application software, Linux system files, and more, for changes that might indicate an attack. The extension can be installed in virtual machines and locations supported by Azure Monitoring Agent. Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2021-11-12 16:23:07
add: e71c1e29-9c76-4532-8c4b-cb0573b0014c
Security Centerc9b2ae08-09e2-4f0e-bb43-b60bf0135bdf[Preview]: Configure supported Windows virtual machine scale sets to automatically install the Guest Attestation extensionConfigure supported Windows virtual machines scale sets to automatically install the Guest Attestation extension to allow Azure Security Center to proactively attest and monitor the boot integrity. Boot integrity is attested via Remote Attestation. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Virtual Machine Contributor
2021-11-12 16:23:07
change: Major, suffix remains equal (2.0.0-preview > 3.0.0-preview)
Kubernetes8dfab9c4-fe7b-49ad-85e4-1e9be085358f[Preview]: Azure Arc enabled Kubernetes clusters should have Microsoft Defender for Cloud extension installedMicrosoft Defender for Cloud extension for Azure Arc provides threat protection for your Arc enabled Kubernetes clusters. The extension collects data from all nodes in the cluster and sends it to the Azure Defender for Kubernetes backend in the cloud for further analysis. Learn more in https://docs.microsoft.com/azure/defender-for-cloud/defender-for-containers-enable?pivots=defender-for-container-arc. Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2021-11-12 16:23:07
change: Major, suffix remains equal (3.0.0-preview > 4.0.0-preview)
Backup83644c87-93dd-49fe-bf9f-6aff8fd0834eConfigure backup on virtual machines with a given tag to a new recovery services vault with a default policyEnforce backup for all virtual machines by deploying a recovery services vault in the same location and resource group as the virtual machine. Doing this is useful when different application teams in your organization are allocated separate resource groups and need to manage their own backups and restores. You can optionally include virtual machines containing a specified tag to control the scope of assignment. See https://aka.ms/AzureVMAppCentricBackupIncludeTag. Default: DeployIfNotExists
Allowed: (auditIfNotExists, AuditIfNotExists, deployIfNotExists, DeployIfNotExists, disabled, Disabled)
Virtual Machine Contributor
Backup Contributor
2021-11-12 16:23:07
change: Major (3.0.0 > 4.0.0)
Security Centerd62cfe2b-3ab0-4d41-980d-76803b58ca65[Deprecated]: Log Analytics agent health issues should be resolved on your machinesSecurity Center uses the Log Analytics agent, formerly known as the Microsoft Monitoring Agent (MMA). To make sure your virtual machines are successfully monitored, you need to make sure the agent is installed on the virtual machines and properly collects security events to the configured workspace. Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2021-11-12 16:23:07
change: Version remains equal, new suffix: deprecated (1.0.0 > 1.0.0-deprecated)
Security Center8893442c-e7cb-4637-bab8-299a5d4ed96a[Preview]: ChangeTracking extension should be installed on your Linux virtual machineInstall ChangeTracking Extension on Linux virtual machines to enable File Integrity Monitoring(FIM) in Azure Security Center. FIM examines operating system files, Windows registries, application software, Linux system files, and more, for changes that might indicate an attack. The extension can be installed in virtual machines and locations supported by Azure Monitoring Agent. Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2021-11-12 16:23:07
add: 8893442c-e7cb-4637-bab8-299a5d4ed96a
Backup345fa903-145c-4fe1-8bcd-93ec2adccde8Configure backup on virtual machines with a given tag to an existing recovery services vault in the same locationEnforce backup for all virtual machines by backing them up to an existing central recovery services vault in the same location and subscription as the virtual machine. Doing this is useful when there is a central team in your organization managing backups for all resources in a subscription. You can optionally include virtual machines containing a specified tag to control the scope of assignment. See https://aka.ms/AzureVMCentralBackupIncludeTag. Default: DeployIfNotExists
Allowed: (auditIfNotExists, AuditIfNotExists, deployIfNotExists, DeployIfNotExists, disabled, Disabled)
Virtual Machine Contributor
Backup Contributor
2021-11-12 16:23:07
change: Major (3.0.0 > 4.0.0)
Kubernetes13cd7ae3-5bc0-4ac4-a62d-4f7c120b9759[Preview]: Kubernetes clusters should gate deployment of vulnerable imagesProtect your Kubernetes clusters and container workloads from potential threats by restricting deployment of container images with vulnerable software components. Use Azure Defender CI/CD scanning (https://aka.ms/AzureDefenderCICDscanning) and Azure defender for container registries (https://aka.ms/AzureDefenderForContainerRegistries) to identify and patch vulnerabilities prior to deployment. Evaluation prerequisite: Policy Addon and Azure Defender Profile. Only applicable for private preview customers. Default: Audit
Allowed: (Audit, Deny, Disabled)
2021-11-12 16:23:07
change: Patch, new suffix: preview (1.0.0 > 1.0.1-preview)
Backup013e242c-8828-4970-87b3-ab247555486dAzure Backup should be enabled for Virtual MachinesEnsure protection of your Azure Virtual Machines by enabling Azure Backup. Azure Backup is a secure and cost effective data protection solution for Azure. Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2021-11-12 16:23:07
change: Major (2.0.0 > 3.0.0)
Security Center5f8eb305-9c9f-4abe-9bb0-df220d9faba2[Preview]: Configure supported Linux virtual machines to automatically install the Azure Security agentConfigure supported Linux virtual machines to automatically install the Azure Security agent. Security Center collects events from the agent and uses them to provide security alerts and tailored hardening tasks (recommendations). Target virtual machines must be in a supported location. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Virtual Machine Contributor
2021-11-12 16:23:07
change: Major, suffix remains equal (5.0.0-preview > 6.0.0-preview)
Security Center10caed8a-652c-4d1d-84e4-2805b7c07278[Preview]: Configure ChangeTracking Extension for Linux Arc machinesConfigure Linux Arc machines to automatically install the ChangeTracking Extension to enable File Integrity Monitoring(FIM) in Azure Security Center. FIM examines operating system files, Windows registries, application software, Linux system files, and more, for changes that might indicate an attack. The extension can be installed in virtual machines and locations supported by Azure Monitor Agent. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Log Analytics Contributor
2021-11-12 16:23:07
add: 10caed8a-652c-4d1d-84e4-2805b7c07278
Media Services9285c3de-d5fd-4225-86d4-027894b0c442Azure Media Services should use customer-managed keys to encrypt data at restUse customer-managed keys to manage the encryption at rest of your Media Services accounts. By default, customer data is encrypted with service-managed keys, but customer-managed keys are commonly required to meet regulatory compliance standards. Customer-managed keys enable the data to be encrypted with an Azure Key Vault key created and owned by you. You have full control and responsibility for the key lifecycle, including rotation and management. Learn more at https://aka.ms/mediaservicescmkdocs. Default: Audit
Allowed: (Audit, Deny, Disabled)
2021-11-12 16:23:07
add: 9285c3de-d5fd-4225-86d4-027894b0c442
Kubernetes64def556-fbad-4622-930e-72d1d5589bf5[Preview]: Configure Azure Kubernetes Service clusters to enable Defender profileMicrosoft Defender for Containers provides cloud-native Kubernetes security capabilities including environment hardening, workload protection, and run-time protection. When you enable the SecurityProfile.AzureDefender on your Azure Kubernetes Service cluster, an agent is deployed to your cluster to collect security event data. Learn more about Microsoft Defender for Containers: https://docs.microsoft.com/azure/defender-for-cloud/defender-for-containers-introduction?tabs=defender-for-container-arch-aks. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Contributor
Log Analytics Contributor
2021-11-12 16:23:07
change: Minor, suffix remains equal (1.0.0-preview > 1.1.0-preview)
Security Center7cb1b219-61c6-47e0-b80c-4472cadeeb5f[Preview]: Configure supported Windows virtual machines to automatically enable Secure BootConfigure supported Windows virtual machines to automatically enable Secure Boot to mitigate against malicious and unauthorized changes to the boot chain. Once enabled, only trusted bootloaders, kernel and kernel drivers will be allowed to run. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Virtual Machine Contributor
2021-11-12 16:23:07
change: Major, suffix remains equal (1.0.0-preview > 3.0.0-preview)
Security Center97566dd7-78ae-4997-8b36-1c7bfe0d8121[Preview]: Secure Boot should be enabled on supported Windows virtual machinesEnable Secure Boot on supported Windows virtual machines to mitigate against malicious and unauthorized changes to the boot chain. Once enabled, only trusted bootloaders, kernel and kernel drivers will be allowed to run. This assessment only applies to trusted launch enabled Windows virtual machines. Default: Audit
Allowed: (Audit, Disabled)
2021-11-12 16:23:07
change: Major, suffix remains equal (1.0.0-preview > 3.0.0-preview)
Security Center1c30f9cd-b84c-49cc-aa2c-9288447cc3b3[Preview]: vTPM should be enabled on supported virtual machinesEnable virtual TPM device on supported virtual machines to facilitate Measured Boot and other OS security features that require a TPM. Once enabled, vTPM can be used to attest boot integrity. This assessment only applies to trusted launch enabled virtual machines. Default: Audit
Allowed: (Audit, Disabled)
2021-11-12 16:23:07
change: Major, suffix remains equal (1.0.0-preview > 2.0.0-preview)
Security Centerf655e522-adff-494d-95c2-52d4f6d56a42[Preview]: Guest Attestation extension should be installed on supported Windows virtual machines scale setsInstall Guest Attestation extension on supported virtual machines scale sets to allow Azure Security Center to proactively attest and monitor the boot integrity. Once installed, boot integrity will be attested via Remote Attestation. This assessment only applies to trusted launch enabled virtual machine scale sets. Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2021-11-12 16:23:07
change: Major, suffix remains equal (1.0.0-preview > 2.0.0-preview)
Security Center496e010e-fa91-4c00-be4b-92b481f67b58[Preview]: Configure VMs created with Shared Image Gallery images to install the Guest Attestation extensionConfigure virtual machines created with Shared Image Gallery images to automatically install the Guest Attestation extension to allow Azure Security Center to proactively attest and monitor the boot integrity. Boot integrity is attested via Remote Attestation. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Reader
Virtual Machine Contributor
2021-11-12 16:23:07
change: Major, suffix remains equal (1.0.0-preview > 2.0.0-preview)
Kubernetesfebd0533-8e55-448f-b837-bd0e06f16469Kubernetes cluster containers should only use allowed imagesUse images from trusted registries to reduce the Kubernetes cluster's exposure risk to unknown vulnerabilities, security issues and malicious images. This policy is generally available for Kubernetes Service (AKS), and preview for AKS Engine and Azure Arc enabled Kubernetes. For more information, see https://aka.ms/kubepolicydoc. Default: Deny
Allowed: (audit, Audit, deny, Deny, disabled, Disabled)
2021-11-12 16:23:07
change: Patch (7.0.2 > 7.0.3)
Security Centerfc47609f-4d9b-4aed-806b-446816cc63a3[Preview]: ChangeTracking extension should be installed on your Linux Arc machineInstall ChangeTracking Extension on Linux Arc machines to enable File Integrity Monitoring(FIM) in Azure Security Center. FIM examines operating system files, Windows registries, application software, Linux system files, and more, for changes that might indicate an attack. The extension can be installed in virtual machines and locations supported by Azure Monitoring Agent. Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2021-11-12 16:23:07
add: fc47609f-4d9b-4aed-806b-446816cc63a3
Security Center009259b0-12e8-42c9-94e7-7af86aa58d13[Preview]: Configure VMSS created with Shared Image Gallery images to install the Guest Attestation extensionConfigure VMSS created with Shared Image Gallery images to automatically install the Guest Attestation extension to allow Azure Security Center to proactively attest and monitor the boot integrity. Boot integrity is attested via Remote Attestation. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Reader
Virtual Machine Contributor
2021-11-12 16:23:07
change: Major, suffix remains equal (1.0.0-preview > 2.0.0-preview)
Security Center95406fc3-1f69-47b0-8105-4c03b276ec5c[Preview]: Configure supported Linux virtual machines to automatically enable Secure BootConfigure supported Linux virtual machines to automatically enable Secure Boot to mitigate against malicious and unauthorized changes to the boot chain. Once enabled, only trusted bootloaders, kernel and kernel drivers will be allowed to run. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Virtual Machine Contributor
2021-11-12 16:23:07
change: Major, suffix remains equal (2.0.0-preview > 5.0.0-preview)
Security Center221aac80-54d8-484b-83d7-24f4feac2ce0[Preview]: ChangeTracking extension should be installed on your Windows virtual machineInstall ChangeTracking Extension on Windows virtual machines to enable File Integrity Monitoring(FIM) in Azure Security Center. FIM examines operating system files, Windows registries, application software, Linux system files, and more, for changes that might indicate an attack. The extension can be installed in virtual machines and locations supported by Azure Monitoring Agent. Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2021-11-12 16:23:07
add: 221aac80-54d8-484b-83d7-24f4feac2ce0
Data Factoryf78ccdb4-7bf4-4106-8647-270491d2978a[Preview]: Azure Data Factory linked services should use system-assigned managed identity authentication when it is supportedUsing system-assigned managed identity when communicating with data stores via linked services avoids the use of less secured credentials such as passwords or connection strings. Default: Audit
Allowed: (Audit, Deny, Disabled)
2021-11-12 16:23:07
change: Major, suffix remains equal (1.0.0-preview > 2.0.0-preview)
Security Centera21f8c92-9e22-4f09-b759-50500d1d2dda[Preview]: Guest Attestation extension should be installed on supported Linux virtual machines scale setsInstall Guest Attestation extension on supported Linux virtual machines scale sets to allow Azure Security Center to proactively attest and monitor the boot integrity. Once installed, boot integrity will be attested via Remote Attestation. This assessment only applies to trusted launch enabled Linux virtual machine scale sets. Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2021-11-12 16:23:07
change: Major, suffix remains equal (2.0.0-preview > 4.0.0-preview)
Security Centere494853f-93c3-4e44-9210-d12f61a64b34[Preview]: Configure supported virtual machines to automatically enable vTPMConfigure supported virtual machines to automatically enable vTPM to facilitate Measured Boot and other OS security features that require a TPM. Once enabled, vTPM can be used to attest boot integrity. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Virtual Machine Contributor
2021-11-12 16:23:07
change: Major, suffix remains equal (1.0.0-preview > 2.0.0-preview)
Network055aa869-bc98-4af8-bafc-23f1ab6ffe2cAzure Web Application Firewall should be enabled for Azure Front Door entry-pointsDeploy Azure Web Application Firewall (WAF) in front of public facing web applications for additional inspection of incoming traffic. Web Application Firewall (WAF) provides centralized protection of your web applications from common exploits and vulnerabilities such as SQL injections, Cross-Site Scripting, local and remote file executions. You can also restrict access to your web applications by countries, IP address ranges, and other http(s) parameters via custom rules. Default: Audit
Allowed: (Audit, Deny, Disabled)
2021-11-12 16:23:07
change: Patch (1.0.1 > 1.0.2)
Security Center672fe5a1-2fcd-42d7-b85d-902b6e28c6ff[Preview]: Guest Attestation extension should be installed on supported Linux virtual machinesInstall Guest Attestation extension on supported Linux virtual machines to allow Azure Security Center to proactively attest and monitor the boot integrity. Once installed, boot integrity will be attested via Remote Attestation. This assessment only applies to trusted launch enabled Linux virtual machines. Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2021-11-12 16:23:07
change: Major, suffix remains equal (2.0.0-preview > 5.0.0-preview)
Security Center98ea2fc7-6fc6-4fd1-9d8d-6331154da071[Preview]: Configure supported Windows virtual machines to automatically install the Guest Attestation extensionConfigure supported Windows virtual machines to automatically install the Guest Attestation extension to allow Azure Security Center to proactively attest and monitor the boot integrity. Boot integrity is attested via Remote Attestation. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Virtual Machine Contributor
2021-11-12 16:23:07
change: Major, suffix remains equal (2.0.0-preview > 4.0.0-preview)
Security Centera7f5e735-d212-4c32-9229-d12bffbc7e00[Preview]: ChangeTracking extension should be installed on your Windows Arc machineInstall ChangeTracking Extension on Windows Arc machines to enable File Integrity Monitoring(FIM) in Azure Security Center. FIM examines operating system files, Windows registries, application software, Linux system files, and more, for changes that might indicate an attack. The extension can be installed in virtual machines and locations supported by Azure Monitoring Agent. Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2021-11-12 16:23:07
add: a7f5e735-d212-4c32-9229-d12bffbc7e00
Security Center4bb303db-d051-4099-95d2-e3e1428a4d00[Preview]: ChangeTracking extension should be installed on your Windows virtual machine scale setsInstall ChangeTracking Extension on Windows virtual machine scale sets to enable File Integrity Monitoring(FIM) in Azure Security Center. FIM examines operating system files, Windows registries, application software, Linux system files, and more, for changes that might indicate an attack. The extension can be installed in virtual machines and locations supported by Azure Monitoring Agent. Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2021-11-12 16:23:07
add: 4bb303db-d051-4099-95d2-e3e1428a4d00
Security Center8b5ad9ab-3d44-4a6e-9ac3-75b04ea5fd28[Preview]: Configure machines to automatically create the Azure Security Center pipeline for Azure Monitor AgentConfigure machines to automatically create the Azure Security Center pipeline for Azure Monitor Agent. Security Center collects events from the agent and uses them to provide security alerts and tailored hardening tasks (recommendations). Create a resource group and Log Analytics workspace in the same region as the machine to store audit records. Target virtual machines must be in a supported location. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Contributor
2021-11-12 16:23:07
change: Major, suffix remains equal (3.0.0-preview > 4.0.0-preview)
Kubernetesa1840de2-8088-4ea8-b153-b4c723e9cb01[Preview]: Azure Kubernetes Service clusters should have Defender profile enabledMicrosoft Defender for Containers provides cloud-native Kubernetes security capabilities including environment hardening, workload protection, and run-time protection. When you enable the SecurityProfile.AzureDefender on your Azure Kubernetes Service cluster, an agent is deployed to your cluster to collect security event data. Learn more about Microsoft Defender for Containers in https://docs.microsoft.com/azure/defender-for-cloud/defender-for-containers-introduction?tabs=defender-for-container-arch-aks Default: Audit
Allowed: (Audit, Disabled)
2021-11-12 16:23:07
change: Patch, suffix remains equal (1.0.0-preview > 1.0.1-preview)
Backup98d0b9f8-fd90-49c9-88e2-d3baf3b0dd86Configure backup on virtual machines without a given tag to a new recovery services vault with a default policyEnforce backup for all virtual machines by deploying a recovery services vault in the same location and resource group as the virtual machine. Doing this is useful when different application teams in your organization are allocated separate resource groups and need to manage their own backups and restores. You can optionally exclude virtual machines containing a specified tag to control the scope of assignment. See https://aka.ms/AzureVMAppCentricBackupExcludeTag. Default: DeployIfNotExists
Allowed: (auditIfNotExists, AuditIfNotExists, deployIfNotExists, DeployIfNotExists, disabled, Disabled)
Virtual Machine Contributor
Backup Contributor
2021-11-12 16:23:07
change: Major (3.0.0 > 4.0.0)
Stream Analyticsfe8684d6-3c5b-45c0-a08b-fa92653c2e1cStream Analytics job should connect to trusted inputs and outputsEnsure that Stream Analytics jobs do not have arbitrary Input or Output connections that are not defined in the allow-list. This checks that Stream Analytics jobs don't exfiltrate data by connecting to arbitrary sinks outside your organization. Default: Audit
Allowed: (Deny, Disabled, Audit)
2021-11-12 16:23:07
add: fe8684d6-3c5b-45c0-a08b-fa92653c2e1c
Security Centerec88097d-843f-4a92-8471-78016d337ba4[Preview]: Configure ChangeTracking Extension for Linux virtual machinesConfigure Linux virtual machines to automatically install the ChangeTracking Extension to enable File Integrity Monitoring(FIM) in Azure Security Center. FIM examines operating system files, Windows registries, application software, Linux system files, and more, for changes that might indicate an attack. The extension can be installed in virtual machines and locations supported by Azure Monitor Agent. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Virtual Machine Contributor
2021-11-12 16:23:07
add: ec88097d-843f-4a92-8471-78016d337ba4
Security Centerf08f556c-12ff-464d-a7de-40cb5b6cccec[Preview]: Configure ChangeTracking Extension for Windows virtual machinesConfigure Windows virtual machines to automatically install the ChangeTracking Extension to enable File Integrity Monitoring(FIM) in Azure Security Center. FIM examines operating system files, Windows registries, application software, Linux system files, and more, for changes that might indicate an attack. The extension can be installed in virtual machines and locations supported by Azure Monitor Agent. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Virtual Machine Contributor
2021-11-12 16:23:07
add: f08f556c-12ff-464d-a7de-40cb5b6cccec
Kubernetes708b60a6-d253-4fe0-9114-4be4c00f012c[Preview]: Configure Azure Arc enabled Kubernetes clusters to install Microsoft Defender for Cloud extensionMicrosoft Defender for Cloud extension for Azure Arc provides threat protection for your Arc enabled Kubernetes clusters. The extension collects data from all nodes in the cluster and sends it to the Azure Defender for Kubernetes backend in the cloud for further analysis. Learn more in https://docs.microsoft.com/azure/defender-for-cloud/defender-for-containers-enable?pivots=defender-for-container-arc. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Contributor
Log Analytics Contributor
2021-11-12 16:23:07
change: Major, suffix remains equal (2.0.0-preview > 3.0.0-preview)
Security Center57c2e3f0-98cf-4c3b-aa6b-e8f70726e74e[Preview]: Configure supported Linux virtual machine scale sets to automatically install the Guest Attestation extensionConfigure supported Linux virtual machines scale sets to automatically install the Guest Attestation extension to allow Azure Security Center to proactively attest and monitor the boot integrity. Boot integrity is attested via Remote Attestation. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Virtual Machine Contributor
2021-11-12 16:23:07
change: Major, suffix remains equal (3.0.0-preview > 5.0.0-preview)
Backup09ce66bc-1220-4153-8104-e3f51c936913Configure backup on virtual machines without a given tag to an existing recovery services vault in the same locationEnforce backup for all virtual machines by backing them up to an existing central recovery services vault in the same location and subscription as the virtual machine. Doing this is useful when there is a central team in your organization managing backups for all resources in a subscription. You can optionally exclude virtual machines containing a specified tag to control the scope of assignment. See https://aka.ms/AzureVMCentralBackupExcludeTag. Default: DeployIfNotExists
Allowed: (auditIfNotExists, AuditIfNotExists, deployIfNotExists, DeployIfNotExists, disabled, Disabled)
Virtual Machine Contributor
Backup Contributor
2021-11-12 16:23:07
change: Major (3.0.0 > 4.0.0)
Security Center4bb303db-d051-4099-95d2-e3e1428a4d2c[Preview]: Configure ChangeTracking Extension for Windows virtual machine scale setsConfigure Windows virtual machine scale sets to automatically install the ChangeTracking Extension to enable File Integrity Monitoring(FIM) in Azure Security Center. FIM examines operating system files, Windows registries, application software, Linux system files, and more, for changes that might indicate an attack. The extension can be installed in virtual machines and locations supported by Azure Monitor Agent. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Virtual Machine Contributor
2021-11-12 16:23:07
add: 4bb303db-d051-4099-95d2-e3e1428a4d2c
Security Center4bb303db-d051-4099-95d2-e3e1428a4cd5[Preview]: Configure ChangeTracking Extension for Windows Arc machinesConfigure Windows Arc machines to automatically install the ChangeTracking Extension to enable File Integrity Monitoring(FIM) in Azure Security Center. FIM examines operating system files, Windows registries, application software, Linux system files, and more, for changes that might indicate an attack. The extension can be installed in virtual machines and locations supported by Azure Monitor Agent. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Log Analytics Contributor
2021-11-12 16:23:07
add: 4bb303db-d051-4099-95d2-e3e1428a4cd5
Kubernetesfebd0533-8e55-448f-b837-bd0e06f16469Kubernetes cluster containers should only use allowed imagesUse images from trusted registries to reduce the Kubernetes cluster's exposure risk to unknown vulnerabilities, security issues and malicious images. This policy is generally available for Kubernetes Service (AKS), and preview for AKS Engine and Azure Arc enabled Kubernetes. For more information, see https://aka.ms/kubepolicydoc. Default: Deny
Allowed: (audit, Audit, deny, Deny, disabled, Disabled)
2021-10-25 16:02:14
change: Patch (7.0.1 > 7.0.2)
Key Vaultf772fb64-8e40-40ad-87bc-7706e1949427[Preview]: Certificates should not expire within the specified number of daysManage certificates that will expire within a specified number of days to ensure your organization has sufficient time to rotate the certificate prior to expiration. Default: Audit
Allowed: (audit, Audit, deny, Deny, disabled, Disabled)
2021-10-25 16:02:14
change: Version remains equal, new suffix: preview (2.0.1 > 2.0.1-preview)
Monitoring4efbd9d8-6bc6-45f6-9be2-7fe9dd5d89ffConfigure Windows virtual machine scale sets to run Azure Monitor Agent using system-assigned managed identityAutomate the deployment of Azure Monitor Agent extension on your Windows virtual machine scale sets for collecting telemetry data from the guest OS. This policy will install the extension if the OS and region are supported and system-assigned managed identity is enabled, and skip install otherwise. Learn more: https://aka.ms/AMAOverview. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Virtual Machine Contributor
2021-10-22 15:42:38
add: 4efbd9d8-6bc6-45f6-9be2-7fe9dd5d89ff
Monitoringec621e21-8b48-403d-a549-fc9023d4747fWindows Arc-enabled machines should have Azure Monitor Agent installedWindows Arc-enabled machines should be monitored and secured through the deployed Azure Monitor Agent. The Azure Monitor Agent collects telemetry data from the guest OS. Windows Arc-enabled machines in supported regions are monitored for Azure Monitor Agent deployment. Learn more: https://aka.ms/AMAOverview. Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2021-10-22 15:42:38
add: ec621e21-8b48-403d-a549-fc9023d4747f
SQLb79fa14e-238a-4c2d-b376-442ce508fc84Deploy - Configure diagnostic settings for SQL Databases to Log Analytics workspaceDeploys the diagnostic settings for SQL Databases to stream resource logs to a Log Analytics workspace when any SQL Database which is missing this diagnostic settings is created or updated. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Monitoring Contributor
Log Analytics Contributor
2021-10-22 15:42:38
change: Major (1.0.1 > 2.0.0)
Security Center98ea2fc7-6fc6-4fd1-9d8d-6331154da071[Preview]: Configure supported Windows virtual machines to automatically install the Guest Attestation extensionConfigure supported Windows virtual machines to automatically install the Guest Attestation extension to allow Azure Security Center to proactively attest and monitor the boot integrity. Boot integrity is attested via Remote Attestation. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Virtual Machine Contributor
2021-10-22 15:42:38
change: Major, suffix remains equal (1.0.0-preview > 2.0.0-preview)
Security Center496e010e-fa91-4c00-be4b-92b481f67b58[Preview]: Configure VMs created with Shared Image Gallery images to install the Guest Attestation extensionConfigure virtual machines created with Shared Image Gallery images to automatically install the Guest Attestation extension to allow Azure Security Center to proactively attest and monitor the boot integrity. Boot integrity is attested via Remote Attestation. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Reader
Virtual Machine Contributor
2021-10-22 15:42:38
add: 496e010e-fa91-4c00-be4b-92b481f67b58
Security Center6074e9a3-c711-4856-976d-24d51f9e065b[Preview]: Configure supported Linux virtual machines to automatically install the Guest Attestation extensionConfigure supported Linux virtual machines to automatically install the Guest Attestation extension to allow Azure Security Center to proactively attest and monitor the boot integrity. Boot integrity is attested via Remote Attestation. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Virtual Machine Contributor
2021-10-22 15:42:38
change: Major, suffix remains equal (2.0.0-preview > 3.0.0-preview)
Security Center57c2e3f0-98cf-4c3b-aa6b-e8f70726e74e[Preview]: Configure supported Linux virtual machine scale sets to automatically install the Guest Attestation extensionConfigure supported Linux virtual machines scale sets to automatically install the Guest Attestation extension to allow Azure Security Center to proactively attest and monitor the boot integrity. Boot integrity is attested via Remote Attestation. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Virtual Machine Contributor
2021-10-22 15:42:38
change: Major, suffix remains equal (2.0.0-preview > 3.0.0-preview)
Monitoring94f686d6-9a24-4e19-91f1-de937dc171a4Configure Windows Arc-enabled machines to run Azure Monitor AgentAutomate the deployment of Azure Monitor Agent extension on your Windows Arc-enabled machines for collecting telemetry data from the guest OS. This policy will install the extension if the OS and region are supported and system-assigned managed identity is enabled, and skip install otherwise. Learn more: https://aka.ms/AMAOverview. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Azure Connected Machine Resource Administrator
2021-10-22 15:42:38
add: 94f686d6-9a24-4e19-91f1-de937dc171a4
Security Centerc9b2ae08-09e2-4f0e-bb43-b60bf0135bdf[Preview]: Configure supported Windows virtual machine scale sets to automatically install the Guest Attestation extensionConfigure supported Windows virtual machines scale sets to automatically install the Guest Attestation extension to allow Azure Security Center to proactively attest and monitor the boot integrity. Boot integrity is attested via Remote Attestation. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Virtual Machine Contributor
2021-10-22 15:42:38
change: Major, suffix remains equal (1.0.0-preview > 2.0.0-preview)
Monitoring3672e6f7-a74d-4763-b138-fcf332042f8fWindows virtual machine scale sets should have Azure Monitor Agent installedWindows virtual machine scale sets should be monitored and secured through the deployed Azure Monitor Agent. The Azure Monitor Agent collects telemetry data from the guest OS. Virtual machine scale sets with supported OS and in supported regions are monitored for Azure Monitor Agent deployment. Learn more: https://aka.ms/AMAOverview. Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2021-10-22 15:42:38
add: 3672e6f7-a74d-4763-b138-fcf332042f8f
Security Center009259b0-12e8-42c9-94e7-7af86aa58d13[Preview]: Configure VMSS created with Shared Image Gallery images to install the Guest Attestation extensionConfigure VMSS created with Shared Image Gallery images to automatically install the Guest Attestation extension to allow Azure Security Center to proactively attest and monitor the boot integrity. Boot integrity is attested via Remote Attestation. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Reader
Virtual Machine Contributor
2021-10-22 15:42:38
add: 009259b0-12e8-42c9-94e7-7af86aa58d13
Security Center0961003e-5a0a-4549-abde-af6a37f2724dVirtual machines should encrypt temp disks, caches, and data flows between Compute and Storage resourcesBy default, a virtual machine's OS and data disks are encrypted-at-rest using platform-managed keys. Temp disks, data caches and data flowing between compute and storage aren't encrypted. Disregard this recommendation if: 1. using encryption-at-host, or 2. server-side encryption on Managed Disks meets your security requirements. Learn more in: Server-side encryption of Azure Disk Storage: https://aka.ms/disksse, Different disk encryption offerings: https://aka.ms/diskencryptioncomparison Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2021-10-22 15:42:38
change: Patch (2.0.2 > 2.0.3)
Monitoringc02729e5-e5e7-4458-97fa-2b5ad0661f28Windows virtual machines should have Azure Monitor Agent installedWindows virtual machines should be monitored and secured through the deployed Azure Monitor Agent. The Azure Monitor Agent collects telemetry data from the guest OS. Windows virtual machines with supported OS and in supported regions are monitored for Azure Monitor Agent deployment. Learn more: https://aka.ms/AMAOverview. Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2021-10-22 15:42:38
add: c02729e5-e5e7-4458-97fa-2b5ad0661f28
Compute2c89a2e5-7285-40fe-afe0-ae8654b92fb2[Deprecated]: Unattached disks should be encryptedThis policy audits any unattached disk without encryption enabled. Default: Audit
Allowed: (Audit, Disabled)
2021-10-19 19:10:32
change: Version remains equal, new suffix: deprecated (1.0.0 > 1.0.0-deprecated)
Monitoringf17d891d-ff20-46f2-bad3-9e0a5403a4d3Linux Arc-enabled machines should have Azure Monitor Agent installedLinux Arc-enabled machines should be monitored and secured through the deployed Azure Monitor Agent. The Azure Monitor Agent collects telemetry data from the guest OS. This policy will audit Arc-enabled machines in supported regions. Learn more: https://aka.ms/AMAOverview. Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2021-10-19 19:10:32
add: f17d891d-ff20-46f2-bad3-9e0a5403a4d3
Search6300012e-e9a4-4649-b41f-a85f5c43be91Azure Cognitive Search services should have local authentication methods disabledDisabling local authentication methods improves security by ensuring that Azure Cognitive Search services exclusively require Azure Active Directory identities for authentication. Learn more at: https://aka.ms/azure-cognitive-search/rbac. Note that while the disable local authentication parameter is still in preview, the deny effect for this policy may result in limited Azure Cognitive Search portal functionality since some features of the Portal use the GA API which does not support the parameter. Default: Audit
Allowed: (Audit, Deny, Disabled)
2021-10-19 19:10:32
add: 6300012e-e9a4-4649-b41f-a85f5c43be91
Monitoring32ade945-311e-4249-b8a4-a549924234d7Linux virtual machine scale sets should have Azure Monitor Agent installedLinux virtual machine scale sets should be monitored and secured through the deployed Azure Monitor Agent. The Azure Monitor Agent collects telemetry data from the guest OS. This policy will audit virtual machine scale sets with supported OS images in supported regions. Learn more: https://aka.ms/AMAOverview. Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2021-10-19 19:10:32
add: 32ade945-311e-4249-b8a4-a549924234d7
Monitoring1afdc4b6-581a-45fb-b630-f1e6051e3e7aLinux virtual machines should have Azure Monitor Agent installedLinux virtual machines should be monitored and secured through the deployed Azure Monitor Agent. The Azure Monitor Agent collects telemetry data from the guest OS. This policy will audit virtual machines with supported OS images in supported regions. Learn more: https://aka.ms/AMAOverview. Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2021-10-19 19:10:32
add: 1afdc4b6-581a-45fb-b630-f1e6051e3e7a
Monitoring17b3de92-f710-4cf4-aa55-0e7859f1ed7b[Preview]: Configure system-assigned managed identity to enable Azure Monitor assignments on VMsConfigure system-assigned managed identity to virtual machines hosted in Azure that are supported by Azure Monitor and do not have a system-assigned managed identity. A system-assigned managed identity is a prerequisite for all Azure Monitor assignments and must be added to machines before using any Azure Monitor extension. Target virtual machines must be in a supported location. Default: Modify
Allowed: (Modify, Disabled)
Virtual Machine Contributor
Managed Identity Contributor
Managed Identity Operator
2021-10-19 19:10:32
change: Major, suffix remains equal (3.0.0-preview > 4.0.0-preview)
Monitoringeab1f514-22e3-42e3-9a1f-e1dc9199355cConfigure Windows Machines to be associated with a Data Collection RuleDeploy Association to link Windows virtual machines, virtual machine scale sets, and Arc machines to specified Data Collection Rule. The list of locations and OS images are updated over time as support is increased. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Monitoring Contributor
Log Analytics Contributor
2021-10-19 19:10:32
change: Patch (1.0.0 > 1.0.1)
Guest Configuration72650e9f-97bc-4b2a-ab5f-9781a9fcecbcWindows machines should meet requirements of the Azure compute security baselineRequires that prerequisites are deployed to the policy assignment scope. For details, visit https://aka.ms/gcpol. Machines are non-compliant if the machine is not configured correctly for one of the recommendations in the Azure compute security baseline. Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2021-10-19 19:10:32
change: Version remains equal, old suffix: preview (1.0.1-preview > 1.0.1)
Search4eb216f2-9dba-4979-86e6-5d7e63ce3b75Configure Azure Cognitive Search services to disable local authenticationDisable local authentication methods so that your Azure Cognitive Search services exclusively require Azure Active Directory identities for authentication. Learn more at: https://aka.ms/azure-cognitive-search/rbac. Default: Modify
Allowed: (Modify, Disabled)
Search Service Contributor
2021-10-19 19:10:32
add: 4eb216f2-9dba-4979-86e6-5d7e63ce3b75
Monitoring2ea82cdd-f2e8-4500-af75-67a2e084ca74Configure Linux Machines to be associated with a Data Collection RuleDeploy Association to link Linux virtual machines, virtual machine scale sets, and Arc machines to the specified Data Collection Rule. The list of locations and OS images are updated over time as support is increased. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Monitoring Contributor
Log Analytics Contributor
2021-10-19 19:10:32
change: Major (1.0.0 > 2.0.0)
Monitoring56a3e4f8-649b-4fac-887e-5564d11e8d3aConfigure Linux virtual machine scale sets to run Azure Monitor Agent with system-assigned managed identity-based authenticationAutomate the deployment of Azure Monitor Agent extension on your Linux virtual machine scale sets for collecting telemetry data from the guest OS. This policy will install the extension if the OS and region are supported and system-assigned managed identity is enabled, and skip install otherwise. Learn more: https://aka.ms/AMAOverview. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Virtual Machine Contributor
2021-10-19 19:10:32
add: 56a3e4f8-649b-4fac-887e-5564d11e8d3a
Monitoringca817e41-e85a-4783-bc7f-dc532d36235eConfigure Windows virtual machines to run Azure Monitor Agent using system-assigned managed identityAutomate the deployment of Azure Monitor Agent extension on your Windows virtual machines for collecting telemetry data from the guest OS. This policy will install the extension if the OS and region are supported and system-assigned managed identity is enabled, and skip install otherwise. Learn more: https://aka.ms/AMAOverview. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Virtual Machine Contributor
2021-10-19 19:10:32
change: Patch (2.0.0 > 2.0.1)
Monitoringa4034bc6-ae50-406d-bf76-50f4ee5a7811Configure Linux virtual machines to run Azure Monitor Agent with system-assigned managed identity-based authenticationAutomate the deployment of Azure Monitor Agent extension on your Linux virtual machines for collecting telemetry data from the guest OS. This policy will install the extension if the OS and region are supported and system-assigned managed identity is enabled, and skip install otherwise. Learn more: https://aka.ms/AMAOverview. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Virtual Machine Contributor
2021-10-19 19:10:32
change: Minor (1.0.0 > 1.1.0)
Guest Configurationfc9b3da7-8347-4380-8e70-0a0361d8deddLinux machines should meet requirements for the Azure compute security baselineRequires that prerequisites are deployed to the policy assignment scope. For details, visit https://aka.ms/gcpol. Machines are non-compliant if the machine is not configured correctly for one of the recommendations in the Azure compute security baseline. Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2021-10-19 19:10:32
change: Version remains equal, old suffix: preview (1.2.0-preview > 1.2.0)
Monitoring845857af-0333-4c5d-bbbc-6076697da122Configure Linux Arc-enabled machines to run Azure Monitor AgentAutomate the deployment of Azure Monitor Agent extension on your Linux Arc-enabled machines for collecting telemetry data from the guest OS. This policy will install the extension if the region is supported. Learn more: https://aka.ms/AMAOverview. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Azure Connected Machine Resource Administrator
2021-10-19 19:10:32
add: 845857af-0333-4c5d-bbbc-6076697da122
Update Management Centerbd876905-5b84-4f73-ab2d-2e7a7c4568d9[Preview]: Machines should be configured to periodically check for missing system updatesTo ensure periodic assessments for missing system updates are triggered automatically every 24 hours, the AssessmentMode property should be set to 'AutomaticByPlatform'. Learn more about AssessmentMode property for Windows: https://aka.ms/computevm-windowspatchassessmentmode, for Linux: https://aka.ms/computevm-linuxpatchassessmentmode. Default: Audit
Allowed: (Audit, Deny, Disabled)
2021-10-08 15:47:40
add: bd876905-5b84-4f73-ab2d-2e7a7c4568d9
Computeac34a73f-9fa5-4067-9247-a3ecae514468Configure disaster recovery on virtual machines by enabling replication via Azure Site RecoveryVirtual machines without disaster recovery configurations are vulnerable to outages and other disruptions. If the virtual machine does not already have disaster recovery configured, this would initiate the same by enabling replication using preset configurations to facilitate business continuity. You can optionally include/exclude virtual machines containing a specified tag to control the scope of assignment. To learn more about disaster recovery, visit https://aka.ms/asr-doc. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Owner
2021-10-08 15:47:40
change: Major (1.2.0 > 2.0.0)
Azure Arca3461c8c-6c9d-4e42-a644-40ba8a1abf49Configure Azure Arc-enabled servers to use an Azure Arc Private Link ScopeAzure Private Link lets you connect your virtual networks to Azure services without a public IP address at the source or destination. The Private Link platform handles the connectivity between the consumer and services over the Azure backbone network. By mapping Azure Arc-enabled servers to an Azure Arc Private Link Scope that is configured with a private endpoint, data leakage risks are reduced. Learn more about private links at: https://aka.ms/arc/privatelink. Default: Modify
Allowed: (Modify, Disabled)
Azure Connected Machine Resource Administrator
2021-10-08 15:47:40
add: a3461c8c-6c9d-4e42-a644-40ba8a1abf49
Azure Arc55c4db33-97b0-437b-8469-c4f4498f5df9Configure Azure Arc Private Link Scopes to use private DNS zonesUse private DNS zones to override the DNS resolution for a private endpoint. A private DNS zone links to your virtual network to resolve to Azure Arc Private Link Scopes. Learn more at: https://aka.ms/arc/privatelink. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Network Contributor
2021-10-08 15:47:40
add: 55c4db33-97b0-437b-8469-c4f4498f5df9
HDInsight43d6e3bd-fc6a-4b44-8b4d-2151d8736a11Configure Azure HDInsight clusters to use private DNS zonesUse private DNS zones to override the DNS resolution for a private endpoint. A private DNS zone links to your virtual network to resolve to Azure HDInsight clusters. Learn more at: https://aka.ms/hdi.pl. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Network Contributor
2021-10-08 15:47:40
add: 43d6e3bd-fc6a-4b44-8b4d-2151d8736a11
Update Management Center59efceea-0c96-497e-a4a1-4eb2290dac15[Preview]: Configure periodic checking for missing system updates on azure virtual machinesConfigure auto-assessment (every 24 hours) for OS updates on native Azure virtual machines. You can control the scope of assignment according to machine subscription, resource group, location or tag. Learn more about this for Windows: https://aka.ms/computevm-windowspatchassessmentmode, for Linux: https://aka.ms/computevm-linuxpatchassessmentmode. Fixed: modifyVirtual Machine Contributor
2021-10-08 15:47:40
add: 59efceea-0c96-497e-a4a1-4eb2290dac15
Azure Arc7eab1da3-2bf0-4ff0-8303-1a4277c380e8Azure Arc Private Link Scopes should be configured with a private endpointAzure Private Link lets you connect your virtual networks to Azure services without a public IP address at the source or destination. The Private Link platform handles the connectivity between the consumer and services over the Azure backbone network. By mapping private endpoints to Azure Arc Private Link Scopes, data leakage risks are reduced. Learn more about private links at: https://aka.ms/arc/privatelink. Default: Audit
Allowed: (Audit, Disabled)
2021-10-08 15:47:40
add: 7eab1da3-2bf0-4ff0-8303-1a4277c380e8
HDInsight2676090a-4baf-46ac-9085-4ac02cc50e3eConfigure Azure HDInsight clusters with private endpointsPrivate endpoints connect your virtual networks to Azure services without a public IP address at the source or destination. By mapping private endpoints to Azure HDInsight clusters, you can reduce data leakage risks. Learn more about private links at: https://aka.ms/hdi.pl. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Contributor
2021-10-08 15:47:40
add: 2676090a-4baf-46ac-9085-4ac02cc50e3e
Key Vaulted7c8c13-51e7-49d1-8a43-8490431a0da2Deploy Diagnostic Settings for Key Vault to Event HubDeploys the diagnostic settings for Key Vault to stream to a regional Event Hub when any Key Vault which is missing this diagnostic settings is created or updated. Fixed: deployIfNotExistsContributor
2021-10-08 15:47:40
change: Major (2.0.0 > 3.0.0)
Guest Configuration331e8ea8-378a-410f-a2e5-ae22f38bb0daDeploy the Linux Guest Configuration extension to enable Guest Configuration assignments on Linux VMsThis policy deploys the Linux Guest Configuration extension to Linux virtual machines hosted in Azure that are supported by Guest Configuration. The Linux Guest Configuration extension is a prerequisite for all Linux Guest Configuration assignments and must be deployed to machines before using any Linux Guest Configuration policy definition. For more information on Guest Configuration, visit https://aka.ms/gcpol. Fixed: deployIfNotExistsContributor
2021-10-08 15:47:40
change: Patch (1.1.0 > 1.1.1)
Update Management Centerbfea026e-043f-4ff4-9d1b-bf301ca7ff46[Preview]: Configure periodic checking for missing system updates on azure Arc-enabled serversConfigure auto-assessment (every 24 hours) for OS updates on Azure Arc-enabled servers. You can control the scope of assignment according to machine subscription, resource group, location or tag. Learn more about this for Windows: https://aka.ms/computevm-windowspatchassessmentmode, for Linux: https://aka.ms/computevm-linuxpatchassessmentmode. Fixed: modifyAzure Connected Machine Resource Administrator
2021-10-08 15:47:40
add: bfea026e-043f-4ff4-9d1b-bf301ca7ff46
Machine Learning7804b5c7-01dc-4723-969b-ae300cc07ff1Audit Azure Machine Learning Compute Cluster and Instance is behind virtual networkAzure Virtual Network deployment provides enhanced security and isolation for your Azure Machine Learning Compute Clusters and Instances, as well as subnets, access control policies, and other features to further restrict access.When am Azure Machine Learning Compute instance is configured with a virtual network, it is not publicly addressable and can only be accessed from virtual machines and applications within the virtual network. Default: Audit
Allowed: (Audit, Disabled)
2021-10-08 15:47:40
add: 7804b5c7-01dc-4723-969b-ae300cc07ff1
Azure Arc898f2439-3333-4713-af25-f1d78bc50556Azure Arc Private Link Scopes should disable public network accessDisabling public network access improves security by ensuring that Azure Arc resources cannot connect via the public internet. Creating private endpoints can limit exposure of Azure Arc resources. Learn more at: https://aka.ms/arc/privatelink. Default: Audit
Allowed: (Audit, Deny, Disabled)
2021-10-08 15:47:40
add: 898f2439-3333-4713-af25-f1d78bc50556
Azure Arcefa3f296-ff2b-4f38-bc0d-5ef12c965b68Azure Arc-enabled servers should be configured with an Azure Arc Private Link ScopeAzure Private Link lets you connect your virtual networks to Azure services without a public IP address at the source or destination. The Private Link platform handles the connectivity between the consumer and services over the Azure backbone network. By mapping Azure Arc-enabled servers to an Azure Arc Private Link Scope that is configured with a private endpoint, data leakage risks are reduced. Learn more about private links at: https://aka.ms/arc/privatelink. Default: Audit
Allowed: (Audit, Deny, Disabled)
2021-10-08 15:47:40
add: efa3f296-ff2b-4f38-bc0d-5ef12c965b68
HDInsightc8cc2f85-e019-4065-9fa3-5e6a2b2dde56Azure HDInsight should use private linkAzure Private Link lets you connect your virtual networks to Azure services without a public IP address at the source or destination. The Private Link platform handles the connectivity between the consumer and services over the Azure backbone network. By mapping private endpoints to Azure HDInsight clusters, you can reduce data leakage risks. Learn more about private links at: https://aka.ms/hdi.pl. Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2021-10-08 15:47:40
add: c8cc2f85-e019-4065-9fa3-5e6a2b2dde56
Azure Arcde0bc8ea-76e2-4fe2-a288-a07556d0e9c4Configure Azure Arc Private Link Scopes to disable public network accessDisable public network access for your Azure Arc Private Link Scope so that associated Azure Arc resources cannot connect to Azure Arc services over the public internet. This can reduce data leakage risks. Learn more at: https://aka.ms/arc/privatelink. Default: Modify
Allowed: (Modify, Disabled)
Azure Connected Machine Resource Administrator
2021-10-08 15:47:40
add: de0bc8ea-76e2-4fe2-a288-a07556d0e9c4
Azure Arcd6eeba80-df61-4de5-8772-bc1b7852ba6bConfigure Azure Arc Private Link Scopes with private endpointsPrivate endpoints connect your virtual networks to Azure services without a public IP address at the source or destination. By mapping private endpoints to Azure Arc Private Link Scopes, you can reduce data leakage risks. Learn more about private links at: https://aka.ms/arc/privatelink. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Network Contributor
Azure Connected Machine Resource Administrator
2021-10-08 15:47:40
add: d6eeba80-df61-4de5-8772-bc1b7852ba6b
Security Center44433aa3-7ec2-4002-93ea-65c65ff0310aConfigure Azure Defender for open-source relational databases to be enabledAzure Defender for open-source relational databases detects anomalous activities indicating unusual and potentially harmful attempts to access or exploit databases. Learn more about the capabilities of Azure Defender for open-source relational databases at https://aka.ms/AzDforOpenSourceDBsDocu. Important: Enabling this plan will result in charges for protecting your open-source relational databases. Learn about the pricing on Security Center's pricing page: https://aka.ms/pricing-security-center Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Security Admin
2021-10-08 15:47:40
add: 44433aa3-7ec2-4002-93ea-65c65ff0310a
Monitoringbef3f64c-5290-43b7-85b0-9b254eef4c47Deploy Diagnostic Settings for Key Vault to Log Analytics workspaceDeploys the diagnostic settings for Key Vault to stream to a regional Log Analytics workspace when any Key Vault which is missing this diagnostic settings is created or updated. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Monitoring Contributor
Log Analytics Contributor
2021-10-08 15:47:40
change: Major (1.0.0 > 2.0.0)
Guest Configurationfc9b3da7-8347-4380-8e70-0a0361d8deddLinux machines should meet requirements for the Azure compute security baselineRequires that prerequisites are deployed to the policy assignment scope. For details, visit https://aka.ms/gcpol. Machines are non-compliant if the machine is not configured correctly for one of the recommendations in the Azure compute security baseline. Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2021-10-04 15:27:15
change: Minor, suffix remains equal (1.1.1-preview > 1.2.0-preview)
Kubernetesd2e7ea85-6b44-4317-a0be-1b951587f626Kubernetes clusters should not grant CAP_SYS_ADMIN security capabilitiesTo reduce the attack surface of your containers, restrict CAP_SYS_ADMIN Linux capabilities. For more information, see https://aka.ms/kubepolicydoc. Default: Audit
Allowed: (audit, Audit, deny, Deny, disabled, Disabled)
2021-10-04 15:27:15
change: Version remains equal, old suffix: preview (3.0.1-preview > 3.0.1)
Kubernetes423dd1ba-798e-40e4-9c4d-b6902674b423Kubernetes clusters should disable automounting API credentialsDisable automounting API credentials to prevent a potentially compromised Pod resource to run API commands against Kubernetes clusters. For more information, see https://aka.ms/kubepolicydoc. Default: Audit
Allowed: (audit, Audit, deny, Deny, disabled, Disabled)
2021-10-04 15:27:15
change: Version remains equal, old suffix: preview (2.0.1-preview > 2.0.1)
Guest Configuratione6955644-301c-44b5-a4c4-528577de6861Audit Linux machines that do not have the passwd file permissions set to 0644Requires that prerequisites are deployed to the policy assignment scope. For details, visit https://aka.ms/gcpol. Machines are non-compliant if Linux machines that do not have the passwd file permissions set to 0644 Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2021-10-04 15:27:15
change: Minor (1.0.0 > 1.1.0)
Kubernetesa27c700f-8a22-44ec-961c-41625264370bKubernetes clusters should not use specific security capabilitiesPrevent specific security capabilities in Kubernetes clusters to prevent ungranted privileges on the Pod resource. For more information, see https://aka.ms/kubepolicydoc. Default: Audit
Allowed: (audit, Audit, deny, Deny, disabled, Disabled)
2021-10-04 15:27:15
change: Version remains equal, old suffix: preview (3.0.1-preview > 3.0.1)
Kubernetes13cd7ae3-5bc0-4ac4-a62d-4f7c120b9759[Preview]: Kubernetes clusters should gate deployment of vulnerable imagesProtect your Kubernetes clusters and container workloads from potential threats by restricting deployment of container images with vulnerable software components. Use Azure Defender CI/CD scanning (https://aka.ms/AzureDefenderCICDscanning) and Azure defender for container registries (https://aka.ms/AzureDefenderForContainerRegistries) to identify and patch vulnerabilities prior to deployment. Evaluation prerequisite: Policy Addon and Azure Defender Profile. Only applicable for private preview customers. Default: Audit
Allowed: (Audit, Deny, Disabled)
2021-10-04 15:27:15
change: Version remains equal, old suffix: preview (1.0.0-preview > 1.0.0)
Machine Learninga10ee784-7409-4941-b091-663697637c0fConfigure Azure Machine Learning workspaces to disable public network accessDisable public network access for Azure Machine Learning workspaces so that your workspaces aren't accessible over the public internet. This will help protect the workspaces against data leakage risks. You can limit exposure of the your machine learning workspaces by creating private endpoints instead. Learn more at: https://aka.ms/privateendpoints. Default: Modify
Allowed: (Modify, Disabled)
AzureML Data Scientist
2021-10-04 15:27:15
add: a10ee784-7409-4941-b091-663697637c0f
Event Hub5d4e3c65-4873-47be-94f3-6f8b953a3598Azure Event Hub namespaces should have local authentication methods disabledDisabling local authentication methods improves security by ensuring that Azure Event Hub namespaces exclusively require Azure Active Directory identities for authentication. Learn more at: https://aka.ms/disablelocalauth-eh. Default: Audit
Allowed: (Audit, Deny, Disabled)
2021-10-04 15:27:15
add: 5d4e3c65-4873-47be-94f3-6f8b953a3598
Guest Configuration331e8ea8-378a-410f-a2e5-ae22f38bb0daDeploy the Linux Guest Configuration extension to enable Guest Configuration assignments on Linux VMsThis policy deploys the Linux Guest Configuration extension to Linux virtual machines hosted in Azure that are supported by Guest Configuration. The Linux Guest Configuration extension is a prerequisite for all Linux Guest Configuration assignments and must be deployed to machines before using any Linux Guest Configuration policy definition. For more information on Guest Configuration, visit https://aka.ms/gcpol. Fixed: deployIfNotExistsContributor
2021-10-04 15:27:15
change: Minor (1.0.1 > 1.1.0)
Guest Configuration385f5831-96d4-41db-9a3c-cd3af78aaae6Deploy the Windows Guest Configuration extension to enable Guest Configuration assignments on Windows VMsThis policy deploys the Windows Guest Configuration extension to Windows virtual machines hosted in Azure that are supported by Guest Configuration. The Windows Guest Configuration extension is a prerequisite for all Windows Guest Configuration assignments and must be deployed to machines before using any Windows Guest Configuration policy definition. For more information on Guest Configuration, visit https://aka.ms/gcpol. Fixed: deployIfNotExistsContributor
2021-10-04 15:27:15
change: Minor (1.0.1 > 1.1.0)
Guest Configuration0447bc18-e2f7-4c0d-aa20-bff034275be1Audit Linux machines that have the specified applications installedRequires that prerequisites are deployed to the policy assignment scope. For details, visit https://aka.ms/gcpol. Machines are non-compliant if the Chef InSpec resource indicates that one or more of the packages provided by the parameter are installed. Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2021-10-04 15:27:15
change: Minor (3.0.0 > 3.1.0)
Guest Configurationf6ec09a3-78bf-4f8f-99dc-6c77182d0f99Audit Linux machines that have accounts without passwordsRequires that prerequisites are deployed to the policy assignment scope. For details, visit https://aka.ms/gcpol. Machines are non-compliant if Linux machines that have accounts without passwords Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2021-10-04 15:27:15
change: Minor (1.0.0 > 1.1.0)
Service Bus910711a6-8aa2-4f15-ae62-1e5b2ed3ef9eConfigure Azure Service Bus namespaces to disable local authenticationDisable local authentication methods so that your Azure ServiceBus namespaces exclusively require Azure Active Directory identities for authentication. Learn more at: https://aka.ms/disablelocalauth-sb. Default: Modify
Allowed: (Modify, Disabled)
Azure Service Bus Data Owner
2021-10-04 15:27:15
add: 910711a6-8aa2-4f15-ae62-1e5b2ed3ef9e
Kubernetes9f061a12-e40d-4183-a00e-171812443373Kubernetes clusters should not use the default namespacePrevent usage of the default namespace in Kubernetes clusters to protect against unauthorized access for ConfigMap, Pod, Secret, Service, and ServiceAccount resource types. For more information, see https://aka.ms/kubepolicydoc. Default: Audit
Allowed: (audit, Audit, deny, Deny, disabled, Disabled)
2021-10-04 15:27:15
change: Version remains equal, old suffix: preview (2.1.1-preview > 2.1.1)
Service Buscfb11c26-f069-4c14-8e36-56c394dae5afAzure Service Bus namespaces should have local authentication methods disabledDisabling local authentication methods improves security by ensuring that Azure Service Bus namespaces exclusively require Azure Active Directory identities for authentication. Learn more at: https://aka.ms/disablelocalauth-sb. Default: Audit
Allowed: (Audit, Deny, Disabled)
2021-10-04 15:27:15
add: cfb11c26-f069-4c14-8e36-56c394dae5af
Security Centeraf99038c-02fd-4a2f-ac24-386b62bf32de[Preview]: Machines should have ports closed that might expose attack vectorsAzure's Terms Of Use prohibit the use of Azure services in ways that could damage, disable, overburden, or impair any Microsoft server, or the network. The exposed ports identified by this recommendation need to be closed for your continued security. For each identified port, the recommendation also provides an explanation of the potential threat. Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2021-10-04 15:27:15
add: af99038c-02fd-4a2f-ac24-386b62bf32de
Guest Configuration630c64f9-8b6b-4c64-b511-6544ceff6fd6Authentication to Linux machines should require SSH keysAlthough SSH itself provides an encrypted connection, using passwords with SSH still leaves the VM vulnerable to brute-force attacks. The most secure option for authenticating to an Azure Linux virtual machine over SSH is with a public-private key pair, also known as SSH keys. Learn more: https://docs.microsoft.com/azure/virtual-machines/linux/create-ssh-keys-detailed. Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2021-10-04 15:27:15
change: Minor (2.0.1 > 2.1.0)
Guest Configurationea53dbee-c6c9-4f0e-9f9e-de0039b78023Audit Linux machines that allow remote connections from accounts without passwordsRequires that prerequisites are deployed to the policy assignment scope. For details, visit https://aka.ms/gcpol. Machines are non-compliant if Linux machines that allow remote connections from accounts without passwords Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2021-10-04 15:27:15
change: Minor (1.0.0 > 1.1.0)
Guest Configuration73db37c4-f180-4b0f-ab2c-8ee96467686bLinux machines should only have local accounts that are allowedRequires that prerequisites are deployed to the policy assignment scope. For details, visit https://aka.ms/gcpol. Managing user accounts using Azure Active Directory is a best practice for management of identities. Reducing local machine accounts helps prevent the proliferation of identities managed outside a central system. Machines are non-compliant if local user accounts exist that are enabled and not listed in the policy parameter. Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2021-10-04 15:27:15
change: Minor (1.0.0 > 1.1.0)
Machine Learning438c38d2-3772-465a-a9cc-7a6666a275ceAzure Machine Learning workspaces should disable public network accessDisabling public network access improves security by ensuring that the machine learning workspaces aren't exposed on the public internet. You can limit exposure of your workspaces by creating private endpoints instead. Learn more at: https://aka.ms/privateendpoints. Default: Audit
Allowed: (Audit, Deny, Disabled)
2021-10-04 15:27:15
add: 438c38d2-3772-465a-a9cc-7a6666a275ce
Event Hub57f35901-8389-40bb-ac49-3ba4f86d889dConfigure Azure Event Hub namespaces to disable local authenticationDisable local authentication methods so that your Azure Event Hub namespaces exclusively require Azure Active Directory identities for authentication. Learn more at: https://aka.ms/disablelocalauth-eh. Default: Modify
Allowed: (Modify, Disabled)
Azure Event Hubs Data Owner
2021-10-04 15:27:15
add: 57f35901-8389-40bb-ac49-3ba4f86d889d
Guest Configuration1e7fed80-8321-4605-b42c-65fc300f23a3Linux machines should have Log Analytics agent installed on Azure ArcMachines are non-compliant if Log Analytics agent is not installed on Azure Arc enabled Linux server. Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2021-09-27 15:52:17
add: 1e7fed80-8321-4605-b42c-65fc300f23a3
SQLfd2d1a6e-6d95-4df2-ad00-504bf0273406Configure Arc-enabled machines running SQL Server to have SQL Server extension installed.To ensure that SQL Server - Azure Arc resources are created by default when SQL Server instance is found on Azure Arc enabled Windows Server, the latter should have SQL Server extension installed and the server's managed identity should be configured with Azure Connected SQL Server Onboarding role Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Log Analytics Contributor
User Access Administrator
2021-09-27 15:52:17
change: Major (1.0.1 > 2.0.0)
Monitoringa70ca396-0a34-413a-88e1-b956c1e683beVirtual machines should have the Log Analytics extension installedThis policy audits any Windows/Linux virtual machines if the Log Analytics extension is not installed. Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2021-09-27 15:52:17
change: Patch (1.0.0 > 1.0.1)
Monitoringd69b1763-b96d-40b8-a2d9-ca31e9fd0d3e[Preview]: Log Analytics extension should be installed on your Windows Azure Arc machinesThis policy audits Windows Azure Arc machines if the Log Analytics extension is not installed. Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2021-09-27 15:52:17
change: Patch, suffix remains equal (1.0.0-preview > 1.0.1-preview)
Monitoring5ee9e9ed-0b42-41b7-8c9c-3cfb2fbe2069Deploy Log Analytics extension for Linux virtual machine scale setsDeploy Log Analytics extension for Linux virtual machine scale sets if the VM Image (OS) is in the list defined and the extension is not installed. Note: if your scale set upgradePolicy is set to Manual, you need to apply the extension to the all VMs in the set by calling upgrade on them. In CLI this would be az vmss update-instances. Fixed: deployIfNotExistsLog Analytics Contributor
Virtual Machine Contributor
2021-09-27 15:52:17
change: Patch (2.0.0 > 2.0.1)
Key Vault84d327c3-164a-4685-b453-900478614456[Preview]: Configure Azure Key Vault Managed HSM to disable public network accessDisable public network access for your Azure Key Vault Managed HSM so that it's not accessible over the public internet. This can reduce data leakage risks. Learn more at: https://docs.microsoft.com/azure/key-vault/managed-hsm/private-link#allow-trusted-services-to-access-managed-hsm. Default: Modify
Allowed: (Modify, Disabled)
Managed HSM contributor
2021-09-27 15:52:17
change: Major, suffix remains equal (1.0.0-preview > 2.0.0-preview)
Monitoring842c54e8-c2f9-4d79-ae8d-38d8b8019373[Preview]: Log Analytics extension should be installed on your Linux Azure Arc machinesThis policy audits Linux Azure Arc machines if the Log Analytics extension is not installed. Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2021-09-27 15:52:17
change: Patch, suffix remains equal (1.0.0-preview > 1.0.1-preview)
Kubernetesfebd0533-8e55-448f-b837-bd0e06f16469Kubernetes cluster containers should only use allowed imagesUse images from trusted registries to reduce the Kubernetes cluster's exposure risk to unknown vulnerabilities, security issues and malicious images. This policy is generally available for Kubernetes Service (AKS), and preview for AKS Engine and Azure Arc enabled Kubernetes. For more information, see https://aka.ms/kubepolicydoc. Default: Deny
Allowed: (audit, Audit, deny, Deny, disabled, Disabled)
2021-09-27 15:52:17
change: Patch (7.0.0 > 7.0.1)
Synapseac7891a4-ac7a-4ba0-9ae9-c923e5a225eeConfigure Synapse workspaces to have auditing enabledTo ensure the operations performed against your SQL assets are captured, Synapse workspaces should have auditing enabled. This is sometimes required for compliance with regulatory standards. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
SQL Security Manager
Storage Account Contributor
2021-09-27 15:52:17
change: Major (1.1.0 > 2.0.0)
Monitoring5c3bc7b8-a64c-4e08-a9cd-7ff0f31e1138Log Analytics extension should be enabled in virtual machine scale sets for listed virtual machine imagesReports virtual machine scale sets as non-compliant if the virtual machine image is not in the list defined and the extension is not installed. Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2021-09-27 15:52:17
change: Patch (2.0.0 > 2.0.1)
Security Centera2ea54a3-9707-45e3-8230-bbda8309d17e[Preview]: Configure Association to link virtual machines to default Azure Security Center Data Collection RuleConfigure machines to automatically create an association with the default data collection rule for Azure Security Center. Deleting this association will break the detection of security vulnerabilities for this virtual machine. Target virtual machines must be in a supported location. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Monitoring Contributor
2021-09-27 15:52:17
add: a2ea54a3-9707-45e3-8230-bbda8309d17e
Monitoringefbde977-ba53-4479-b8e9-10b957924fbfThe Log Analytics extension should be installed on Virtual Machine Scale SetsThis policy audits any Windows/Linux Virtual Machine Scale Sets if the Log Analytics extension is not installed. Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2021-09-27 15:52:17
change: Patch (1.0.0 > 1.0.1)
Security Centerbdc59948-5574-49b3-bb91-76b7c986428dAzure Defender for DNS should be enabledAzure Defender for DNS provides an additional layer of protection for your cloud resources by continuously monitoring all DNS queries from your Azure resources. Azure Defender alerts you about suspicious activity at the DNS layer. Learn more about the capabilities of Azure Defender for DNS at https://aka.ms/defender-for-dns . Enabling this Azure Defender plan results in charges. Learn about the pricing details per region on Security Center's pricing page: https://aka.ms/pricing-security-center . Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2021-09-27 15:52:17
change: Version remains equal, old suffix: preview (1.0.0-preview > 1.0.0)
Monitoring9d2b61b4-1d14-4a63-be30-d4498e7ad2cfConfigure Log Analytics extension on Azure Arc enabled Linux serversEnable VM insights on servers and machines connected to Azure through Arc enabled servers by installing the Log Analytics virtual machine extension. VM insights uses the Log Analytics agent to collect the guest OS performance data, and provides insights into their performance. See more - https://aka.ms/vminsightsdocs. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Log Analytics Contributor
2021-09-27 15:52:17
change: Patch (2.0.0 > 2.0.1)
Monitoring69af7d4a-7b18-4044-93a9-2651498ef203Configure Log Analytics extension on Azure Arc enabled Windows serversEnable VM insights on servers and machines connected to Azure through Arc enabled servers by installing the Log Analytics virtual machine extension. VM insights uses the Log Analytics agent to collect the guest OS performance data, and provides insights into their performance. See more - https://aka.ms/vminsightsdocs. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Log Analytics Contributor
2021-09-27 15:52:17
change: Patch (2.0.0 > 2.0.1)
Networke372f825-a257-4fb8-9175-797a8a8627d6[Deprecated]: RDP access from the Internet should be blockedThis policy is deprecated. This policy audits any network security rule that allows RDP access from Internet Default: Audit
Allowed: (Audit, Disabled)
2021-09-27 15:52:17
change: Version remains equal, new suffix: deprecated (2.0.0 > 2.0.0-deprecated)
Storage92a89a79-6c52-4a7e-a03f-61306fc49312Storage accounts should prevent cross tenant object replicationAudit restriction of object replication for your storage account. By default, users can configure object replication with a source storage account in one Azure AD tenant and a destination account in a different tenant. It is a security concern because customer's data can be replicated to a storage account that is owned by the customer. By setting allowCrossTenantReplication to false, objects replication can be configured only if both source and destination accounts are in the same Azure AD tenant. Default: Audit
Allowed: (Audit, Deny, Disabled)
2021-09-27 15:52:17
add: 92a89a79-6c52-4a7e-a03f-61306fc49312
Kubernetes13cd7ae3-5bc0-4ac4-a62d-4f7c120b9759[Preview]: Kubernetes clusters should gate deployment of vulnerable imagesProtect your Kubernetes clusters and container workloads from potential threats by restricting deployment of container images with vulnerable software components. Use Azure Defender CI/CD scanning (https://aka.ms/AzureDefenderCICDscanning) and Azure defender for container registries (https://aka.ms/AzureDefenderForContainerRegistries) to identify and patch vulnerabilities prior to deployment. Evaluation prerequisite: Policy Addon and Azure Defender Profile. Only applicable for private preview customers. Default: Audit
Allowed: (Audit, Deny, Disabled)
2021-09-27 15:52:17
add: 13cd7ae3-5bc0-4ac4-a62d-4f7c120b9759
Monitoring3c1b3629-c8f8-4bf6-862c-037cb9094038Deploy - Configure Log Analytics extension to be enabled on Windows virtual machine scale setsDeploy Log Analytics extension for Windows virtual machine scale sets if the virtual machine image is in the list defined and the extension is not installed. If your scale set upgradePolicy is set to Manual, you need to apply the extension to all the virtual machine in the set by updating them. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Log Analytics Contributor
Virtual Machine Contributor
2021-09-27 15:52:17
change: Patch (2.0.0 > 2.0.1)
Monitoring32133ab0-ee4b-4b44-98d6-042180979d50[Preview]: Log Analytics Extension should be enabled for listed virtual machine imagesReports virtual machines as non-compliant if the virtual machine image is not in the list defined and the extension is not installed. Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2021-09-27 15:52:17
change: Patch, suffix remains equal (2.0.0-preview > 2.0.1-preview)
Guest Configuration4078e558-bda6-41fb-9b3c-361e8875200dWindows machines should have Log Analytics agent installed on Azure ArcMachines are non-compliant if Log Analytics agent is not installed on Azure Arc enabled windows server. Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2021-09-27 15:52:17
add: 4078e558-bda6-41fb-9b3c-361e8875200d
Monitoring0868462e-646c-4fe3-9ced-a733534b6a2cDeploy - Configure Log Analytics extension to be enabled on Windows virtual machinesDeploy Log Analytics extension for Windows virtual machines if the virtual machine image is in the list defined and the extension is not installed. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Log Analytics Contributor
2021-09-27 15:52:17
change: Patch (2.0.0 > 2.0.1)
Network2c89a2e5-7285-40fe-afe0-ae8654b92fab[Deprecated]: SSH access from the Internet should be blockedThis policy is deprecated. This policy audits any network security rule that allows SSH access from Internet Default: Audit
Allowed: (Audit, Disabled)
2021-09-27 15:52:17
change: Version remains equal, new suffix: deprecated (2.0.0 > 2.0.0-deprecated)
Compute3d8640fc-63f6-4734-8dcb-cfd3d8c78f38[Deprecated]: Deploy default Log Analytics Extension for Ubuntu VMsThis policy deploys the Log Analytics Extension on Ubuntu VMs, and connects to the selected Log Analytics workspace Fixed: deployIfNotExistsLog Analytics Contributor
2021-09-27 15:52:17
change: Patch, suffix remains equal (1.0.0-deprecated > 1.0.1-deprecated)
Network98a2e215-5382-489e-bd29-32e7190a39baConfigure diagnostic settings for Azure Network Security Groups to Log Analytics workspaceDeploy diagnostic settings to Azure Network Security Groups to stream resource logs to a Log Analytics workspace. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Monitoring Contributor
Log Analytics Contributor
2021-09-27 15:52:17
add: 98a2e215-5382-489e-bd29-32e7190a39ba
Monitoring053d3325-282c-4e5c-b944-24faffd30d77Deploy Log Analytics extension for Linux VMsDeploy Log Analytics extension for Linux VMs if the VM Image (OS) is in the list defined and the extension is not installed. Fixed: deployIfNotExistsLog Analytics Contributor
2021-09-27 15:52:17
change: Patch (2.0.0 > 2.0.1)
Security Center8b5ad9ab-3d44-4a6e-9ac3-75b04ea5fd28[Preview]: Configure machines to automatically create the Azure Security Center pipeline for Azure Monitor AgentConfigure machines to automatically create the Azure Security Center pipeline for Azure Monitor Agent. Security Center collects events from the agent and uses them to provide security alerts and tailored hardening tasks (recommendations). Create a resource group and Log Analytics workspace in the same region as the machine to store audit records. Target virtual machines must be in a supported location. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Contributor
2021-09-27 15:52:17
change: Major, suffix remains equal (1.1.0-preview > 3.0.0-preview)
Event Grid2dd0e8b9-4289-4bb0-b813-1883298e9924Configure Azure Event Grid partner namespaces to disable local authenticationDisable local authentication methods so that your Azure Event Grid partner namespaces exclusively require Azure Active Directory identities for authentication. Learn more at: https://aka.ms/aeg-disablelocalauth. Default: Modify
Allowed: (Modify, Disabled)
EventGrid Contributor
2021-09-21 16:12:09
add: 2dd0e8b9-4289-4bb0-b813-1883298e9924
Event Grid8ac2748f-3bf1-4c02-a3b6-92ae68cf75b1Configure Azure Event Grid domains to disable local authenticationDisable local authentication methods so that your Azure Event Grid domains exclusively require Azure Active Directory identities for authentication. Learn more at: https://aka.ms/aeg-disablelocalauth. Default: Modify
Allowed: (Modify, Disabled)
EventGrid Contributor
2021-09-21 16:12:09
add: 8ac2748f-3bf1-4c02-a3b6-92ae68cf75b1
Event Gridae9fb87f-8a17-4428-94a4-8135d431055cAzure Event Grid topics should have local authentication methods disabledDisabling local authentication methods improves security by ensuring that Azure Event Grid topics exclusively require Azure Active Directory identities for authentication. Learn more at: https://aka.ms/aeg-disablelocalauth. Default: Audit
Allowed: (Audit, Deny, Disabled)
2021-09-21 16:12:09
add: ae9fb87f-8a17-4428-94a4-8135d431055c
Automation30d1d58e-8f96-47a5-8564-499a3f3cca81Configure Azure Automation account to disable local authenticationDisable local authentication methods so that your Azure Automation accounts exclusively require Azure Active Directory identities for authentication. Default: Modify
Allowed: (Modify, Disabled)
Contributor
2021-09-21 16:12:09
add: 30d1d58e-8f96-47a5-8564-499a3f3cca81
Automation48c5f1cb-14ad-4797-8e3b-f78ab3f8d700Azure Automation account should have local authentication method disabledDisabling local authentication methods improves security by ensuring that Azure Automation accounts exclusively require Azure Active Directory identities for authentication. Default: Audit
Allowed: (Audit, Deny, Disabled)
2021-09-21 16:12:09
add: 48c5f1cb-14ad-4797-8e3b-f78ab3f8d700
Kubernetes1c6e92c9-99f0-4e55-9cf2-0c234dc48f99Kubernetes clusters should not allow container privilege escalationDo not allow containers to run with privilege escalation to root in a Kubernetes cluster. This recommendation is part of CIS 5.2.5 which is intended to improve the security of your Kubernetes environments. This policy is generally available for Kubernetes Service (AKS), and preview for AKS Engine and Azure Arc enabled Kubernetes. For more information, see https://aka.ms/kubepolicydoc. Default: Audit
Allowed: (audit, Audit, deny, Deny, disabled, Disabled)
2021-09-21 16:12:09
change: Major (3.0.1 > 4.0.0)
Event Grid8632b003-3545-4b29-85e6-b2b96773df1eAzure Event Grid partner namespaces should have local authentication methods disabledDisabling local authentication methods improves security by ensuring that Azure Event Grid partner namespaces exclusively require Azure Active Directory identities for authentication. Learn more at: https://aka.ms/aeg-disablelocalauth. Default: Audit
Allowed: (Audit, Deny, Disabled)
2021-09-21 16:12:09
add: 8632b003-3545-4b29-85e6-b2b96773df1e
Kubernetes1ddac26b-ed48-4c30-8cc5-3a68c79b8001Kubernetes clusters should not allow endpoint edit permissions of ClusterRole/system:aggregate-to-editClusterRole/system:aggregate-to-edit should not allow endpoint edit permissions due to CVE-2021-25740, Endpoint & EndpointSlice permissions allow cross-Namespace forwarding, https://github.com/kubernetes/kubernetes/issues/103675. This policy is generally available for Kubernetes Service (AKS), and preview for AKS Engine and Azure Arc enabled Kubernetes. For more information, see https://aka.ms/kubepolicydoc. Default: Audit
Allowed: (Audit, Disabled)
2021-09-21 16:12:09
add: 1ddac26b-ed48-4c30-8cc5-3a68c79b8001
Event Grid8bfadddb-ee1c-4639-8911-a38cb8e0b3bdAzure Event Grid domains should have local authentication methods disabledDisabling local authentication methods improves security by ensuring that Azure Event Grid domains exclusively require Azure Active Directory identities for authentication. Learn more at: https://aka.ms/aeg-disablelocalauth. Default: Audit
Allowed: (Audit, Deny, Disabled)
2021-09-21 16:12:09
add: 8bfadddb-ee1c-4639-8911-a38cb8e0b3bd
Event Grid1c8144d9-746a-4501-b08c-093c8d29ad04Configure Azure Event Grid topics to disable local authenticationDisable local authentication methods so that your Azure Event Grid topics exclusively require Azure Active Directory identities for authentication. Learn more at: https://aka.ms/aeg-disablelocalauth. Default: Modify
Allowed: (Modify, Disabled)
EventGrid Contributor
2021-09-21 16:12:09
add: 1c8144d9-746a-4501-b08c-093c8d29ad04
Kubernetesf06ddb64-5fa3-4b77-b166-acb36f7f6042Kubernetes cluster pods and containers should only run with approved user and group IDsControl the user, primary group, supplemental group and file system group IDs that pods and containers can use to run in a Kubernetes Cluster. This recommendation is part of Pod Security Policies which are intended to improve the security of your Kubernetes environments. This policy is generally available for Kubernetes Service (AKS), and preview for AKS Engine and Azure Arc enabled Kubernetes. For more information, see https://aka.ms/kubepolicydoc. Default: Audit
Allowed: (audit, Audit, deny, Deny, disabled, Disabled)
2021-09-21 16:12:09
change: Patch (4.0.1 > 4.0.2)
Kubernetes245fc9df-fa96-4414-9a0b-3738c2f7341cResource logs in Azure Kubernetes Service should be enabledAzure Kubernetes Service's resource logs can help recreate activity trails when investigating security incidents. Enable it to make sure the logs will exist when needed Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2021-09-21 16:12:09
add: 245fc9df-fa96-4414-9a0b-3738c2f7341c
Security Center6654c8c4-e6f8-43f8-8869-54327af7ce32[Preview]: Configure supported Linux virtual machine scale sets to automatically install the Azure Security agentConfigure supported Linux virtual machine scale sets to automatically install the Azure Security agent. Security Center collects events from the agent and uses them to provide security alerts and tailored hardening tasks (recommendations). Target virtual machines must be in a supported location. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Virtual Machine Contributor
2021-09-13 16:35:32
add: 6654c8c4-e6f8-43f8-8869-54327af7ce32
Security Center808a7dc4-49f2-4e7b-af75-d14e561c244a[Preview]: Configure supported Windows virtual machine scale sets to automatically install the Azure Security agentConfigure supported Windows virtual machine scale sets to automatically install the Azure Security agent. Security Center collects events from the agent and uses them to provide security alerts and tailored hardening tasks (recommendations). Target Windows virtual machine scale sets must be in a supported location. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Virtual Machine Contributor
2021-09-13 16:35:32
add: 808a7dc4-49f2-4e7b-af75-d14e561c244a
Security Center62b52eae-c795-44e3-94e8-1b3d264766fb[Preview]: Azure Security agent should be installed on your Linux virtual machine scale setsInstall the Azure Security agent on your Linux virtual machine scale sets in order to monitor your machines for security configurations and vulnerabilities. Results of the assessments can seen and managed in Azure Security Center. Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2021-09-13 16:35:32
add: 62b52eae-c795-44e3-94e8-1b3d264766fb
Security Center0961003e-5a0a-4549-abde-af6a37f2724dVirtual machines should encrypt temp disks, caches, and data flows between Compute and Storage resourcesBy default, a virtual machine's OS and data disks are encrypted-at-rest using platform-managed keys. Temp disks, data caches and data flowing between compute and storage aren't encrypted. Disregard this recommendation if: 1. using encryption-at-host, or 2. server-side encryption on Managed Disks meets your security requirements. Learn more in: Server-side encryption of Azure Disk Storage: https://aka.ms/disksse, Different disk encryption offerings: https://aka.ms/diskencryptioncomparison Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2021-09-13 16:35:32
change: Patch (2.0.1 > 2.0.2)
Monitoring04d53d87-841c-4f23-8a5b-21564380b55eDeploy Diagnostic Settings for Service Bus to Log Analytics workspaceDeploys the diagnostic settings for Service Bus to stream to a regional Log Analytics workspace when any Service Bus which is missing this diagnostic settings is created or updated. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Monitoring Contributor
Log Analytics Contributor
2021-09-13 16:35:32
change: Major (1.0.0 > 2.0.0)
Security Center8b5ad9ab-3d44-4a6e-9ac3-75b04ea5fd28[Preview]: Configure machines to automatically create the Azure Security Center pipeline for Azure Monitor AgentConfigure machines to automatically create the Azure Security Center pipeline for Azure Monitor Agent. Security Center collects events from the agent and uses them to provide security alerts and tailored hardening tasks (recommendations). Create a resource group and Log Analytics workspace in the same region as the machine to store audit records. Target virtual machines must be in a supported location. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Contributor
2021-09-13 16:35:32
change: Minor, suffix remains equal (1.0.0-preview > 1.1.0-preview)
Security Center2f47ec78-4301-4655-b78e-b29377030cdc[Preview]: Configure supported Linux Arc machines to automatically install the Azure Security agentConfigure supported Linux Arc machines to automatically install the Azure Security agent. Security Center collects events from the agent and uses them to provide security alerts and tailored hardening tasks (recommendations). Target Linux Arc machines must be in a supported location. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Log Analytics Contributor
2021-09-13 16:35:32
add: 2f47ec78-4301-4655-b78e-b29377030cdc
Security Center1f300abb-f5a0-41c3-a163-91bd3ed35de7[Preview]: Azure Security agent should be installed on your Linux Arc machinesInstall the Azure Security agent on your Linux Arc machines in order to monitor your machines for security configurations and vulnerabilities. Results of the assessments can seen and managed in Azure Security Center. Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2021-09-13 16:35:32
add: 1f300abb-f5a0-41c3-a163-91bd3ed35de7
Security Centere16f967a-aa57-4f5e-89cd-8d1434d0a29a[Preview]: Azure Security agent should be installed on your Windows virtual machine scale setsInstall the Azure Security agent on your Windows virtual machine scale sets in order to monitor your machines for security configurations and vulnerabilities. Results of the assessments can seen and managed in Azure Security Center. Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2021-09-13 16:35:32
add: e16f967a-aa57-4f5e-89cd-8d1434d0a29a
Security Center0367cfc4-90b3-46ba-a8a6-ddd5d3514878[Preview]: Azure Security agent should be installed on your Windows Arc machinesInstall the Azure Security agent on your Windows Arc machines in order to monitor your machines for security configurations and vulnerabilities. Results of the assessments can seen and managed in Azure Security Center. Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2021-09-13 16:35:32
add: 0367cfc4-90b3-46ba-a8a6-ddd5d3514878
Security Centerbb2c6c6d-14bc-4443-bef3-c6be0adc6076[Preview]: Azure Security agent should be installed on your Windows virtual machinesInstall the Azure Security agent on your Windows virtual machines in order to monitor your machines for security configurations and vulnerabilities. Results of the assessments can seen and managed in Azure Security Center. Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2021-09-13 16:35:32
add: bb2c6c6d-14bc-4443-bef3-c6be0adc6076
Security Centere8794316-d918-4565-b57d-6b38a06381a0[Preview]: Azure Security agent should be installed on your Linux virtual machinesInstall the Azure Security agent on your Linux virtual machines in order to monitor your machines for security configurations and vulnerabilities. Results of the assessments can seen and managed in Azure Security Center. Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2021-09-13 16:35:32
add: e8794316-d918-4565-b57d-6b38a06381a0
Key Vault84d327c3-164a-4685-b453-900478614456[Preview]: Configure Azure Key Vault Managed HSM to disable public network accessDisable public network access for your Azure Key Vault Managed HSM so that it's not accessible over the public internet. This can reduce data leakage risks. Learn more at: https://docs.microsoft.com/azure/key-vault/managed-hsm/private-link#allow-trusted-services-to-access-managed-hsm. Default: Modify
Allowed: (Modify, Disabled)
Managed HSM contributor
2021-09-13 16:35:32
add: 84d327c3-164a-4685-b453-900478614456
Security Center5f8eb305-9c9f-4abe-9bb0-df220d9faba2[Preview]: Configure supported Linux virtual machines to automatically install the Azure Security agentConfigure supported Linux virtual machines to automatically install the Azure Security agent. Security Center collects events from the agent and uses them to provide security alerts and tailored hardening tasks (recommendations). Target virtual machines must be in a supported location. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Virtual Machine Contributor
2021-09-13 16:35:32
change: Major, suffix remains equal (4.0.0-preview > 5.0.0-preview)
Security Centerd01f3018-de9f-4d75-8dae-d12c1875da9f[Preview]: Configure supported Windows Arc machines to automatically install the Azure Security agentConfigure supported Windows Arc machines to automatically install the Azure Security agent. Security Center collects events from the agent and uses them to provide security alerts and tailored hardening tasks (recommendations). Target Windows Arc machines must be in a supported location. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Log Analytics Contributor
2021-09-13 16:35:32
add: d01f3018-de9f-4d75-8dae-d12c1875da9f
Security Center1537496a-b1e8-482b-a06a-1cc2415cdc7b[Preview]: Configure supported Windows machines to automatically install the Azure Security agentConfigure supported Windows machines to automatically install the Azure Security agent. Security Center collects events from the agent and uses them to provide security alerts and tailored hardening tasks (recommendations). Target virtual machines must be in a supported location. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Virtual Machine Contributor
2021-09-13 16:35:32
change: Major, suffix remains equal (3.0.0-preview > 4.0.0-preview)
Security Center13ce0167-8ca6-4048-8e6b-f996402e3c1bConfigure machines to receive a vulnerability assessment providerAzure Defender includes vulnerability scanning for your machines at no extra cost. You don't need a Qualys license or even a Qualys account - everything's handled seamlessly inside Security Center. When you enable this policy, Azure Defender automatically deploys the Qualys vulnerability assessment provider to all supported machines that don't already have it installed. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Security Admin
2021-09-13 16:35:32
change: Minor, suffix remains equal (2.1.0-preview > 2.2.0-preview)
App Servicef493116f-3b7f-4ab3-bf80-0c2af35e46c2Configure App Service slots to disable local authentication for FTP deployments.Disable local authentication methods for FTP deployments so that your App Services slots exclusively require Azure Active Directory identities for authentication. Learn more at: https://aka.ms/app-service-disable-basic-auth. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Website Contributor
2021-09-08 15:39:57
add: f493116f-3b7f-4ab3-bf80-0c2af35e46c2
Kubernetesd2e7ea85-6b44-4317-a0be-1b951587f626Kubernetes clusters should not grant CAP_SYS_ADMIN security capabilitiesTo reduce the attack surface of your containers, restrict CAP_SYS_ADMIN Linux capabilities. For more information, see https://aka.ms/kubepolicydoc. Default: Audit
Allowed: (audit, Audit, deny, Deny, disabled, Disabled)
2021-09-08 15:39:57
change: Patch, suffix remains equal (3.0.0-preview > 3.0.1-preview)
Kubernetes423dd1ba-798e-40e4-9c4d-b6902674b423Kubernetes clusters should disable automounting API credentialsDisable automounting API credentials to prevent a potentially compromised Pod resource to run API commands against Kubernetes clusters. For more information, see https://aka.ms/kubepolicydoc. Default: Audit
Allowed: (audit, Audit, deny, Deny, disabled, Disabled)
2021-09-08 15:39:57
change: Patch, suffix remains equal (2.0.0-preview > 2.0.1-preview)
Kubernetesf4a8fce0-2dd5-4c21-9a36-8f0ec809d663Kubernetes cluster pod FlexVolume volumes should only use allowed driversPod FlexVolume volumes should only use allowed drivers in a Kubernetes cluster. This recommendation is part of Pod Security Policies which are intended to improve the security of your Kubernetes environments. This policy is generally available for Kubernetes Service (AKS), and preview for AKS Engine and Azure Arc enabled Kubernetes. For more information, see https://aka.ms/kubepolicydoc. Default: Audit
Allowed: (audit, Audit, deny, Deny, disabled, Disabled)
2021-09-08 15:39:57
change: Patch (3.0.0 > 3.0.1)
Bot Service29261f8e-efdb-4255-95b8-8215414515d6Configure BotService resources with private endpointsPrivate endpoints connect your virtual network to Azure services without a public IP address at the source or destination. By mapping private endpoints to your BotService resource, you can reduce data leakage risks. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Network Contributor
2021-09-08 15:39:57
add: 29261f8e-efdb-4255-95b8-8215414515d6
Kubernetes975ce327-682c-4f2e-aa46-b9598289b86cKubernetes cluster containers should only use allowed seccomp profilesPod containers can only use allowed seccomp profiles in a Kubernetes cluster. This recommendation is part of Pod Security Policies which are intended to improve the security of your Kubernetes environments. This policy is generally available for Kubernetes Service (AKS), and preview for AKS Engine and Azure Arc enabled Kubernetes. For more information, see https://aka.ms/kubepolicydoc. Default: Audit
Allowed: (audit, Audit, deny, Deny, disabled, Disabled)
2021-09-08 15:39:57
change: Patch (4.0.0 > 4.0.1)
Bot Service6a4e6f44-f2af-4082-9702-033c9e88b9f8Configure BotService resources to use private DNS zonesUse private DNS zones to override the DNS resolution for a private endpoint. A private DNS zone links to your virtual network to resolve to BotService related resources. Learn more at: https://aka.ms/privatednszone. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Network Contributor
2021-09-08 15:39:57
add: 6a4e6f44-f2af-4082-9702-033c9e88b9f8
App Service572e342c-c920-4ef5-be2e-1ed3c6a51dc5Configure App Service to disable local authentication on FTP deployments.Disable local authentication methods for FTP deployments so that your App Services exclusively require Azure Active Directory identities for authentication. Learn more at: https://aka.ms/app-service-disable-basic-auth. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Website Contributor
2021-09-08 15:39:57
add: 572e342c-c920-4ef5-be2e-1ed3c6a51dc5
Kubernetesf85eb0dd-92ee-40e9-8a76-db25a507d6d3Kubernetes cluster containers should only use allowed ProcMountTypePod containers can only use allowed ProcMountTypes in a Kubernetes cluster. This recommendation is part of Pod Security Policies which are intended to improve the security of your Kubernetes environments. This policy is generally available for Kubernetes Service (AKS), and preview for AKS Engine and Azure Arc enabled Kubernetes. For more information, see https://aka.ms/kubepolicydoc. Default: Audit
Allowed: (audit, Audit, deny, Deny, disabled, Disabled)
2021-09-08 15:39:57
change: Patch (5.0.0 > 5.0.1)
Kubernetesf06ddb64-5fa3-4b77-b166-acb36f7f6042Kubernetes cluster pods and containers should only run with approved user and group IDsControl the user, primary group, supplemental group and file system group IDs that pods and containers can use to run in a Kubernetes Cluster. This recommendation is part of Pod Security Policies which are intended to improve the security of your Kubernetes environments. This policy is generally available for Kubernetes Service (AKS), and preview for AKS Engine and Azure Arc enabled Kubernetes. For more information, see https://aka.ms/kubepolicydoc. Default: Audit
Allowed: (audit, Audit, deny, Deny, disabled, Disabled)
2021-09-08 15:39:57
change: Patch (4.0.0 > 4.0.1)
App Service847ef871-e2fe-4e6e-907e-4adbf71de5cfApp Service slots should have local authentication methods disabled for SCM site deploymentsDisabling local authentication methods improves security by ensuring that App Service slots exclusively require Azure Active Directory identities for authentication. Learn more at: https://aka.ms/app-service-disable-basic-auth. Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2021-09-08 15:39:57
add: 847ef871-e2fe-4e6e-907e-4adbf71de5cf
Kubernetesd46c275d-1680-448d-b2ec-e495a3b6cc89Kubernetes cluster services should only use allowed external IPsUse allowed external IPs to avoid the potential attack (CVE-2020-8554) in a Kubernetes cluster. For more information, see https://aka.ms/kubepolicydoc. Default: Audit
Allowed: (audit, Audit, deny, Deny, disabled, Disabled)
2021-09-08 15:39:57
change: Patch (3.0.0 > 3.0.1)
Kubernetesc26596ff-4d70-4e6a-9a30-c2506bd2f80cKubernetes cluster containers should only use allowed capabilitiesRestrict the capabilities to reduce the attack surface of containers in a Kubernetes cluster. This recommendation is part of CIS 5.2.8 and CIS 5.2.9 which are intended to improve the security of your Kubernetes environments. This policy is generally available for Kubernetes Service (AKS), and preview for AKS Engine and Azure Arc enabled Kubernetes. For more information, see https://aka.ms/kubepolicydoc. Default: Audit
Allowed: (audit, Audit, deny, Deny, disabled, Disabled)
2021-09-08 15:39:57
change: Patch (4.0.0 > 4.0.1)
Kubernetese1e6c427-07d9-46ab-9689-bfa85431e636Kubernetes cluster pods and containers should only use allowed SELinux optionsPods and containers should only use allowed SELinux options in a Kubernetes cluster. This recommendation is part of Pod Security Policies which are intended to improve the security of your Kubernetes environments. This policy is generally available for Kubernetes Service (AKS), and preview for AKS Engine and Azure Arc enabled Kubernetes. For more information, see https://aka.ms/kubepolicydoc. Default: Audit
Allowed: (audit, Audit, deny, Deny, disabled, Disabled)
2021-09-08 15:39:57
change: Patch (4.0.0 > 4.0.1)
Kubernetes47a1ee2f-2a2a-4576-bf2a-e0e36709c2b8Kubernetes cluster containers should not share host process ID or host IPC namespaceBlock pod containers from sharing the host process ID namespace and host IPC namespace in a Kubernetes cluster. This recommendation is part of CIS 5.2.2 and CIS 5.2.3 which are intended to improve the security of your Kubernetes environments. This policy is generally available for Kubernetes Service (AKS), and preview for AKS Engine and Azure Arc enabled Kubernetes. For more information, see https://aka.ms/kubepolicydoc. Default: Audit
Allowed: (audit, Audit, deny, Deny, disabled, Disabled)
2021-09-08 15:39:57
change: Patch (3.0.0 > 3.0.1)
Internet of Things672d56b3-23a7-4a3c-a233-b77ed7777518Azure IoT Hub should have local authentication methods disabled for Service ApisDisabling local authentication methods improves security by ensuring that Azure IoT Hub exclusively require Azure Active Directory identities for Service Api authentication. Learn more at: https://aka.ms/iothubdisablelocalauth. Default: Audit
Allowed: (Audit, Deny, Disabled)
2021-09-08 15:39:57
add: 672d56b3-23a7-4a3c-a233-b77ed7777518
App Service5e97b776-f380-4722-a9a3-e7f0be029e79Configure App Service to disable local authentication for SCM sites.Disable local authentication methods for SCM sites so that your App Services exclusively require Azure Active Directory identities for authentication. Learn more at: https://aka.ms/app-service-disable-basic-auth. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Website Contributor
2021-09-08 15:39:57
add: 5e97b776-f380-4722-a9a3-e7f0be029e79
Kubernetes9f061a12-e40d-4183-a00e-171812443373Kubernetes clusters should not use the default namespacePrevent usage of the default namespace in Kubernetes clusters to protect against unauthorized access for ConfigMap, Pod, Secret, Service, and ServiceAccount resource types. For more information, see https://aka.ms/kubepolicydoc. Default: Audit
Allowed: (audit, Audit, deny, Deny, disabled, Disabled)
2021-09-08 15:39:57
change: Patch, suffix remains equal (2.1.0-preview > 2.1.1-preview)
Kubernetes56d0a13f-712f-466b-8416-56fb354fb823Kubernetes cluster containers should not use forbidden sysctl interfacesContainers should not use forbidden sysctl interfaces in a Kubernetes cluster. This recommendation is part of Pod Security Policies which are intended to improve the security of your Kubernetes environments. This policy is generally available for Kubernetes Service (AKS), and preview for AKS Engine and Azure Arc enabled Kubernetes. For more information, see https://aka.ms/kubepolicydoc. Default: Audit
Allowed: (audit, Audit, deny, Deny, disabled, Disabled)
2021-09-08 15:39:57
change: Patch (4.0.0 > 4.0.1)
SignalR702133e5-5ec5-4f90-9638-c78e22f13b39Configure Azure SignalR Service to disable local authenticationDisable local authentication methods so that your Azure SignalR Service exclusively requires Azure Active Directory identities for authentication. Default: Modify
Allowed: (Modify, Disabled)
SignalR/Web PubSub Contributor
2021-09-08 15:39:57
add: 702133e5-5ec5-4f90-9638-c78e22f13b39
App Serviceec71c0bc-6a45-4b1f-9587-80dc83e6898cApp Service slots should have local authentication methods disabled for FTP deploymentsDisabling local authentication methods improves security by ensuring that App Service slots exclusively require Azure Active Directory identities for authentication. Learn more at: https://aka.ms/app-service-disable-basic-auth. Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2021-09-08 15:39:57
add: ec71c0bc-6a45-4b1f-9587-80dc83e6898c
App Serviceaede300b-d67f-480a-ae26-4b3dfb1a1fdcApp Service should have local authentication methods disabled for SCM site deploymentsDisabling local authentication methods improves security by ensuring that App Service exclusively require Azure Active Directory identities for authentication. Learn more at: https://aka.ms/app-service-disable-basic-auth. Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2021-09-08 15:39:57
add: aede300b-d67f-480a-ae26-4b3dfb1a1fdc
Bot Servicead5621d6-a877-4407-aa93-a950b428315eBotService resources should use private linkAzure Private Link lets you connect your virtual network to Azure services without a public IP address at the source or destination. The Private Link platform handles the connectivity between the consumer and services over the Azure backbone network. By mapping private endpoints to your BotService resource, data leakage risks are reduced. Default: Audit
Allowed: (Audit, Disabled)
2021-09-08 15:39:57
add: ad5621d6-a877-4407-aa93-a950b428315e
Healthcare APIsfe1c9040-c46a-4e81-9aea-c7850fbb3aa6CORS should not allow every domain to access your FHIR ServiceCross-Origin Resource Sharing (CORS) should not allow all domains to access your FHIR Service. To protect your FHIR Service, remove access for all domains and explicitly define the domains allowed to connect. Default: Audit
Allowed: (audit, Audit, disabled, Disabled)
2021-09-08 15:39:57
add: fe1c9040-c46a-4e81-9aea-c7850fbb3aa6
Kubernetes098fc59e-46c7-4d99-9b16-64990e543d75Kubernetes cluster pod hostPath volumes should only use allowed host pathsLimit pod HostPath volume mounts to the allowed host paths in a Kubernetes Cluster. This recommendation is part of Pod Security Policies which are intended to improve the security of your Kubernetes environments. This policy is generally available for Kubernetes Service (AKS), and preview for AKS Engine and Azure Arc enabled Kubernetes. For more information, see https://aka.ms/kubepolicydoc. Default: Audit
Allowed: (audit, Audit, deny, Deny, disabled, Disabled)
2021-09-08 15:39:57
change: Patch (4.0.0 > 4.0.1)
App Service2c034a29-2a5f-4857-b120-f800fe5549aeConfigure App Service slots to disable local authentication for SCM sites.Disable local authentication methods for SCM sites so that your App Services slots exclusively require Azure Active Directory identities for authentication. Learn more at: https://aka.ms/app-service-disable-basic-auth. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Website Contributor
2021-09-08 15:39:57
add: 2c034a29-2a5f-4857-b120-f800fe5549ae
SQLfd2d1a6e-6d95-4df2-ad00-504bf0273406Configure Arc-enabled machines running SQL Server to have SQL Server extension installed.To ensure that SQL Server - Azure Arc resources are created by default when SQL Server instance is found on Azure Arc enabled Windows Server, the latter should have SQL Server extension installed and the server's managed identity should be configured with Azure Connected SQL Server Onboarding role Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Log Analytics Contributor
User Access Administrator
2021-09-08 15:39:57
change: Patch (1.0.0 > 1.0.1)
Kubernetesdf49d893-a74c-421d-bc95-c663042e5b80Kubernetes cluster containers should run with a read only root file systemRun containers with a read only root file system to protect from changes at run-time with malicious binaries being added to PATH in a Kubernetes cluster. This policy is generally available for Kubernetes Service (AKS), and preview for AKS Engine and Azure Arc enabled Kubernetes. For more information, see https://aka.ms/kubepolicydoc. Default: Audit
Allowed: (audit, Audit, deny, Deny, disabled, Disabled)
2021-09-08 15:39:57
change: Patch (4.0.0 > 4.0.1)
Kubernetesa27c700f-8a22-44ec-961c-41625264370bKubernetes clusters should not use specific security capabilitiesPrevent specific security capabilities in Kubernetes clusters to prevent ungranted privileges on the Pod resource. For more information, see https://aka.ms/kubepolicydoc. Default: Audit
Allowed: (audit, Audit, deny, Deny, disabled, Disabled)
2021-09-08 15:39:57
change: Patch, suffix remains equal (3.0.0-preview > 3.0.1-preview)
Kubernetes511f5417-5d12-434d-ab2e-816901e72a5eKubernetes cluster containers should only use allowed AppArmor profilesContainers should only use allowed AppArmor profiles in a Kubernetes cluster. This recommendation is part of Pod Security Policies which are intended to improve the security of your Kubernetes environments. This policy is generally available for Kubernetes Service (AKS), and preview for AKS Engine and Azure Arc enabled Kubernetes. For more information, see https://aka.ms/kubepolicydoc. Default: Audit
Allowed: (audit, Audit, deny, Deny, disabled, Disabled)
2021-09-08 15:39:57
change: Patch (4.0.0 > 4.0.1)
Kubernetes16697877-1118-4fb1-9b65-9898ec2509ecKubernetes cluster pods should only use allowed volume typesPods can only use allowed volume types in a Kubernetes cluster. This recommendation is part of Pod Security Policies which are intended to improve the security of your Kubernetes environments. This policy is generally available for Kubernetes Service (AKS), and preview for AKS Engine and Azure Arc enabled Kubernetes. For more information, see https://aka.ms/kubepolicydoc. Default: Audit
Allowed: (audit, Audit, deny, Deny, disabled, Disabled)
2021-09-08 15:39:57
change: Patch (3.0.0 > 3.0.1)
Kubernetes1c6e92c9-99f0-4e55-9cf2-0c234dc48f99Kubernetes clusters should not allow container privilege escalationDo not allow containers to run with privilege escalation to root in a Kubernetes cluster. This recommendation is part of CIS 5.2.5 which is intended to improve the security of your Kubernetes environments. This policy is generally available for Kubernetes Service (AKS), and preview for AKS Engine and Azure Arc enabled Kubernetes. For more information, see https://aka.ms/kubepolicydoc. Default: Audit
Allowed: (audit, Audit, deny, Deny, disabled, Disabled)
2021-09-08 15:39:57
change: Patch (3.0.0 > 3.0.1)
Kubernetes82985f06-dc18-4a48-bc1c-b9f4f0098cfeKubernetes cluster pods should only use approved host network and port rangeRestrict pod access to the host network and the allowable host port range in a Kubernetes cluster. This recommendation is part of CIS 5.2.4 which is intended to improve the security of your Kubernetes environments. This policy is generally available for Kubernetes Service (AKS), and preview for AKS Engine and Azure Arc enabled Kubernetes. For more information, see https://aka.ms/kubepolicydoc. Default: Audit
Allowed: (audit, Audit, deny, Deny, disabled, Disabled)
2021-09-08 15:39:57
change: Patch (4.0.0 > 4.0.1)
Internet of Things9f8ba900-a70f-486e-9ffc-faf907305376Configure Azure IoT Hub to disable local authenticationDisable local authentication methods so that your Azure IoT Hub exclusively require Azure Active Directory identities for authentication. Learn more at: https://aka.ms/iothubdisablelocalauth. Default: Modify
Allowed: (Modify, Disabled)
Contributor
2021-09-08 15:39:57
add: 9f8ba900-a70f-486e-9ffc-faf907305376
App Service871b205b-57cf-4e1e-a234-492616998bf7App Service should have local authentication methods disabled for FTP deploymentsDisabling local authentication methods improves security by ensuring that App Service exclusively require Azure Active Directory identities for authentication. Learn more at: https://aka.ms/app-service-disable-basic-auth. Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2021-09-08 15:39:57
add: 871b205b-57cf-4e1e-a234-492616998bf7
Key Vault98728c90-32c7-4049-8429-847dc0f4fe37Key Vault secrets should have an expiration dateSecrets should have a defined expiration date and not be permanent. Secrets that are valid forever provide a potential attacker with more time to compromise them. It is a recommended security practice to set expiration dates on secrets. Default: Audit
Allowed: (Audit, Deny, Disabled)
2021-08-30 14:27:30
change: Patch, old suffix: preview (1.0.1-preview > 1.0.2)
Key Vaultcee51871-e572-4576-855c-047c820360f0Certificates using RSA cryptography should have the specified minimum key sizeManage your organizational compliance requirements by specifying a minimum key size for RSA certificates stored in your key vault. Default: Audit
Allowed: (audit, Audit, deny, Deny, disabled, Disabled)
2021-08-30 14:27:30
change: Patch, old suffix: preview (2.0.0-preview > 2.0.1)
Key Vault8e826246-c976-48f6-b03e-619bb92b3d82Certificates should be issued by the specified integrated certificate authorityManage your organizational compliance requirements by specifying the Azure integrated certificate authorities that can issue certificates in your key vault such as Digicert or GlobalSign. Default: Audit
Allowed: (audit, Audit, deny, Deny, disabled, Disabled)
2021-08-30 14:27:30
change: Patch, old suffix: preview (2.0.0-preview > 2.0.1)
Kubernetesf85eb0dd-92ee-40e9-8a76-db25a507d6d3Kubernetes cluster containers should only use allowed ProcMountTypePod containers can only use allowed ProcMountTypes in a Kubernetes cluster. This recommendation is part of Pod Security Policies which are intended to improve the security of your Kubernetes environments. This policy is generally available for Kubernetes Service (AKS), and preview for AKS Engine and Azure Arc enabled Kubernetes. For more information, see https://aka.ms/kubepolicydoc. Default: Audit
Allowed: (audit, Audit, deny, Deny, disabled, Disabled)
2021-08-30 14:27:30
change: Major (4.0.0 > 5.0.0)
Key Vault75c4f823-d65c-4f29-a733-01d0077fdbcbKeys should be the specified cryptographic type RSA or ECSome applications require the use of keys backed by a specific cryptographic type. Enforce a particular cryptographic key type, RSA or EC, in your environment. Default: Audit
Allowed: (Audit, Deny, Disabled)
2021-08-30 14:27:30
change: Patch, old suffix: preview (1.0.0-preview > 1.0.1)
Key Vaultc26e4b24-cf98-4c67-b48b-5a25c4c69eb9Keys should not be active for longer than the specified number of daysSpecify the number of days that a key should be active. Keys that are used for an extended period of time increase the probability that an attacker could compromise the key. As a good security practice, make sure that your keys have not been active longer than two years. Default: Audit
Allowed: (Audit, Deny, Disabled)
2021-08-30 14:27:30
change: Patch, old suffix: preview (1.0.0-preview > 1.0.1)
Key Vault75262d3e-ba4a-4f43-85f8-9f72c090e5e3Secrets should have content type setA content type tag helps identify whether a secret is a password, connection string, etc. Different secrets have different rotation requirements. Content type tag should be set on secrets. Default: Audit
Allowed: (Audit, Deny, Disabled)
2021-08-30 14:27:30
change: Patch, old suffix: preview (1.0.0-preview > 1.0.1)
Security Center8e42c1f2-a2ab-49bc-994a-12bcd0dc4ac2Endpoint protection health issues should be resolved on your machinesResolve endpoint protection health issues on your virtual machines to protect them from latest threats and vulnerabilities. Azure Security Center supported endpoint protection solutions are documented here - https://docs.microsoft.com/azure/security-center/security-center-services?tabs=features-windows#supported-endpoint-protection-solutions. Endpoint protection assessment is documented here - https://docs.microsoft.com/azure/security-center/security-center-endpoint-protection. Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2021-08-30 14:27:30
add: 8e42c1f2-a2ab-49bc-994a-12bcd0dc4ac2
Kubernetes708b60a6-d253-4fe0-9114-4be4c00f012c[Preview]: Configure Azure Arc enabled Kubernetes clusters to install Microsoft Defender for Cloud extensionMicrosoft Defender for Cloud extension for Azure Arc provides threat protection for your Arc enabled Kubernetes clusters. The extension collects data from all nodes in the cluster and sends it to the Azure Defender for Kubernetes backend in the cloud for further analysis. Learn more in https://docs.microsoft.com/azure/defender-for-cloud/defender-for-containers-enable?pivots=defender-for-container-arc. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Contributor
Log Analytics Contributor
2021-08-30 14:27:30
change: Major, suffix remains equal (1.0.0-preview > 2.0.0-preview)
Kubernetesa8eff44f-8c92-45c3-a3fb-9880802d67a7Deploy Azure Policy Add-on to Azure Kubernetes Service clustersUse Azure Policy Add-on to manage and report on the compliance state of your Azure Kubernetes Service (AKS) clusters. For more information, see https://aka.ms/akspolicydoc. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Azure Kubernetes Service Contributor Role
Azure Kubernetes Service Policy Add-on Deployment
2021-08-30 14:27:30
change: Major (1.0.0 > 2.0.0)
Key Vault587c79fe-dd04-4a5e-9d0b-f89598c7261bKeys should be backed by a hardware security module (HSM)An HSM is a hardware security module that stores keys. An HSM provides a physical layer of protection for cryptographic keys. The cryptographic key cannot leave a physical HSM which provides a greater level of security than a software key. Default: Audit
Allowed: (Audit, Deny, Disabled)
2021-08-30 14:27:30
change: Patch, old suffix: preview (1.0.0-preview > 1.0.1)
Storage4fa4b6c0-31ca-4c0d-b10d-24b96f62a751[Preview]: Storage account public access should be disallowedAnonymous public read access to containers and blobs in Azure Storage is a convenient way to share data but might present security risks. To prevent data breaches caused by undesired anonymous access, Microsoft recommends preventing public access to a storage account unless your scenario requires it. Default: Audit
Allowed: (audit, Audit, deny, Deny, disabled, Disabled)
2021-08-30 14:27:30
change: Major, suffix remains equal (2.0.1-preview > 3.0.1-preview)
Kubernetes82985f06-dc18-4a48-bc1c-b9f4f0098cfeKubernetes cluster pods should only use approved host network and port rangeRestrict pod access to the host network and the allowable host port range in a Kubernetes cluster. This recommendation is part of CIS 5.2.4 which is intended to improve the security of your Kubernetes environments. This policy is generally available for Kubernetes Service (AKS), and preview for AKS Engine and Azure Arc enabled Kubernetes. For more information, see https://aka.ms/kubepolicydoc. Default: Audit
Allowed: (audit, Audit, deny, Deny, disabled, Disabled)
2021-08-30 14:27:30
change: Major (3.0.0 > 4.0.0)
Key Vaulta22f4a40-01d3-4c7d-8071-da157eeff341Certificates should be issued by the specified non-integrated certificate authorityManage your organizational compliance requirements by specifying the custom or internal certificate authorities that can issue certificates in your key vault. Default: Audit
Allowed: (audit, Audit, deny, Deny, disabled, Disabled)
2021-08-30 14:27:30
change: Patch, old suffix: preview (2.0.0-preview > 2.0.1)
API Managementdf73bd95-24da-4a4f-96b9-4e8b94b402bdAPI Management services should disable public network accessTo improve the security of API Management services, ensure that endpoints aren't exposed to the public internet. Some public endpoints are exposed by API Management services to support user scenarios, e.g. direct access to Management API, managing configuration using Git, self-hosted gateways configuration. If any of those features are not used, corresponding endpoints should be disabled. Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2021-08-30 14:27:30
add: df73bd95-24da-4a4f-96b9-4e8b94b402bd
Kubernetesc26596ff-4d70-4e6a-9a30-c2506bd2f80cKubernetes cluster containers should only use allowed capabilitiesRestrict the capabilities to reduce the attack surface of containers in a Kubernetes cluster. This recommendation is part of CIS 5.2.8 and CIS 5.2.9 which are intended to improve the security of your Kubernetes environments. This policy is generally available for Kubernetes Service (AKS), and preview for AKS Engine and Azure Arc enabled Kubernetes. For more information, see https://aka.ms/kubepolicydoc. Default: Audit
Allowed: (audit, Audit, deny, Deny, disabled, Disabled)
2021-08-30 14:27:30
change: Major (3.0.0 > 4.0.0)
Security Center1f7c564c-0a90-4d44-b7e1-9d456cffaee8Endpoint protection should be installed on your machinesTo protect your machines from threats and vulnerabilities, install a supported endpoint protection solution. Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2021-08-30 14:27:30
add: 1f7c564c-0a90-4d44-b7e1-9d456cffaee8
Kubernetesa27c700f-8a22-44ec-961c-41625264370bKubernetes clusters should not use specific security capabilitiesPrevent specific security capabilities in Kubernetes clusters to prevent ungranted privileges on the Pod resource. For more information, see https://aka.ms/kubepolicydoc. Default: Audit
Allowed: (audit, Audit, deny, Deny, disabled, Disabled)
2021-08-30 14:27:30
change: Major, suffix remains equal (2.0.0-preview > 3.0.0-preview)
Key Vaultb0eb591a-5e70-4534-a8bf-04b9c489584aSecrets should have more than the specified number of days before expirationIf a secret is too close to expiration, an organizational delay to rotate the secret may result in an outage. Secrets should be rotated at a specified number of days prior to expiration to provide sufficient time to react to a failure. Default: Audit
Allowed: (Audit, Deny, Disabled)
2021-08-30 14:27:30
change: Patch, old suffix: preview (1.0.0-preview > 1.0.1)
Key Vault152b15f7-8e1f-4c1f-ab71-8c010ba5dbc0Key Vault keys should have an expiration dateCryptographic keys should have a defined expiration date and not be permanent. Keys that are valid forever provide a potential attacker with more time to compromise the key. It is a recommended security practice to set expiration dates on cryptographic keys. Default: Audit
Allowed: (Audit, Deny, Disabled)
2021-08-30 14:27:30
change: Patch, old suffix: preview (1.0.1-preview > 1.0.2)
Key Vault12ef42cb-9903-4e39-9c26-422d29570417Certificates should have the specified lifetime action triggersManage your organizational compliance requirements by specifying whether a certificate lifetime action is triggered at a specific percentage of its lifetime or at a certain number of days prior to its expiration. Default: Audit
Allowed: (audit, Audit, deny, Deny, disabled, Disabled)
2021-08-30 14:27:30
change: Patch, old suffix: preview (2.0.0-preview > 2.0.1)
Key Vaulte8d99835-8a06-45ae-a8e0-87a91941ccfeSecrets should not be active for longer than the specified number of daysIf your secrets were created with an activation date set in the future, you must ensure that your secrets have not been active for longer than the specified duration. Default: Audit
Allowed: (Audit, Deny, Disabled)
2021-08-30 14:27:30
change: Patch, old suffix: preview (1.0.0-preview > 1.0.1)
Key Vaultff25f3c8-b739-4538-9d07-3d6d25cfb255Keys using elliptic curve cryptography should have the specified curve namesKeys backed by elliptic curve cryptography can have different curve names. Some applications are only compatible with specific elliptic curve keys. Enforce the types of elliptic curve keys that are allowed to be created in your environment. Default: Audit
Allowed: (Audit, Deny, Disabled)
2021-08-30 14:27:30
change: Patch, old suffix: preview (1.0.0-preview > 1.0.1)
Kubernetesf06ddb64-5fa3-4b77-b166-acb36f7f6042Kubernetes cluster pods and containers should only run with approved user and group IDsControl the user, primary group, supplemental group and file system group IDs that pods and containers can use to run in a Kubernetes Cluster. This recommendation is part of Pod Security Policies which are intended to improve the security of your Kubernetes environments. This policy is generally available for Kubernetes Service (AKS), and preview for AKS Engine and Azure Arc enabled Kubernetes. For more information, see https://aka.ms/kubepolicydoc. Default: Audit
Allowed: (audit, Audit, deny, Deny, disabled, Disabled)
2021-08-30 14:27:30
change: Major (3.0.0 > 4.0.0)
Key Vault5ff38825-c5d8-47c5-b70e-069a21955146Keys should have more than the specified number of days before expirationIf a key is too close to expiration, an organizational delay to rotate the key may result in an outage. Keys should be rotated at a specified number of days prior to expiration to provide sufficient time to react to a failure. Default: Audit
Allowed: (Audit, Deny, Disabled)
2021-08-30 14:27:30
change: Patch, old suffix: preview (1.0.0-preview > 1.0.1)
Key Vaultbd78111f-4953-4367-9fd5-7e08808b54bfCertificates using elliptic curve cryptography should have allowed curve namesManage the allowed elliptic curve names for ECC Certificates stored in key vault. More information can be found at https://aka.ms/akvpolicy. Default: Audit
Allowed: (audit, Audit, deny, Deny, disabled, Disabled)
2021-08-30 14:27:30
change: Patch, old suffix: preview (2.0.0-preview > 2.0.1)
Monitoring0fc55270-f8bf-4feb-b7b8-5e7e7eacc6a6Azure Monitor Private Link Scope should use private linkAzure Private Link lets you connect your virtual networks to Azure services without a public IP address at the source or destination. The Private Link platform handles the connectivity between the consumer and services over the Azure backbone network. By mapping private endpoints to Azure Monitor Private Links Scope, you can reduce data leakage risks. Learn more about private links at: https://docs.microsoft.com/azure/azure-monitor/logs/private-link-security. Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2021-08-30 14:27:30
add: 0fc55270-f8bf-4feb-b7b8-5e7e7eacc6a6
Kubernetes8dfab9c4-fe7b-49ad-85e4-1e9be085358f[Preview]: Azure Arc enabled Kubernetes clusters should have Microsoft Defender for Cloud extension installedMicrosoft Defender for Cloud extension for Azure Arc provides threat protection for your Arc enabled Kubernetes clusters. The extension collects data from all nodes in the cluster and sends it to the Azure Defender for Kubernetes backend in the cloud for further analysis. Learn more in https://docs.microsoft.com/azure/defender-for-cloud/defender-for-containers-enable?pivots=defender-for-container-arc. Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2021-08-30 14:27:30
change: Major, suffix remains equal (2.0.0-preview > 3.0.0-preview)
Key Vault1151cede-290b-4ba0-8b38-0ad145ac888fCertificates should use allowed key typesManage your organizational compliance requirements by restricting the key types allowed for certificates. Default: Audit
Allowed: (audit, Audit, deny, Deny, disabled, Disabled)
2021-08-30 14:27:30
change: Patch, old suffix: preview (2.0.0-preview > 2.0.1)
Kubernetesdf49d893-a74c-421d-bc95-c663042e5b80Kubernetes cluster containers should run with a read only root file systemRun containers with a read only root file system to protect from changes at run-time with malicious binaries being added to PATH in a Kubernetes cluster. This policy is generally available for Kubernetes Service (AKS), and preview for AKS Engine and Azure Arc enabled Kubernetes. For more information, see https://aka.ms/kubepolicydoc. Default: Audit
Allowed: (audit, Audit, deny, Deny, disabled, Disabled)
2021-08-30 14:27:30
change: Major (3.0.0 > 4.0.0)
API Management7ca8c8ac-3a6e-493d-99ba-c5fa35347ff2Configure API Management services to disable public network accessTo improve the security of API Management services, disable public endpoints. Some public endpoints are exposed by API Management services to support user scenarios, e.g. direct access to Management API, managing configuration using Git, self-hosted gateways configuration. If any of those features are not used, corresponding endpoints should be disabled. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
API Management Service Contributor
2021-08-30 14:27:30
add: 7ca8c8ac-3a6e-493d-99ba-c5fa35347ff2
Kubernetes975ce327-682c-4f2e-aa46-b9598289b86cKubernetes cluster containers should only use allowed seccomp profilesPod containers can only use allowed seccomp profiles in a Kubernetes cluster. This recommendation is part of Pod Security Policies which are intended to improve the security of your Kubernetes environments. This policy is generally available for Kubernetes Service (AKS), and preview for AKS Engine and Azure Arc enabled Kubernetes. For more information, see https://aka.ms/kubepolicydoc. Default: Audit
Allowed: (audit, Audit, deny, Deny, disabled, Disabled)
2021-08-30 14:27:30
change: Major (3.0.0 > 4.0.0)
Kubernetese345eecc-fa47-480f-9e88-67dcc122b164Kubernetes cluster containers CPU and memory resource limits should not exceed the specified limitsEnforce container CPU and memory resource limits to prevent resource exhaustion attacks in a Kubernetes cluster. This policy is generally available for Kubernetes Service (AKS), and preview for AKS Engine and Azure Arc enabled Kubernetes. For more information, see https://aka.ms/kubepolicydoc. Default: Deny
Allowed: (audit, Audit, deny, Deny, disabled, Disabled)
2021-08-30 14:27:30
change: Major (6.0.0 > 7.0.0)
Kubernetes511f5417-5d12-434d-ab2e-816901e72a5eKubernetes cluster containers should only use allowed AppArmor profilesContainers should only use allowed AppArmor profiles in a Kubernetes cluster. This recommendation is part of Pod Security Policies which are intended to improve the security of your Kubernetes environments. This policy is generally available for Kubernetes Service (AKS), and preview for AKS Engine and Azure Arc enabled Kubernetes. For more information, see https://aka.ms/kubepolicydoc. Default: Audit
Allowed: (audit, Audit, deny, Deny, disabled, Disabled)
2021-08-30 14:27:30
change: Major (3.0.0 > 4.0.0)
Kubernetes098fc59e-46c7-4d99-9b16-64990e543d75Kubernetes cluster pod hostPath volumes should only use allowed host pathsLimit pod HostPath volume mounts to the allowed host paths in a Kubernetes Cluster. This recommendation is part of Pod Security Policies which are intended to improve the security of your Kubernetes environments. This policy is generally available for Kubernetes Service (AKS), and preview for AKS Engine and Azure Arc enabled Kubernetes. For more information, see https://aka.ms/kubepolicydoc. Default: Audit
Allowed: (audit, Audit, deny, Deny, disabled, Disabled)
2021-08-30 14:27:30
change: Major (3.0.0 > 4.0.0)
Kubernetesd2e7ea85-6b44-4317-a0be-1b951587f626Kubernetes clusters should not grant CAP_SYS_ADMIN security capabilitiesTo reduce the attack surface of your containers, restrict CAP_SYS_ADMIN Linux capabilities. For more information, see https://aka.ms/kubepolicydoc. Default: Audit
Allowed: (audit, Audit, deny, Deny, disabled, Disabled)
2021-08-30 14:27:30
change: Major, suffix remains equal (2.1.0-preview > 3.0.0-preview)
Key Vault342e8053-e12e-4c44-be01-c3c2f318400fSecrets should have the specified maximum validity periodManage your organizational compliance requirements by specifying the maximum amount of time in days that a secret can be valid within your key vault. Default: Audit
Allowed: (Audit, Deny, Disabled)
2021-08-30 14:27:30
change: Patch, old suffix: preview (1.0.0-preview > 1.0.1)
Key Vault49a22571-d204-4c91-a7b6-09b1a586fbc9Keys should have the specified maximum validity periodManage your organizational compliance requirements by specifying the maximum amount of time in days that a key can be valid within your key vault. Default: Audit
Allowed: (Audit, Deny, Disabled)
2021-08-30 14:27:30
change: Patch, old suffix: preview (1.0.0-preview > 1.0.1)
Key Vault82067dbb-e53b-4e06-b631-546d197452d9Keys using RSA cryptography should have a specified minimum key sizeSet the minimum allowed key size for use with your key vaults. Use of RSA keys with small key sizes is not a secure practice and doesn't meet many industry certification requirements. Default: Audit
Allowed: (Audit, Deny, Disabled)
2021-08-30 14:27:30
change: Patch, old suffix: preview (1.0.0-preview > 1.0.1)
SQLf4c68484-132f-41f9-9b6d-3e4b1cb55036Configure SQL servers to have auditing enabledTo ensure the operations performed against your SQL assets are captured, SQL servers should have auditing enabled. This is sometimes required for compliance with regulatory standards. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
SQL Security Manager
Storage Account Contributor
2021-08-30 14:27:30
change: Major (2.0.0 > 3.0.0)
Key Vaultf772fb64-8e40-40ad-87bc-7706e1949427[Preview]: Certificates should not expire within the specified number of daysManage certificates that will expire within a specified number of days to ensure your organization has sufficient time to rotate the certificate prior to expiration. Default: Audit
Allowed: (audit, Audit, deny, Deny, disabled, Disabled)
2021-08-30 14:27:30
change: Patch, old suffix: preview (2.0.0-preview > 2.0.1)
Cognitive Servicescddd188c-4b82-4c48-a19d-ddf74ee66a01Cognitive Services should use private linkAzure Private Link lets you connect your virtual networks to Azure services without a public IP address at the source or destination. The Private Link platform handles the connectivity between the consumer and services over the Azure backbone network. By mapping private endpoints to Cognitive Services, you'll reduce the potential for data leakage. Learn more about private links at: https://go.microsoft.com/fwlink/?linkid=2129800. Default: Audit
Allowed: (Audit, Disabled)
2021-08-23 14:26:16
change: Major (1.0.0 > 2.0.0)
Kubernetesa1840de2-8088-4ea8-b153-b4c723e9cb01[Preview]: Azure Kubernetes Service clusters should have Defender profile enabledMicrosoft Defender for Containers provides cloud-native Kubernetes security capabilities including environment hardening, workload protection, and run-time protection. When you enable the SecurityProfile.AzureDefender on your Azure Kubernetes Service cluster, an agent is deployed to your cluster to collect security event data. Learn more about Microsoft Defender for Containers in https://docs.microsoft.com/azure/defender-for-cloud/defender-for-containers-introduction?tabs=defender-for-container-arch-aks Default: Audit
Allowed: (Audit, Disabled)
2021-08-23 14:26:16
add: a1840de2-8088-4ea8-b153-b4c723e9cb01
Cognitive Services037eea7a-bd0a-46c5-9a66-03aea78705d3Cognitive Services accounts should restrict network accessNetwork access to Cognitive Services accounts should be restricted. Configure network rules so only applications from allowed networks can access the Cognitive Services account. To allow connections from specific internet or on-premises clients, access can be granted to traffic from specific Azure virtual networks or to public internet IP address ranges. Default: Audit
Allowed: (Audit, Deny, Disabled)
2021-08-23 14:26:16
change: Major (1.0.0 > 2.0.0)
Cognitive Servicesdb630ad5-52e9-4f4d-9c44-53912fe40053Configure Cognitive Services accounts with private endpointsPrivate endpoints connect your virtual networks to Azure services without a public IP address at the source or destination. By mapping private endpoints to Cognitive Services, you'll reduce the potential for data leakage. Learn more about private links at: https://go.microsoft.com/fwlink/?linkid=2129800. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Network Contributor
Cognitive Services Contributor
2021-08-23 14:26:16
change: Major (1.0.0 > 2.0.0)
Security Center57c2e3f0-98cf-4c3b-aa6b-e8f70726e74e[Preview]: Configure supported Linux virtual machine scale sets to automatically install the Guest Attestation extensionConfigure supported Linux virtual machines scale sets to automatically install the Guest Attestation extension to allow Azure Security Center to proactively attest and monitor the boot integrity. Boot integrity is attested via Remote Attestation. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Virtual Machine Contributor
2021-08-23 14:26:16
change: Major, suffix remains equal (1.0.0-preview > 2.0.0-preview)
SQLc5a62eb0-c65a-4220-8a4d-f70dd4ca95ddConfigure Azure Defender to be enabled on SQL managed instancesEnable Azure Defender on your Azure SQL Managed Instances to detect anomalous activities indicating unusual and potentially harmful attempts to access or exploit databases. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
SQL Security Manager
2021-08-23 14:26:16
change: Major (1.0.0 > 2.0.0)
Cognitive Services0725b4dd-7e76-479c-a735-68e7ee23d5caCognitive Services accounts should disable public network accessDisabling public network access improves security by ensuring that Cognitive Services account isn't exposed on the public internet. Creating private endpoints can limit exposure of Cognitive Services account. Learn more at: https://go.microsoft.com/fwlink/?linkid=2129800. Default: Audit
Allowed: (Audit, Deny, Disabled)
2021-08-23 14:26:16
change: Major (1.0.1 > 2.0.0)
Key Vaultd1d6d8bb-cc7c-420f-8c7d-6f6f5279a844[Preview]: Configure Azure Key Vault Managed HSM with private endpointsPrivate endpoints connect your virtual networks to Azure services without a public IP address at the source or destination. By mapping private endpoints to Azure Key Vault Managed HSM, you can reduce data leakage risks. Learn more at: https://docs.microsoft.com/azure/key-vault/managed-hsm/private-link. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Network Contributor
Managed HSM contributor
2021-08-23 14:26:16
add: d1d6d8bb-cc7c-420f-8c7d-6f6f5279a844
Kubernetes64def556-fbad-4622-930e-72d1d5589bf5[Preview]: Configure Azure Kubernetes Service clusters to enable Defender profileMicrosoft Defender for Containers provides cloud-native Kubernetes security capabilities including environment hardening, workload protection, and run-time protection. When you enable the SecurityProfile.AzureDefender on your Azure Kubernetes Service cluster, an agent is deployed to your cluster to collect security event data. Learn more about Microsoft Defender for Containers: https://docs.microsoft.com/azure/defender-for-cloud/defender-for-containers-introduction?tabs=defender-for-container-arch-aks. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Contributor
Log Analytics Contributor
2021-08-23 14:26:16
add: 64def556-fbad-4622-930e-72d1d5589bf5
Security Center95406fc3-1f69-47b0-8105-4c03b276ec5c[Preview]: Configure supported Linux virtual machines to automatically enable Secure BootConfigure supported Linux virtual machines to automatically enable Secure Boot to mitigate against malicious and unauthorized changes to the boot chain. Once enabled, only trusted bootloaders, kernel and kernel drivers will be allowed to run. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Virtual Machine Contributor
2021-08-23 14:26:16
change: Major, suffix remains equal (1.0.0-preview > 2.0.0-preview)
Security Centera21f8c92-9e22-4f09-b759-50500d1d2dda[Preview]: Guest Attestation extension should be installed on supported Linux virtual machines scale setsInstall Guest Attestation extension on supported Linux virtual machines scale sets to allow Azure Security Center to proactively attest and monitor the boot integrity. Once installed, boot integrity will be attested via Remote Attestation. This assessment only applies to trusted launch enabled Linux virtual machine scale sets. Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2021-08-23 14:26:16
change: Major, suffix remains equal (1.0.0-preview > 2.0.0-preview)
Security Center672fe5a1-2fcd-42d7-b85d-902b6e28c6ff[Preview]: Guest Attestation extension should be installed on supported Linux virtual machinesInstall Guest Attestation extension on supported Linux virtual machines to allow Azure Security Center to proactively attest and monitor the boot integrity. Once installed, boot integrity will be attested via Remote Attestation. This assessment only applies to trusted launch enabled Linux virtual machines. Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2021-08-23 14:26:16
change: Major, suffix remains equal (1.0.0-preview > 2.0.0-preview)
Cognitive Services47ba1dd7-28d9-4b07-a8d5-9813bed64e0cConfigure Cognitive Services accounts to disable public network accessDisable public network access for your Cognitive Services resource so that it's not accessible over the public internet. This can reduce data leakage risks. Learn more at: https://go.microsoft.com/fwlink/?linkid=2129800. Default: Modify
Allowed: (Disabled, Modify)
Contributor
2021-08-23 14:26:16
change: Major (1.0.0 > 2.0.0)
Key Vault19ea9d63-adee-4431-a95e-1913c6c1c75f[Preview]: Azure Key Vault Managed HSM should disable public network accessDisable public network access for your Azure Key Vault Managed HSM so that it's not accessible over the public internet. This can reduce data leakage risks. Learn more at: https://docs.microsoft.com/azure/key-vault/managed-hsm/private-link#allow-trusted-services-to-access-managed-hsm. Default: Audit
Allowed: (Audit, Deny, Disabled)
2021-08-23 14:26:16
add: 19ea9d63-adee-4431-a95e-1913c6c1c75f
Security Center5f8eb305-9c9f-4abe-9bb0-df220d9faba2[Preview]: Configure supported Linux virtual machines to automatically install the Azure Security agentConfigure supported Linux virtual machines to automatically install the Azure Security agent. Security Center collects events from the agent and uses them to provide security alerts and tailored hardening tasks (recommendations). Target virtual machines must be in a supported location. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Virtual Machine Contributor
2021-08-23 14:26:16
change: Major, suffix remains equal (3.0.0-preview > 4.0.0-preview)
Storage6fac406b-40ca-413b-bf8e-0bf964659c25Storage accounts should use customer-managed key for encryptionSecure your blob and file storage account with greater flexibility using customer-managed keys. When you specify a customer-managed key, that key is used to protect and control access to the key that encrypts your data. Using customer-managed keys provides additional capabilities to control rotation of the key encryption key or cryptographically erase data. Default: Audit
Allowed: (Audit, Disabled)
2021-08-23 14:26:16
change: Patch (1.0.2 > 1.0.3)
Bot Serviceffea632e-4e3a-4424-bf78-10e179bb2e1aBot Service should have local authentication methods disabledDisabling local authentication methods improves security by ensuring that a bot uses AAD exclusively for authentication. Default: Audit
Allowed: (Audit, Deny, Disabled)
2021-08-23 14:26:16
add: ffea632e-4e3a-4424-bf78-10e179bb2e1a
Security Center6074e9a3-c711-4856-976d-24d51f9e065b[Preview]: Configure supported Linux virtual machines to automatically install the Guest Attestation extensionConfigure supported Linux virtual machines to automatically install the Guest Attestation extension to allow Azure Security Center to proactively attest and monitor the boot integrity. Boot integrity is attested via Remote Attestation. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Virtual Machine Contributor
2021-08-23 14:26:16
change: Major, suffix remains equal (1.0.0-preview > 2.0.0-preview)
Key Vault59fee2f4-d439-4f1b-9b9a-982e1474bfd8[Preview]: Azure Key Vault Managed HSM should use private linkPrivate link provides a way to connect Azure Key Vault Managed HSM to your Azure resources without sending traffic over the public internet. Private link provides defense in depth protection against data exfiltration. Learn more at: https://docs.microsoft.com/azure/key-vault/managed-hsm/private-link Default: Audit
Allowed: (Audit, Disabled)
2021-08-23 14:26:16
add: 59fee2f4-d439-4f1b-9b9a-982e1474bfd8
Storagebfecdea6-31c4-4045-ad42-71b9dc87247dStorage account encryption scopes should use double encryption for data at restEnable infrastructure encryption for encryption at rest of your storage account encryption scopes for added security. Infrastructure encryption ensures that your data is encrypted twice. Default: Audit
Allowed: (Audit, Deny, Disabled)
2021-08-23 14:26:16
add: bfecdea6-31c4-4045-ad42-71b9dc87247d
Monitoring0fc55270-f8bf-4feb-b7b8-5e7e7eacc6a6Azure Monitor Private Link Scope should use private linkAzure Private Link lets you connect your virtual networks to Azure services without a public IP address at the source or destination. The Private Link platform handles the connectivity between the consumer and services over the Azure backbone network. By mapping private endpoints to Azure Monitor Private Links Scope, you can reduce data leakage risks. Learn more about private links at: https://docs.microsoft.com/azure/azure-monitor/logs/private-link-security.n/an/a
2021-08-16 16:08:10
remove: 0fc55270-f8bf-4feb-b7b8-5e7e7eacc6a6 (i)
Kubernetesfebd0533-8e55-448f-b837-bd0e06f16469Kubernetes cluster containers should only use allowed imagesUse images from trusted registries to reduce the Kubernetes cluster's exposure risk to unknown vulnerabilities, security issues and malicious images. This policy is generally available for Kubernetes Service (AKS), and preview for AKS Engine and Azure Arc enabled Kubernetes. For more information, see https://aka.ms/kubepolicydoc. Default: Deny
Allowed: (audit, Audit, deny, Deny, disabled, Disabled)
2021-08-13 17:07:49
change: Major (6.1.0 > 7.0.0)
Kubernetes9f061a12-e40d-4183-a00e-171812443373Kubernetes clusters should not use the default namespacePrevent usage of the default namespace in Kubernetes clusters to protect against unauthorized access for ConfigMap, Pod, Secret, Service, and ServiceAccount resource types. For more information, see https://aka.ms/kubepolicydoc. Default: Audit
Allowed: (audit, Audit, deny, Deny, disabled, Disabled)
2021-08-13 17:07:49
change: Minor, suffix remains equal (2.0.0-preview > 2.1.0-preview)
SQL0a370ff3-6cab-4e85-8995-295fd854c5b8SQL servers should use customer-managed keys to encrypt data at restImplementing Transparent Data Encryption (TDE) with your own key provides increased transparency and control over the TDE Protector, increased security with an HSM-backed external service, and promotion of separation of duties. This recommendation applies to organizations with a related compliance requirement. Default: Audit
Allowed: (Audit, Deny, Disabled)
2021-08-13 17:07:49
add: 0a370ff3-6cab-4e85-8995-295fd854c5b8
SQL78215662-041e-49ed-a9dd-5385911b3a1fAzure SQL Managed Instance should have Azure Active Directory Only Authentication enabledDisabling local authentication methods and allowing only Azure Active Directory Authentication improves security by ensuring that Azure SQL Managed Instances can exclusively be accessed by Azure Active Directory identities. Learn more at: aka.ms/adonlycreate. Default: Audit
Allowed: (Audit, Deny, Disabled)
2021-08-13 17:07:49
add: 78215662-041e-49ed-a9dd-5385911b3a1f
SQLabda6d70-9778-44e7-84a8-06713e6db027Azure SQL Database should have Azure Active Directory Only Authentication enabledDisabling local authentication methods and allowing only Azure Active Directory Authentication improves security by ensuring that Azure SQL Databases can exclusively be accessed by Azure Active Directory identities. Learn more at: aka.ms/adonlycreate. Default: Audit
Allowed: (Audit, Deny, Disabled)
2021-08-13 17:07:49
add: abda6d70-9778-44e7-84a8-06713e6db027
Media Services8bfe3603-0888-404a-87ff-5c1b6b4cc5e3Azure Media Services accounts should disable public network accessDisabling public network access improves security by ensuring that Media Services resources are not exposed on the public internet. Creating private endpoints can limit exposure of Media Services resources. Learn more at: https://aka.ms/mediaservicesprivatelinkdocs. Default: Audit
Allowed: (Audit, Deny, Disabled)
2021-08-13 17:07:49
add: 8bfe3603-0888-404a-87ff-5c1b6b4cc5e3
SQLac01ad65-10e5-46df-bdd9-6b0cad13e1d2SQL managed instances should use customer-managed keys to encrypt data at restImplementing Transparent Data Encryption (TDE) with your own key provides you with increased transparency and control over the TDE Protector, increased security with an HSM-backed external service, and promotion of separation of duties. This recommendation applies to organizations with a related compliance requirement. Default: Audit
Allowed: (Audit, Deny, Disabled)
2021-08-13 17:07:49
add: ac01ad65-10e5-46df-bdd9-6b0cad13e1d2
Batch4dbc2f5c-51cf-4e38-9179-c7028eed2274Configure Batch accounts to disable local authenticationDisable location authentication methods so that your Batch accounts require Azure Active Directory identities exclusively for authentication. Learn more at: https://aka.ms/batch/auth. Default: Modify
Allowed: (Modify, Disabled)
Contributor
2021-08-09 19:32:42
add: 4dbc2f5c-51cf-4e38-9179-c7028eed2274
Batch1760f9d4-7206-436e-a28f-d9f3a5c8a227Azure Batch pools should have disk encryption enabledEnabling Azure Batch disk encryption ensures that data is always encrypted at rest on your Azure Batch compute node. Learn more about disk encryption in Batch at https://docs.microsoft.com/azure/batch/disk-encryption. Default: Audit
Allowed: (Audit, Disabled, Deny)
2021-08-09 19:32:42
add: 1760f9d4-7206-436e-a28f-d9f3a5c8a227
Batch6f68b69f-05fe-49cd-b361-777ee9ca7e35Batch accounts should have local authentication methods disabledDisabling local authentication methods improves security by ensuring that Batch accounts require Azure Active Directory identities exclusively for authentication. Learn more at: https://aka.ms/batch/auth. Default: Audit
Allowed: (Audit, Deny, Disabled)
2021-08-09 19:32:42
add: 6f68b69f-05fe-49cd-b361-777ee9ca7e35
Container Registry524b0254-c285-4903-bee6-bb8126cde579Container registries should have exports disabledDisabling exports improves security by ensuring data in a registry is accessed solely via the dataplane ('docker pull'). Data cannot be moved out of the registry via 'acr import' or via 'acr transfer'. In order to disable exports, public network access must be disabled. Learn more at: https://aka.ms/acr/export-policy. Default: Audit
Allowed: (Audit, Deny, Disabled)
2021-08-09 19:32:42
add: 524b0254-c285-4903-bee6-bb8126cde579
Kubernetes993c2fcd-2b29-49d2-9eb0-df2c3a730c32Azure Kubernetes Service Clusters should have local authentication methods disabledDisabling local authentication methods improves security by ensuring that Azure Kubernetes Service Clusters should exclusively require Azure Active Directory identities for authentication. Learn more at: https://aka.ms/aks-disable-local-accounts. Default: Audit
Allowed: (Audit, Deny, Disabled)
2021-08-09 19:32:42
add: 993c2fcd-2b29-49d2-9eb0-df2c3a730c32
SQLfd2d1a6e-6d95-4df2-ad00-504bf0273406Configure Arc-enabled machines running SQL Server to have SQL Server extension installed.To ensure that SQL Server - Azure Arc resources are created by default when SQL Server instance is found on Azure Arc enabled Windows Server, the latter should have SQL Server extension installed and the server's managed identity should be configured with Azure Connected SQL Server Onboarding role Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Log Analytics Contributor
User Access Administrator
2021-08-09 19:32:42
add: fd2d1a6e-6d95-4df2-ad00-504bf0273406
SignalRf70eecba-335d-4bbc-81d5-5b17b03d498fAzure SignalR Service should have local authentication methods disabledDisabling local authentication methods improves security by ensuring that Azure SignalR Service exclusively require Azure Active Directory identities for authentication. Default: Audit
Allowed: (Audit, Deny, Disabled)
2021-08-09 19:32:42
add: f70eecba-335d-4bbc-81d5-5b17b03d498f
Machine Learning1d413020-63de-11ea-bc55-0242ac130003[Preview]: Configure log filter expressions and datastore to be used for full logs for specified Azure Machine Learning computesProvide log filter expression and datastore to be used for full logs in specified Azure Machine Learning computes and can be assigned at the workspace. For more information, visit https://aka.ms/amlpolicydoc. Default: enforceSetting
Allowed: (enforceSetting, disabled)
2021-08-02 15:58:22
change: Major, suffix remains equal (2.0.0-preview > 3.0.0-preview)
Machine Learning6a6f7384-63de-11ea-bc55-0242ac130003[Preview]: Configure code signing for training code for specified Azure Machine Learning computesProvide code signing for training code in specified Azure Machine Learning computes and can be assigned at the workspace. For more information, visit https://aka.ms/amlpolicydoc. Default: enforceSetting
Allowed: (enforceSetting, disabled)
2021-08-02 15:58:22
change: Major, suffix remains equal (2.1.0-preview > 3.1.0-preview)
Machine Learning5853517a-63de-11ea-bc55-0242ac130003[Preview]: Configure allowed registries for specified Azure Machine Learning computesProvide registries that are allowed in specified Azure Machine Learning computes and can be assigned at the workspace. For more information, visit https://aka.ms/amlpolicydoc. Default: enforceSetting
Allowed: (enforceSetting, disabled)
2021-08-02 15:58:22
change: Major, suffix remains equal (2.0.0-preview > 3.0.0-preview)
Machine Learning53c70b02-63dd-11ea-bc55-0242ac130003[Preview]: Configure allowed module authors for specified Azure Machine Learning computesProvide allowed module authors in specified Azure Machine Learning computes and can be assigned at the workspace. For more information, visit https://aka.ms/amlpolicydoc. Default: enforceSetting
Allowed: (enforceSetting, disabled)
2021-08-02 15:58:22
change: Major, suffix remains equal (2.1.0-preview > 3.0.0-preview)
Machine Learning3948394e-63de-11ea-bc55-0242ac130003[Preview]: Configure an approval endpoint called prior to jobs running for specified Azure Machine Learning computesConfigure an approval endpoint called prior to jobs running for specified Azure Machine Learning computes and can be assigned at the workspace. For more information. For more information, visit https://aka.ms/amlpolicydoc. Default: enforceSetting
Allowed: (enforceSetting, disabled)
2021-08-02 15:58:22
change: Major, suffix remains equal (2.1.0-preview > 3.0.0-preview)
Machine Learning77eeea86-7e81-4a7d-9067-de844d096752[Preview]: Configure allowed Python packages for specified Azure Machine Learning computesProvide allowed Python packages in specified Azure Machine Learning computes and can be assigned at the workspace. For more information, visit https://aka.ms/amlpolicydoc. Default: enforceSetting
Allowed: (enforceSetting, disabled)
2021-08-02 15:58:22
change: Major, suffix remains equal (2.0.0-preview > 3.0.0-preview)
Security Center509122b9-ddd9-47ba-a5f1-d0dac20be63cDeploy Workflow Automation for Azure Security Center regulatory complianceEnable automation of Azure Security Center regulatory compliance. This policy deploys a workflow automation with your conditions and triggers on the assigned scope. To deploy this policy on newly created subscriptions, open the Compliance tab, select the relevant non-compliant assignment and create a remediation task. Fixed: deployIfNotExistsContributor
2021-07-30 15:17:20
change: Major (3.0.0 > 4.0.0)
Monitoringdeacecc0-9f84-44d2-bb82-46f32d766d43Configure Dependency agent on Azure Arc enabled Linux serversEnable VM insights on servers and machines connected to Azure through Arc enabled servers by installing the Dependency agent virtual machine extension. VM insights uses the Dependency agent to collect network metrics and discovered data about processes running on the machine and external process dependencies. See more - https://aka.ms/vminsightsdocs. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Log Analytics Contributor
2021-07-30 15:17:20
change: Major (1.2.0 > 2.0.0)
Monitoring9d2b61b4-1d14-4a63-be30-d4498e7ad2cfConfigure Log Analytics extension on Azure Arc enabled Linux serversEnable VM insights on servers and machines connected to Azure through Arc enabled servers by installing the Log Analytics virtual machine extension. VM insights uses the Log Analytics agent to collect the guest OS performance data, and provides insights into their performance. See more - https://aka.ms/vminsightsdocs. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Log Analytics Contributor
2021-07-30 15:17:20
change: Major (1.2.0 > 2.0.0)
Security Center50ea7265-7d8c-429e-9a7d-ca1f410191c3Configure Azure Defender for SQL servers on machines to be enabledAzure Defender for SQL provides functionality for surfacing and mitigating potential database vulnerabilities, detecting anomalous activities that could indicate threats to SQL databases, and discovering and classifying sensitive data. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Security Admin
2021-07-30 15:17:20
add: 50ea7265-7d8c-429e-9a7d-ca1f410191c3
Security Center74c30959-af11-47b3-9ed2-a26e03f427a3Configure Azure Defender for Storage to be enabledAzure Defender for Storage provides detections of unusual and potentially harmful attempts to access or exploit storage accounts. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Security Admin
2021-07-30 15:17:20
add: 74c30959-af11-47b3-9ed2-a26e03f427a3
Security Centercdfcce10-4578-4ecd-9703-530938e4abcbDeploy export to Event Hub for Azure Security Center dataEnable export to Event Hub of Azure Security Center data. This policy deploys an export to Event Hub configuration with your conditions and target Event Hub on the assigned scope. To deploy this policy on newly created subscriptions, open the Compliance tab, select the relevant non-compliant assignment and create a remediation task. Fixed: deployIfNotExistsContributor
2021-07-30 15:17:20
change: Major (3.0.0 > 4.0.0)
Monitoring91cb9edd-cd92-4d2f-b2f2-bdd8d065a3d4Configure Dependency agent on Azure Arc enabled Windows serversEnable VM insights on servers and machines connected to Azure through Arc enabled servers by installing the Dependency agent virtual machine extension. VM insights uses the Dependency agent to collect network metrics and discovered data about processes running on the machine and external process dependencies. See more - https://aka.ms/vminsightsdocs. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Log Analytics Contributor
2021-07-30 15:17:20
change: Major (1.2.1 > 2.0.0)
Security Center2370a3c1-4a25-4283-a91a-c9c1a145fb2fConfigure Azure Defender for DNS to be enabledAzure Defender for DNS provides an additional layer of protection for your cloud resources by continuously monitoring all DNS queries from your Azure resources. Azure Defender alerts you about suspicious activity at the DNS layer. Learn more about the capabilities of Azure Defender for DNS at https://aka.ms/defender-for-dns . Enabling this Azure Defender plan results in charges. Learn about the pricing details per region on Security Center's pricing page: https://aka.ms/pricing-security-center . Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Security Admin
2021-07-30 15:17:20
add: 2370a3c1-4a25-4283-a91a-c9c1a145fb2f
Monitoring69af7d4a-7b18-4044-93a9-2651498ef203Configure Log Analytics extension on Azure Arc enabled Windows serversEnable VM insights on servers and machines connected to Azure through Arc enabled servers by installing the Log Analytics virtual machine extension. VM insights uses the Log Analytics agent to collect the guest OS performance data, and provides insights into their performance. See more - https://aka.ms/vminsightsdocs. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Log Analytics Contributor
2021-07-30 15:17:20
change: Major (1.2.0 > 2.0.0)
Security Center0a9fbe0d-c5c4-4da8-87d8-f4fd77338835Azure Defender for open-source relational databases should be enabledAzure Defender for open-source relational databases detects anomalous activities indicating unusual and potentially harmful attempts to access or exploit databases. Learn more about the capabilities of Azure Defender for open-source relational databases at https://aka.ms/AzDforOpenSourceDBsDocu. Important: Enabling this plan will result in charges for protecting your open-source relational databases. Learn about the pricing on Security Center's pricing page: https://aka.ms/pricing-security-center Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2021-07-30 15:17:20
add: 0a9fbe0d-c5c4-4da8-87d8-f4fd77338835
SQL36d49e87-48c4-4f2e-beed-ba4ed02b71f5Configure Azure Defender to be enabled on SQL serversEnable Azure Defender on your Azure SQL Servers to detect anomalous activities indicating unusual and potentially harmful attempts to access or exploit databases. Fixed: DeployIfNotExistsSQL Security Manager
2021-07-30 15:17:20
change: Minor (2.0.0 > 2.1.0)
Security Center73d6ab6c-2475-4850-afd6-43795f3492efDeploy Workflow Automation for Azure Security Center recommendationsEnable automation of Azure Security Center recommendations. This policy deploys a workflow automation with your conditions and triggers on the assigned scope. To deploy this policy on newly created subscriptions, open the Compliance tab, select the relevant non-compliant assignment and create a remediation task. Fixed: deployIfNotExistsContributor
2021-07-30 15:17:20
change: Major (3.0.0 > 4.0.0)
Azure Edge Hardware Center08a6b96f-576e-47a2-8511-119a212d344dAzure Edge Hardware Center devices should have double encryption support enabledEnsure that devices ordered from Azure Edge Hardware Center have double encryption support enabled, to secure the data at rest on the device. This option adds a second layer of data encryption. Default: Audit
Allowed: (Audit, Deny, Disabled)
2021-07-30 15:17:20
add: 08a6b96f-576e-47a2-8511-119a212d344d
Search76a56461-9dc0-40f0-82f5-2453283afa2fAzure Cognitive Search services should use customer-managed keys to encrypt data at restEnabling encryption at rest using a customer-managed key on your Azure Cognitive Search services provides additional control over the key used to encrypt data at rest. This feature is often applicable to customers with special compliance requirements to manage data encryption keys using a key vault. Default: Audit
Allowed: (Audit, Deny, Disabled)
2021-07-30 15:17:20
add: 76a56461-9dc0-40f0-82f5-2453283afa2f
Security Center133047bf-1369-41e3-a3be-74a11ed1395a[Deprecated]: Configure Azure Defender for Kubernetes to be enabledAzure Defender for Kubernetes provides real-time threat protection for containerized environments and generates alerts for suspicious activities. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Security Admin
2021-07-30 15:17:20
add: 133047bf-1369-41e3-a3be-74a11ed1395a
Security Centerf1525828-9a90-4fcf-be48-268cdd02361eDeploy Workflow Automation for Azure Security Center alertsEnable automation of Azure Security Center alerts. This policy deploys a workflow automation with your conditions and triggers on the assigned scope. To deploy this policy on newly created subscriptions, open the Compliance tab, select the relevant non-compliant assignment and create a remediation task. Fixed: deployIfNotExistsContributor
2021-07-30 15:17:20
change: Major (3.0.0 > 4.0.0)
Storage044985bb-afe1-42cd-8a36-9d5d42424537Storage account keys should not be expiredEnsure the user storage account keys are not expired when key expiration policy is set, for improving security of account keys by taking action when the keys are expired. Default: Audit
Allowed: (Audit, Deny, Disabled)
2021-07-30 15:17:20
change: Major (2.0.0 > 3.0.0)
Security Centerffb6f416-7bd2-4488-8828-56585fef2be9Deploy export to Log Analytics workspace for Azure Security Center dataEnable export to Log Analytics workspace of Azure Security Center data. This policy deploys an export to Log Analytics workspace configuration with your conditions and target workspace on the assigned scope. To deploy this policy on newly created subscriptions, open the Compliance tab, select the relevant non-compliant assignment and create a remediation task. Fixed: deployIfNotExistsContributor
2021-07-30 15:17:20
change: Major (3.0.0 > 4.0.0)
Security Center1f725891-01c0-420a-9059-4fa46cb770b7Configure Azure Defender for Key Vaults to be enabledAzure Defender for Key Vault provides an additional layer of protection and security intelligence by detecting unusual and potentially harmful attempts to access or exploit key vault accounts. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Security Admin
2021-07-30 15:17:20
add: 1f725891-01c0-420a-9059-4fa46cb770b7
Security Centerb7021b2b-08fd-4dc0-9de7-3c6ece09faf9Configure Azure Defender for Resource Manager to be enabledAzure Defender for Resource Manager automatically monitors the resource management operations in your organization. Azure Defender detects threats and alerts you about suspicious activity. Learn more about the capabilities of Azure Defender for Resource Manager at https://aka.ms/defender-for-resource-manager . Enabling this Azure Defender plan results in charges. Learn about the pricing details per region on Security Center's pricing page: https://aka.ms/pricing-security-center . Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Security Admin
2021-07-30 15:17:20
add: b7021b2b-08fd-4dc0-9de7-3c6ece09faf9
SQLf4c68484-132f-41f9-9b6d-3e4b1cb55036Configure SQL servers to have auditing enabledTo ensure the operations performed against your SQL assets are captured, SQL servers should have auditing enabled. This is sometimes required for compliance with regulatory standards. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
SQL Security Manager
Storage Account Contributor
2021-07-30 15:17:20
change: Major (1.2.0 > 2.0.0)
Backupaf783da1-4ad1-42be-800d-d19c70038820[Preview]: Configure Recovery Services vaults to use private DNS zones for backupUse private DNS zones to override the DNS resolution for a private endpoint. A private DNS zone links to your virtual network to resolve to your Recovery Services vault. Learn more at: https://aka.ms/AB-PrivateEndpoints. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Network Contributor
2021-07-30 15:17:20
change: Patch, suffix remains equal (1.0.0-preview > 1.0.1-preview)
Network21a6bc25-125e-4d13-b82d-2e19b7208ab7VPN gateways should use only Azure Active Directory (Azure AD) authentication for point-to-site usersDisabling local authentication methods improves security by ensuring that VPN Gateways use only Azure Active Directory identities for authentication. Learn more about Azure AD authentication at https://docs.microsoft.com/azure/vpn-gateway/openvpn-azure-ad-tenant Default: Audit
Allowed: (Audit, Deny, Disabled)
2021-07-30 15:17:20
add: 21a6bc25-125e-4d13-b82d-2e19b7208ab7
Security Centerd3d1e68e-49d4-4b56-acff-93cef644b432[Deprecated]: Configure Azure Defender for container registries to be enabledAzure Defender for container registries provides vulnerability scanning of any images pulled within the last 30 days, pushed to your registry, or imported, and exposes detailed findings per image. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Security Admin
2021-07-30 15:17:20
add: d3d1e68e-49d4-4b56-acff-93cef644b432
Backupdeeddb44-9f94-4903-9fa0-081d524406e3[Preview]: Azure Recovery Services vaults should use private link for backupAzure Private Link lets you connect your virtual network to Azure services without a public IP address at the source or destination. The Private Link platform handles the connectivity between the consumer and services over the Azure backbone network. By mapping private endpoints to Azure Recovery Services vaults, data leakage risks are reduced. Learn more about private links at: https://aka.ms/AB-PrivateEndpoints. Default: Audit
Allowed: (Audit, Disabled)
2021-07-30 15:17:20
change: Major, suffix remains equal (1.0.0-preview > 2.0.0-preview)
SQLc5a62eb0-c65a-4220-8a4d-f70dd4ca95ddConfigure Azure Defender to be enabled on SQL managed instancesEnable Azure Defender on your Azure SQL Managed Instances to detect anomalous activities indicating unusual and potentially harmful attempts to access or exploit databases. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
SQL Security Manager
2021-07-30 15:17:20
add: c5a62eb0-c65a-4220-8a4d-f70dd4ca95dd
Monitoringd3ba9c42-9dd5-441a-957c-274031c750c0Configure Azure Log Analytics workspaces to disable public network access for log ingestion and queryingImprove workspace security by blocking log ingestion and querying from public networks. Only private-link connected networks will be able to ingest and query logs on this workspace. Learn more at https://aka.ms/AzMonPrivateLink#configure-log-analytics. Default: Modify
Allowed: (Modify, Disabled)
Log Analytics Contributor
2021-07-30 15:17:20
change: Minor (1.0.0 > 1.1.0)
Security Centerb40e7bcd-a1e5-47fe-b9cf-2f534d0bfb7dConfigure Azure Defender for App Service to be enabledAzure Defender for App Service leverages the scale of the cloud, and the visibility that Azure has as a cloud provider, to monitor for common web app attacks. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Security Admin
2021-07-30 15:17:20
add: b40e7bcd-a1e5-47fe-b9cf-2f534d0bfb7d
Security Centerb99b73e7-074b-4089-9395-b7236f094491Configure Azure Defender for Azure SQL database to be enabledAzure Defender for SQL provides functionality for surfacing and mitigating potential database vulnerabilities, detecting anomalous activities that could indicate threats to SQL databases, and discovering and classifying sensitive data. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Security Admin
2021-07-30 15:17:20
add: b99b73e7-074b-4089-9395-b7236f094491
Security Center8e86a5b6-b9bd-49d1-8e21-4bb8a0862222Configure Azure Defender for servers to be enabledAzure Defender for servers provides real-time threat protection for server workloads and generates hardening recommendations as well as alerts about suspicious activities. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Security Admin
2021-07-30 15:17:20
add: 8e86a5b6-b9bd-49d1-8e21-4bb8a0862222
SQL86a912f6-9a06-4e26-b447-11b16ba8659fDeploy SQL DB transparent data encryptionEnables transparent data encryption on SQL databases Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
SQL DB Contributor
2021-07-16 14:58:38
change: Major (1.0.0 > 2.0.0)
SQL17k78e20-9358-41c9-923c-fb736d382a12Transparent Data Encryption on SQL databases should be enabledTransparent data encryption should be enabled to protect data-at-rest and meet compliance requirements Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2021-07-16 14:58:38
change: Major (1.0.0 > 2.0.0)
Cache5d8094d7-7340-465a-b6fd-e60ab7e48920Configure Azure Cache for Redis with private endpointsPrivate endpoints let you connect your virtual network to Azure services without a public IP address at the source or destination. By mapping private endpoints to your Azure Cache for Redis resources, you can reduce data leakage risks. Learn more at: https://aka.ms/redis/privateendpoint. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Redis Cache Contributor
2021-07-15 16:24:53
add: 5d8094d7-7340-465a-b6fd-e60ab7e48920
Security Center0961003e-5a0a-4549-abde-af6a37f2724dVirtual machines should encrypt temp disks, caches, and data flows between Compute and Storage resourcesBy default, a virtual machine's OS and data disks are encrypted-at-rest using platform-managed keys. Temp disks, data caches and data flowing between compute and storage aren't encrypted. Disregard this recommendation if: 1. using encryption-at-host, or 2. server-side encryption on Managed Disks meets your security requirements. Learn more in: Server-side encryption of Azure Disk Storage: https://aka.ms/disksse, Different disk encryption offerings: https://aka.ms/diskencryptioncomparison Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2021-07-15 16:24:53
change: Patch (2.0.0 > 2.0.1)
Monitoringdddfa1af-dcd6-42f4-b5b0-e1db01e0b405Configure Azure Application Insights components to disable public network access for log ingestion and queryingDisable components log ingestion and querying from public networks access to improve security. Only private-link connected networks will be able to ingest and query logs on this workspace. Learn more at https://aka.ms/AzMonPrivateLink#configure-application-insights. Default: Modify
Allowed: (Modify, Disabled)
Application Insights Component Contributor
2021-07-15 16:24:53
change: Minor (1.0.0 > 1.1.0)
Cosmos DB862e97cf-49fc-4a5c-9de4-40d4e2e7c8ebAzure Cosmos DB accounts should have firewall rulesFirewall rules should be defined on your Azure Cosmos DB accounts to prevent traffic from unauthorized sources. Accounts that have at least one IP rule defined with the virtual network filter enabled are deemed compliant. Accounts disabling public access are also deemed compliant. Default: Deny
Allowed: (Audit, Deny, Disabled)
2021-07-15 16:24:53
change: Major (1.0.1 > 2.0.0)
Cosmos DB5450f5bd-9c72-4390-a9c4-a7aba4edfdd2Cosmos DB database accounts should have local authentication methods disabledDisabling local authentication methods improves security by ensuring that Cosmos DB database accounts exclusively require Azure Active Directory identities for authentication. Learn more at: https://docs.microsoft.com/azure/cosmos-db/how-to-setup-rbac#disable-local-auth. Default: Audit
Allowed: (Audit, Deny, Disabled)
2021-07-07 15:26:31
add: 5450f5bd-9c72-4390-a9c4-a7aba4edfdd2
Security Centerc3d20c29-b36d-48fe-808b-99a87530ad99Azure Defender for Resource Manager should be enabledAzure Defender for Resource Manager automatically monitors the resource management operations in your organization. Azure Defender detects threats and alerts you about suspicious activity. Learn more about the capabilities of Azure Defender for Resource Manager at https://aka.ms/defender-for-resource-manager . Enabling this Azure Defender plan results in charges. Learn about the pricing details per region on Security Center's pricing page: https://aka.ms/pricing-security-center . Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2021-07-07 15:26:31
change: Version remains equal, old suffix: preview (1.0.0-preview > 1.0.0)
App Service687aa49d-0982-40f8-bf6b-66d1da97a04bApp Service should use private linkAzure Private Link lets you connect your virtual networks to Azure services without a public IP address at the source or destination. The Private Link platform handles the connectivity between the consumer and services over the Azure backbone network. By mapping private endpoints to App Service, you can reduce data leakage risks. Learn more about private links at: https://aka.ms/private-link. Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2021-07-07 15:26:31
add: 687aa49d-0982-40f8-bf6b-66d1da97a04b
Media Servicesc5632066-946d-4766-9544-cd79bcc1286eConfigure Azure Media Services with private endpointsPrivate endpoints connect your virtual networks to Azure services without a public IP address at the source or destination. By mapping private endpoints to Media Services, you can reduce data leakage risks. Learn more about private links at: https://aka.ms/mediaservicesprivatelinkdocs. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Network Contributor
Media Services Account Administrator
2021-07-07 15:26:31
add: c5632066-946d-4766-9544-cd79bcc1286e
Monitoring437914ee-c176-4fff-8986-7e05eb971365Configure Azure Monitor Private Link Scope to use private DNS zonesUse private DNS zones to override the DNS resolution for a private endpoint. A private DNS zone links to your virtual network to resolve to Azure Monitor private link scope. Learn more at: https://docs.microsoft.com/azure/azure-monitor/logs/private-link-security#connect-to-a-private-endpoint. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Network Contributor
2021-07-07 15:26:31
add: 437914ee-c176-4fff-8986-7e05eb971365
Media Servicesb4a7f6c1-585e-4177-ad5b-c2c93f4bb991Configure Azure Media Services to use private DNS zonesUse private DNS zones to override the DNS resolution for a private endpoint. A private DNS zone links to your virtual network to resolve to Media Services account. Learn more at: https://aka.ms/mediaservicesprivatelinkdocs. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Network Contributor
2021-07-07 15:26:31
add: b4a7f6c1-585e-4177-ad5b-c2c93f4bb991
App Service546fe8d2-368d-4029-a418-6af48a7f61e5App Service apps should use a SKU that supports private linkWith supported SKUs, Azure Private Link lets you connect your virtual network to Azure services without a public IP address at the source or destination. The Private Link platform handles the connectivity between the consumer and services over the Azure backbone network. By mapping private endpoints to apps, you can reduce data leakage risks. Learn more about private links at: https://aka.ms/private-link. Default: Audit
Allowed: (Audit, Deny, Disabled)
2021-07-07 15:26:31
add: 546fe8d2-368d-4029-a418-6af48a7f61e5
Cosmos DBdc2d41d1-4ab1-4666-a3e1-3d51c43e0049Configure Cosmos DB database accounts to disable local authenticationDisable local authentication methods so that your Cosmos DB database accounts exclusively require Azure Active Directory identities for authentication. Learn more at: https://docs.microsoft.com/azure/cosmos-db/how-to-setup-rbac#disable-local-auth. Default: Modify
Allowed: (Modify, Disabled)
DocumentDB Account Contributor
2021-07-07 15:26:31
add: dc2d41d1-4ab1-4666-a3e1-3d51c43e0049
Monitoringdddfa1af-dcd6-42f4-b5b0-e1db01e0b405Configure Azure Application Insights components to disable public network access for log ingestion and queryingDisable components log ingestion and querying from public networks access to improve security. Only private-link connected networks will be able to ingest and query logs on this workspace. Learn more at https://aka.ms/AzMonPrivateLink#configure-application-insights. Default: Modify
Allowed: (Modify, Disabled)
Application Insights Component Contributor
2021-07-07 15:26:31
add: dddfa1af-dcd6-42f4-b5b0-e1db01e0b405
Event Hub836cd60e-87f3-4e6a-a27c-29d687f01a4cEvent Hub namespaces should have double encryption enabledEnabling double encryption helps protect and safeguard your data to meet your organizational security and compliance commitments. When double encryption has been enabled, data in the storage account is encrypted twice, once at the service level and once at the infrastructure level, using two different encryption algorithms and two different keys. Default: Audit
Allowed: (Audit, Deny, Disabled)
2021-07-07 15:26:31
add: 836cd60e-87f3-4e6a-a27c-29d687f01a4c
Monitoringe8185402-357b-4768-8058-f620bc0ae6b5Configure Azure Monitor Private Link Scopes with private endpointsPrivate endpoints connect your virtual networks to Azure services without a public IP address at the source or destination. By mapping private endpoints to Azure Monitor Private Link Scopes, you can reduce data leakage risks. Learn more about private links at: https://docs.microsoft.com/azure/azure-monitor/logs/private-link-security. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Contributor
2021-07-07 15:26:31
add: e8185402-357b-4768-8058-f620bc0ae6b5
Media Services4a591bf5-918e-4a5f-8dad-841863140d61Azure Media Services should use private linkAzure Private Link lets you connect your virtual networks to Azure services without a public IP address at the source or destination. The Private Link platform handles the connectivity between the consumer and services over the Azure backbone network. By mapping private endpoints to Media Services, you can reduce data leakage risks. Learn more about private links at: https://aka.ms/mediaservicesprivatelinkdocs. Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2021-07-07 15:26:31
add: 4a591bf5-918e-4a5f-8dad-841863140d61
Storage044985bb-afe1-42cd-8a36-9d5d42424537Storage account keys should not be expiredEnsure the user storage account keys are not expired when key expiration policy is set, for improving security of account keys by taking action when the keys are expired. Default: Audit
Allowed: (Audit, Deny, Disabled)
2021-07-07 15:26:31
change: Major (1.0.0 > 2.0.0)
Monitoringd3ba9c42-9dd5-441a-957c-274031c750c0Configure Azure Log Analytics workspaces to disable public network access for log ingestion and queryingImprove workspace security by blocking log ingestion and querying from public networks. Only private-link connected networks will be able to ingest and query logs on this workspace. Learn more at https://aka.ms/AzMonPrivateLink#configure-log-analytics. Default: Modify
Allowed: (Modify, Disabled)
Log Analytics Contributor
2021-07-07 15:26:31
add: d3ba9c42-9dd5-441a-957c-274031c750c0
Monitoring0fc55270-f8bf-4feb-b7b8-5e7e7eacc6a6Azure Monitor Private Link Scope should use private linkAzure Private Link lets you connect your virtual networks to Azure services without a public IP address at the source or destination. The Private Link platform handles the connectivity between the consumer and services over the Azure backbone network. By mapping private endpoints to Azure Monitor Private Links Scope, you can reduce data leakage risks. Learn more about private links at: https://docs.microsoft.com/azure/azure-monitor/logs/private-link-security. Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2021-07-07 15:26:31
add: 0fc55270-f8bf-4feb-b7b8-5e7e7eacc6a6
Service Busebaf4f25-a4e8-415f-86a8-42d9155bef0bService Bus namespaces should have double encryption enabledEnabling double encryption helps protect and safeguard your data to meet your organizational security and compliance commitments. When double encryption has been enabled, data in the storage account is encrypted twice, once at the service level and once at the infrastructure level, using two different encryption algorithms and two different keys. Default: Audit
Allowed: (Audit, Deny, Disabled)
2021-07-07 15:26:31
add: ebaf4f25-a4e8-415f-86a8-42d9155bef0b
Monitoring199d5677-e4d9-4264-9465-efe1839c06bdApplication Insights components should block non-Azure Active Directory based ingestion.Enforcing log ingestion to require Azure Active Directory authentication prevents unauthenticated logs from an attacker which could lead to incorrect status, false alerts, and incorrect logs stored in the system. Default: Audit
Allowed: (Deny, Audit, Disabled)
2021-06-22 14:29:30
add: 199d5677-e4d9-4264-9465-efe1839c06bd
Key Vault951af2fa-529b-416e-ab6e-066fd85ac459Deploy - Configure diagnostic settings for Azure Key Vault to Log Analytics workspaceDeploys the diagnostic settings for Azure Key Vault to stream resource logs to a Log Analytics workspace when any Key Vault which is missing this diagnostic settings is created or updated. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Monitoring Contributor
Log Analytics Contributor
2021-06-22 14:29:30
change: Patch (1.0.0 > 1.0.1)
App Serviceb318f84a-b872-429b-ac6d-a01b96814452Configure App Services to use private DNS zonesUse private DNS zones to override the DNS resolution for a private endpoint. A private DNS zone links a virtual network to an App Service. Learn more at: https://docs.microsoft.com/azure/app-service/networking/private-endpoint#dns. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Network Contributor
2021-06-22 14:29:30
add: b318f84a-b872-429b-ac6d-a01b96814452
Network235359c5-7c52-4b82-9055-01c75cf9f60e[Deprecated]: Service Bus should use a virtual network service endpointThis policy audits any Service Bus not configured to use a virtual network service endpoint. The resource type Microsoft.ServiceBus/namespaces/virtualNetworkRules is deprecated in the latest API version. Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2021-06-22 14:29:30
change: Version remains equal, new suffix: deprecated (1.0.0 > 1.0.0-deprecated)
App Service63a0ac64-5d5f-4569-8a3d-df67cc1ce9d7App Services should disable public network accessDisabling public network access improves security by ensuring that the App Service is not exposed on the public internet. Creating private endpoints can limit exposure of an App Service. Learn more at: https://aka.ms/app-service-private-endpoint. Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2021-06-22 14:29:30
add: 63a0ac64-5d5f-4569-8a3d-df67cc1ce9d7
App Service81dff7c0-4020-4b58-955d-c076a2136b56Configure App Services to disable public network accessDisable public network access for your App Services so that it is not accessible over the public internet. This can reduce data leakage risks. Learn more at: https://aka.ms/app-service-private-endpoint. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Website Contributor
2021-06-22 14:29:30
add: 81dff7c0-4020-4b58-955d-c076a2136b56
Monitoringe15effd4-2278-4c65-a0da-4d6f6d1890e2Log Analytics Workspaces should block non-Azure Active Directory based ingestion.Enforcing log ingestion to require Azure Active Directory authentication prevents unauthenticated logs from an attacker which could lead to incorrect status, false alerts, and incorrect logs stored in the system. Default: Audit
Allowed: (Deny, Audit, Disabled)
2021-06-22 14:29:30
add: e15effd4-2278-4c65-a0da-4d6f6d1890e2
App Service91a78b24-f231-4a8a-8da9-02c35b2b6510Resource logs in App Services should be enabledAudit enabling of resource logs on the app. This enables you to recreate activity trails for investigation purposes if a security incident occurs or your network is compromised. Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2021-06-22 14:29:30
change: Major (2.0.0 > 1.0.0)
Monitoring8e3e61b3-0b32-22d5-4edf-55f87fdb5955Configure Log Analytics workspace and automation account to centralize logs and monitoringDeploy resource group containing Log Analytics workspace and linked automation account to centralize logs and monitoring. The automation account is aprerequisite for solutions like Updates and Change Tracking. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, AuditIfNotExists, Disabled)
Contributor
2021-06-22 14:29:30
add: 8e3e61b3-0b32-22d5-4edf-55f87fdb5955
Security Center5f8eb305-9c9f-4abe-9bb0-df220d9faba2[Preview]: Configure supported Linux virtual machines to automatically install the Azure Security agentConfigure supported Linux virtual machines to automatically install the Azure Security agent. Security Center collects events from the agent and uses them to provide security alerts and tailored hardening tasks (recommendations). Target virtual machines must be in a supported location. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Virtual Machine Contributor
2021-06-22 14:29:30
change: Major, suffix remains equal (2.0.0-preview > 3.0.0-preview)
App Service72d04c29-f87d-4575-9731-419ff16a2757App Service Apps should be injected into a virtual networkInjecting App Service Apps in a virtual network unlocks advanced App Service networking and security features and provides you with greater control over your network security configuration. Learn more at: https://docs.microsoft.com/azure/app-service/web-sites-integrate-with-vnet. Default: Audit
Allowed: (Audit, Deny, Disabled)
2021-06-22 14:29:30
add: 72d04c29-f87d-4575-9731-419ff16a2757
Storage8c6a50c6-9ffd-4ae7-986f-5fa6111f9a54Storage accounts should prevent shared key accessAudit requirement of Azure Active Directory (Azure AD) to authorize requests for your storage account. By default, requests can be authorized with either Azure Active Directory credentials, or by using the account access key for Shared Key authorization. Of these two types of authorization, Azure AD provides superior security and ease of use over Shared Key, and is recommended by Microsoft. Default: Audit
Allowed: (Audit, Deny, Disabled)
2021-06-22 14:29:30
add: 8c6a50c6-9ffd-4ae7-986f-5fa6111f9a54
App Service817dcf37-e83d-4999-a472-644eada2ea1eApp Service Environment should be configured with strongest TLS Cipher suitesThe two most minimal and strongest cipher suites required for App Service Environment to function correctly are : TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 and TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256. Default: Audit
Allowed: (Audit, Disabled)
2021-06-22 14:29:30
add: 817dcf37-e83d-4999-a472-644eada2ea1e
App Service2d048aca-6479-4923-88f5-e2ac295d9af3App Service Environment apps should not be reachable over public internetTo ensure apps deployed in an App Service Environment are not accessible over public internet, one should deploy App Service Environment with an IP address in virtual network. To set the IP address to a virtual network IP, the App Service Environment must be deployed with an internal load balancer. Default: Audit
Allowed: (Audit, Deny, Disabled)
2021-06-22 14:29:30
add: 2d048aca-6479-4923-88f5-e2ac295d9af3
Security Center1537496a-b1e8-482b-a06a-1cc2415cdc7b[Preview]: Configure supported Windows machines to automatically install the Azure Security agentConfigure supported Windows machines to automatically install the Azure Security agent. Security Center collects events from the agent and uses them to provide security alerts and tailored hardening tasks (recommendations). Target virtual machines must be in a supported location. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Virtual Machine Contributor
2021-06-22 14:29:30
change: Major, suffix remains equal (2.0.0-preview > 3.0.0-preview)
App Serviceeb4d34ab-0929-491c-bbf3-61e13da19f9aApp Service Environment should be provisioned with latest versionsOnly allow App Service Environment version 2 or version 3 to be provisioned. Older versions of App Service Environment require manual management of Azure resources and have greater scaling limitations. Default: Audit
Allowed: (Audit, Deny, Disabled)
2021-06-22 14:29:30
add: eb4d34ab-0929-491c-bbf3-61e13da19f9a
Monitoring0c4bd2e8-8872-4f37-a654-03f6f38ddc76Application Insights components with Private Link enabled should use Bring Your Own Storage accounts for profiler and debugger.To support private link and customer-managed key policies, create your own storage account for profiler and debugger. Learn more in https://docs.microsoft.com/azure/azure-monitor/app/profiler-bring-your-own-storage Default: Audit
Allowed: (Deny, Audit, Disabled)
2021-06-22 14:29:30
add: 0c4bd2e8-8872-4f37-a654-03f6f38ddc76
Security Center8b5ad9ab-3d44-4a6e-9ac3-75b04ea5fd28[Preview]: Configure machines to automatically create the Azure Security Center pipeline for Azure Monitor AgentConfigure machines to automatically create the Azure Security Center pipeline for Azure Monitor Agent. Security Center collects events from the agent and uses them to provide security alerts and tailored hardening tasks (recommendations). Create a resource group and Log Analytics workspace in the same region as the machine to store audit records. Target virtual machines must be in a supported location. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Contributor
2021-06-22 14:29:30
add: 8b5ad9ab-3d44-4a6e-9ac3-75b04ea5fd28
App Serviced79ab062-dffd-4318-8344-f70de714c0bc[Deprecated]: App Service should disable public network accessDisabling public network access improves security by ensuring that the app service is not exposed on the public internet. Creating private endpoints can limit exposure of the app service. Learn more at: https://aka.ms/app-service-private-endpoint. Default: Audit
Allowed: (Audit, Disabled)
2021-06-22 14:29:30
change: Version remains equal, new suffix: deprecated (1.0.0 > 1.0.0-deprecated)
Service Busf8d36e2f-389b-4ee4-898d-21aeb69a0f45Resource logs in Service Bus should be enabledAudit enabling of resource logs. This enables you to recreate activity trails to use for investigation purposes; when a security incident occurs or when your network is compromised Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2021-06-17 14:24:41
change: Major (4.0.1 > 5.0.0)
Batch428256e6-1fac-4f48-a757-df34c2b3336dResource logs in Batch accounts should be enabledAudit enabling of resource logs. This enables you to recreate activity trails to use for investigation purposes; when a security incident occurs or when your network is compromised Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2021-06-17 14:24:41
change: Major (4.0.1 > 5.0.0)
Searchb4330a05-a843-4bc8-bf9a-cacce50c67f4Resource logs in Search services should be enabledAudit enabling of resource logs. This enables you to recreate activity trails to use for investigation purposes; when a security incident occurs or when your network is compromised Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2021-06-17 14:24:41
change: Major (4.0.1 > 5.0.0)
Event Hub83a214f7-d01a-484b-91a9-ed54470c9a6aResource logs in Event Hub should be enabledAudit enabling of resource logs. This enables you to recreate activity trails to use for investigation purposes; when a security incident occurs or when your network is compromised Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2021-06-17 14:24:41
change: Major (4.0.1 > 5.0.0)
Data Lakec95c74d9-38fe-4f0d-af86-0c7d626a315cResource logs in Data Lake Analytics should be enabledAudit enabling of resource logs. This enables you to recreate activity trails to use for investigation purposes; when a security incident occurs or when your network is compromised Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2021-06-17 14:24:41
change: Major (4.0.1 > 5.0.0)
Data Lake057ef27e-665e-4328-8ea3-04b3122bd9fbResource logs in Azure Data Lake Store should be enabledAudit enabling of resource logs. This enables you to recreate activity trails to use for investigation purposes; when a security incident occurs or when your network is compromised Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2021-06-17 14:24:41
change: Major (4.0.1 > 5.0.0)
Logic Apps34f95f76-5386-4de7-b824-0d8478470c9dResource logs in Logic Apps should be enabledAudit enabling of resource logs. This enables you to recreate activity trails to use for investigation purposes; when a security incident occurs or when your network is compromised Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2021-06-17 14:24:41
change: Major (4.0.1 > 5.0.0)
Stream Analyticsf9be5368-9bf5-4b84-9e0a-7850da98bb46Resource logs in Azure Stream Analytics should be enabledAudit enabling of resource logs. This enables you to recreate activity trails to use for investigation purposes; when a security incident occurs or when your network is compromised Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2021-06-17 14:24:41
change: Major (4.0.1 > 5.0.0)
App Service91a78b24-f231-4a8a-8da9-02c35b2b6510Resource logs in App Services should be enabledAudit enabling of resource logs on the app. This enables you to recreate activity trails for investigation purposes if a security incident occurs or your network is compromised. Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2021-06-17 14:24:41
change: Major (1.0.0 > 2.0.0)
Key Vaultcf820ca0-f99e-4f3e-84fb-66e913812d21Resource logs in Key Vault should be enabledAudit enabling of resource logs. This enables you to recreate activity trails to use for investigation purposes when a security incident occurs or when your network is compromised Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2021-06-17 14:24:41
change: Major (4.0.1 > 5.0.0)
Container Registry79fdfe03-ffcb-4e55-b4d0-b925b8241759Configure container registries to disable local admin account.Disable admin account for your registry so that it is not accessible by local admin. Disabling local authentication methods like admin user, repository scoped access tokens and anonymous pull improves security by ensuring that container registries exclusively require Azure Active Directory identities for authentication. Learn more at: https://aka.ms/acr/authentication. Default: Modify
Allowed: (Modify, Disabled)
Contributor
2021-06-15 14:05:41
add: 79fdfe03-ffcb-4e55-b4d0-b925b8241759
Backup98d0b9f8-fd90-49c9-88e2-d3baf3b0dd86Configure backup on virtual machines without a given tag to a new recovery services vault with a default policyEnforce backup for all virtual machines by deploying a recovery services vault in the same location and resource group as the virtual machine. Doing this is useful when different application teams in your organization are allocated separate resource groups and need to manage their own backups and restores. You can optionally exclude virtual machines containing a specified tag to control the scope of assignment. See https://aka.ms/AzureVMAppCentricBackupExcludeTag. Default: DeployIfNotExists
Allowed: (auditIfNotExists, AuditIfNotExists, deployIfNotExists, DeployIfNotExists, disabled, Disabled)
Virtual Machine Contributor
Backup Contributor
2021-06-15 14:05:41
change: Version remains equal, old suffix: preview (3.0.0-preview > 3.0.0)
Container Registrydc921057-6b28-4fbe-9b83-f7bec05db6c2Container registries should have local admin account disabled.Disable admin account for your registry so that it is not accessible by local admin. Disabling local authentication methods like admin user, repository scoped access tokens and anonymous pull improves security by ensuring that container registries exclusively require Azure Active Directory identities for authentication. Learn more at: https://aka.ms/acr/authentication. Default: Audit
Allowed: (Audit, Deny, Disabled)
2021-06-15 14:05:41
add: dc921057-6b28-4fbe-9b83-f7bec05db6c2
Backup83644c87-93dd-49fe-bf9f-6aff8fd0834eConfigure backup on virtual machines with a given tag to a new recovery services vault with a default policyEnforce backup for all virtual machines by deploying a recovery services vault in the same location and resource group as the virtual machine. Doing this is useful when different application teams in your organization are allocated separate resource groups and need to manage their own backups and restores. You can optionally include virtual machines containing a specified tag to control the scope of assignment. See https://aka.ms/AzureVMAppCentricBackupIncludeTag. Default: DeployIfNotExists
Allowed: (auditIfNotExists, AuditIfNotExists, deployIfNotExists, DeployIfNotExists, disabled, Disabled)
Virtual Machine Contributor
Backup Contributor
2021-06-15 14:05:41
change: Version remains equal, old suffix: preview (3.0.0-preview > 3.0.0)
Backup345fa903-145c-4fe1-8bcd-93ec2adccde8Configure backup on virtual machines with a given tag to an existing recovery services vault in the same locationEnforce backup for all virtual machines by backing them up to an existing central recovery services vault in the same location and subscription as the virtual machine. Doing this is useful when there is a central team in your organization managing backups for all resources in a subscription. You can optionally include virtual machines containing a specified tag to control the scope of assignment. See https://aka.ms/AzureVMCentralBackupIncludeTag. Default: DeployIfNotExists
Allowed: (auditIfNotExists, AuditIfNotExists, deployIfNotExists, DeployIfNotExists, disabled, Disabled)
Virtual Machine Contributor
Backup Contributor
2021-06-15 14:05:41
change: Version remains equal, old suffix: preview (3.0.0-preview > 3.0.0)
Security Centere494853f-93c3-4e44-9210-d12f61a64b34[Preview]: Configure supported virtual machines to automatically enable vTPMConfigure supported virtual machines to automatically enable vTPM to facilitate Measured Boot and other OS security features that require a TPM. Once enabled, vTPM can be used to attest boot integrity. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Virtual Machine Contributor
2021-06-08 15:17:13
add: e494853f-93c3-4e44-9210-d12f61a64b34
Key Vault1e66c121-a66a-4b1f-9b83-0fd99bf0fc2dKey vaults should have soft delete enabledDeleting a key vault without soft delete enabled permanently deletes all secrets, keys, and certificates stored in the key vault. Accidental deletion of a key vault can lead to permanent data loss. Soft delete allows you to recover an accidentally deleted key vault for a configurable retention period. Default: Audit
Allowed: (Audit, Deny, Disabled)
2021-06-08 15:17:13
change: Major (1.0.2 > 2.0.0)
SQLabfb4388-5bf4-4ad7-ba82-2cd2f41ceae9Azure Defender for SQL should be enabled for unprotected Azure SQL serversAudit SQL servers without Advanced Data Security Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2021-06-08 15:17:13
change: Patch (2.0.0 > 2.0.1)
Key Vault0b60c0b2-2dc2-4e1c-b5c9-abbed971de53Key vaults should have purge protection enabledMalicious deletion of a key vault can lead to permanent data loss. A malicious insider in your organization can potentially delete and purge key vaults. Purge protection protects you from insider attacks by enforcing a mandatory retention period for soft deleted key vaults. No one inside your organization or Microsoft will be able to purge your key vaults during the soft delete retention period. Default: Audit
Allowed: (Audit, Deny, Disabled)
2021-06-08 15:17:13
change: Major (1.1.1 > 2.0.0)
Security Center95406fc3-1f69-47b0-8105-4c03b276ec5c[Preview]: Configure supported Linux virtual machines to automatically enable Secure BootConfigure supported Linux virtual machines to automatically enable Secure Boot to mitigate against malicious and unauthorized changes to the boot chain. Once enabled, only trusted bootloaders, kernel and kernel drivers will be allowed to run. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Virtual Machine Contributor
2021-06-08 15:17:13
add: 95406fc3-1f69-47b0-8105-4c03b276ec5c
SQLabfb7388-5bf4-4ad7-ba99-2cd2f41cebb9Azure Defender for SQL should be enabled for unprotected SQL Managed InstancesAudit each SQL Managed Instance without advanced data security. Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2021-06-08 15:17:13
change: Patch (1.0.1 > 1.0.2)
Key Vault55615ac9-af46-4a59-874e-391cc3dfb490[Preview]: Azure Key Vault should disable public network accessDisable public network access for your key vault so that it's not accessible over the public internet. This can reduce data leakage risks. Learn more at: https://aka.ms/akvprivatelink. Default: Audit
Allowed: (Audit, Deny, Disabled)
2021-06-08 15:17:13
change: Major, suffix remains equal (1.1.0-preview > 2.0.0-preview)
Security Center7cb1b219-61c6-47e0-b80c-4472cadeeb5f[Preview]: Configure supported Windows virtual machines to automatically enable Secure BootConfigure supported Windows virtual machines to automatically enable Secure Boot to mitigate against malicious and unauthorized changes to the boot chain. Once enabled, only trusted bootloaders, kernel and kernel drivers will be allowed to run. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Virtual Machine Contributor
2021-06-08 15:17:13
add: 7cb1b219-61c6-47e0-b80c-4472cadeeb5f
Kubernetes440b515e-a580-421e-abeb-b159a61ddcbc[Deprecated]: Kubernetes cluster containers should only listen on allowed portsRestrict containers to listen only on allowed ports to secure access to the Kubernetes cluster. The policy is deprecating since container port is only informative field which cannot decide the port container is actually using. For more information, see https://aka.ms/kubepolicydoc. Default: Deny
Allowed: (audit, Audit, deny, Deny, disabled, Disabled)
2021-06-08 15:17:13
change: Patch (6.1.0 > 6.1.1)
Kubernetes233a2a17-77ca-4fb1-9b6b-69223d272a44Kubernetes cluster services should listen only on allowed portsRestrict services to listen only on allowed ports to secure access to the Kubernetes cluster. This policy is generally available for Kubernetes Service (AKS), and preview for AKS Engine and Azure Arc enabled Kubernetes. For more information, see https://aka.ms/kubepolicydoc. Default: Deny
Allowed: (audit, Audit, deny, Deny, disabled, Disabled)
2021-06-08 15:17:13
change: Patch (6.1.0 > 6.1.1)
SQL6134c3db-786f-471e-87bc-8f479dc890f6Deploy Advanced Data Security on SQL serversThis policy enables Advanced Data Security on SQL Servers. This includes turning on Threat Detection and Vulnerability Assessment. It will automatically create a storage account in the same region and resource group as the SQL server to store scan results, with a 'sqlva' prefix. Fixed: DeployIfNotExistsSQL Security Manager
Storage Account Contributor
2021-06-08 15:17:13
change: Minor (1.1.0 > 1.2.0)
App Configuration72bc14af-4ab8-43af-b4e4-38e7983f9a1fConfigure App Configuration stores to disable local authentication methodsDisable local authentication methods so that your App Configuration stores require Azure Active Directory identities exclusively for authentication. Learn more at: https://go.microsoft.com/fwlink/?linkid=2161954. Default: Modify
Allowed: (Modify, Disabled)
Contributor
2021-06-02 22:44:52
add: 72bc14af-4ab8-43af-b4e4-38e7983f9a1f
Security Center1537496a-b1e8-482b-a06a-1cc2415cdc7b[Preview]: Configure supported Windows machines to automatically install the Azure Security agentConfigure supported Windows machines to automatically install the Azure Security agent. Security Center collects events from the agent and uses them to provide security alerts and tailored hardening tasks (recommendations). Target virtual machines must be in a supported location. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Virtual Machine Contributor
2021-06-02 22:44:52
change: Major, suffix remains equal (1.0.0-preview > 2.0.0-preview)
Monitoring17b3de92-f710-4cf4-aa55-0e7859f1ed7b[Preview]: Configure system-assigned managed identity to enable Azure Monitor assignments on VMsConfigure system-assigned managed identity to virtual machines hosted in Azure that are supported by Azure Monitor and do not have a system-assigned managed identity. A system-assigned managed identity is a prerequisite for all Azure Monitor assignments and must be added to machines before using any Azure Monitor extension. Target virtual machines must be in a supported location. Default: Modify
Allowed: (Modify, Disabled)
Virtual Machine Contributor
Managed Identity Contributor
Managed Identity Operator
2021-06-02 22:44:52
change: Major, suffix remains equal (2.0.0-preview > 3.0.0-preview)
Security Center15fdbc87-8a47-4ee9-a2aa-9a2ea1f37554Log Analytics agent should be installed on your Cloud Services (extended support) role instancesSecurity Center collects data from your Cloud Services (extended support) role instances to monitor for security vulnerabilities and threats. Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2021-06-02 22:44:52
change: Major (1.0.0 > 2.0.0)
App Configurationb08ab3ca-1062-4db3-8803-eec9cae605d6App Configuration stores should have local authentication methods disabledDisabling local authentication methods improves security by ensuring that App Configuration stores require Azure Active Directory identities exclusively for authentication. Learn more at: https://go.microsoft.com/fwlink/?linkid=2161954. Default: Audit
Allowed: (Audit, Deny, Disabled)
2021-06-02 22:44:52
add: b08ab3ca-1062-4db3-8803-eec9cae605d6
Security Center2ada9901-073c-444a-9a9a-91865174f0aa[Preview]: Configure Azure Defender for SQL agent on virtual machineConfigure Windows machines to automatically install the Azure Defender for SQL agent where the Azure Monitor Agent is installed. Security Center collects events from the agent and uses them to provide security alerts and tailored hardening tasks (recommendations). Creates a resource group and Log Analytics workspace in the same region as the machine. Target virtual machines must be in a supported location. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Contributor
2021-06-02 22:44:52
add: 2ada9901-073c-444a-9a9a-91865174f0aa
Kubernetesd2e7ea85-6b44-4317-a0be-1b951587f626Kubernetes clusters should not grant CAP_SYS_ADMIN security capabilitiesTo reduce the attack surface of your containers, restrict CAP_SYS_ADMIN Linux capabilities. For more information, see https://aka.ms/kubepolicydoc. Default: Audit
Allowed: (audit, Audit, deny, Deny, disabled, Disabled)
2021-06-02 22:44:52
change: Minor, suffix remains equal (2.0.0-preview > 2.1.0-preview)
Cognitive Services14de9e63-1b31-492e-a5a3-c3f7fd57f555Configure Cognitive Services accounts to disable local authentication methodsDisable local authentication methods so that your Cognitive Services accounts require Azure Active Directory identities exclusively for authentication. Learn more at: https://aka.ms/cs/auth. Default: Modify
Allowed: (Modify, Disabled)
Contributor
2021-06-02 22:44:52
add: 14de9e63-1b31-492e-a5a3-c3f7fd57f555
Cognitive Services71ef260a-8f18-47b7-abcb-62d0673d94dcCognitive Services accounts should have local authentication methods disabledDisabling local authentication methods improves security by ensuring that Cognitive Services accounts require Azure Active Directory identities exclusively for authentication. Learn more at: https://aka.ms/cs/auth. Default: Audit
Allowed: (Audit, Deny, Disabled)
2021-06-02 22:44:52
add: 71ef260a-8f18-47b7-abcb-62d0673d94dc
Networkb6e2945c-0b7b-40f5-9233-7a5323b5cdc6Network Watcher should be enabledNetwork Watcher is a regional service that enables you to monitor and diagnose conditions at a network scenario level in, to, and from Azure. Scenario level monitoring enables you to diagnose problems at an end to end network level view. It is required to have a network watcher resource group to be created in every region where a virtual network is present. An alert is enabled if a network watcher resource group is not available in a particular region. Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2021-06-02 22:44:52
change: Major (2.0.0 > 3.0.0)
Monitoringca817e41-e85a-4783-bc7f-dc532d36235eConfigure Windows virtual machines to run Azure Monitor Agent using system-assigned managed identityAutomate the deployment of Azure Monitor Agent extension on your Windows virtual machines for collecting telemetry data from the guest OS. This policy will install the extension if the OS and region are supported and system-assigned managed identity is enabled, and skip install otherwise. Learn more: https://aka.ms/AMAOverview. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Virtual Machine Contributor
2021-06-02 22:44:52
change: Major (1.0.0 > 2.0.0)
Security Centerf6358610-e532-4236-b178-4c65865eb262[Preview]: Virtual machines guest attestation status should be healthyGuest attestation is performed by sending a trusted log (TCGLog) to an attestation server. The server uses these logs to determine whether boot components are trustworthy. This assessment is intended to detect compromises of the boot chain which might be the result of a bootkit or rootkit infection. This assessment only applies to Trusted Launch enabled virtual machines that have Guest Attestation extension installed. Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2021-05-26 13:43:16
add: f6358610-e532-4236-b178-4c65865eb262
Monitoring94c1f94d-33b0-4062-bd04-1cdc3e7eece2Azure Log Search Alerts over Log Analytics workspaces should use customer-managed keysEnsure that Azure Log Search Alerts are implementing customer-managed keys, by storing the query text using the storage account that the customer had provided for the queried Log Analytics workspace. For more information, visit https://docs.microsoft.com/azure/azure-monitor/platform/customer-managed-keys#customer-managed-key-overview. Default: Audit
Allowed: (Audit, Disabled, Deny)
2021-05-26 13:43:16
add: 94c1f94d-33b0-4062-bd04-1cdc3e7eece2
Web PubSub0b026355-49cb-467b-8ac4-f777874e175aConfigure Azure Web PubSub Service to use private DNS zonesUse private DNS zones to override the DNS resolution for a private endpoint. A private DNS zone links to your virtual network to resolve to Azure Web PubSub service. Learn more at: https://aka.ms/awps/privatelink. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Network Contributor
2021-05-26 13:43:16
add: 0b026355-49cb-467b-8ac4-f777874e175a
Guest Configuration3e4e2bd5-15a2-4628-b3e1-58977e9793f3Audit Windows machines that do not have the specified Windows PowerShell modules installedRequires that prerequisites are deployed to the policy assignment scope. For details, visit https://aka.ms/gcpol. Machines are non-compliant if a module isn't available in a location specified by the environment variable PSModulePath. Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2021-05-26 13:43:16
change: Major (1.0.0 > 2.0.0)
Web PubSub52630df9-ca7e-442b-853b-c6ce548b31a2[Deprecated]: Azure Web PubSub Service should use private linkThe policy is deprecated. Please use /providers/Microsoft.Authorization/policyDefinitions/eb907f70-7514-460d-92b3-a5ae93b4f917 instead. Default: Audit
Allowed: (Audit, Deny, Disabled)
2021-05-26 13:43:16
add: 52630df9-ca7e-442b-853b-c6ce548b31a2
Web PubSub5b1213e4-06e4-4ccc-81de-4201f2f7131aConfigure Azure Web PubSub Service to disable public network accessDisable public network access for your Azure Web PubSub resource so that it's not accessible over the public internet. This can reduce data leakage risks. Learn more at: https://aka.ms/awps/networkacls. Default: Modify
Allowed: (Modify, Disabled)
SignalR/Web PubSub Contributor
2021-05-26 13:43:16
add: 5b1213e4-06e4-4ccc-81de-4201f2f7131a
Security Centerb1bb3592-47b8-4150-8db0-bfdcc2c8965b[Preview]: Linux virtual machines should use Secure BootTo protect against the installation of malware-based rootkits and boot kits, enable Secure Boot on supported Linux virtual machines. Secure Boot ensures that only signed operating systems and drivers will be allowed to run. This assessment only applies to Linux virtual machines that have the Azure Monitor Agent installed. Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2021-05-26 13:43:16
add: b1bb3592-47b8-4150-8db0-bfdcc2c8965b
SQL83cef61d-dbd1-4b20-a4fc-5fbc7da10833MySQL servers should use customer-managed keys to encrypt data at restUse customer-managed keys to manage the encryption at rest of your MySQL servers. By default, the data is encrypted at rest with service-managed keys, but customer-managed keys are commonly required to meet regulatory compliance standards. Customer-managed keys enable the data to be encrypted with an Azure Key Vault key created and owned by you. You have full control and responsibility for the key lifecycle, including rotation and management. Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2021-05-26 13:43:16
change: Patch (1.0.3 > 1.0.4)
Site Recovery11e3da8c-1d68-4392-badd-0ff3c43ab5b0[Preview]: Recovery Services vaults should use private linkAzure Private Link lets you connect your virtual network to Azure services without a public IP address at the source or destination. The Private Link platform handles the connectivity between the consumer and services over the Azure backbone network. By mapping private endpoints to Azure Recovery Services vaults, data leakage risks are reduced. Learn more about private links for Azure Site Recovery at: https://aka.ms/HybridScenarios-PrivateLink and https://aka.ms/AzureToAzure-PrivateLink. Default: Audit
Allowed: (Audit, Disabled)
2021-05-26 13:43:16
add: 11e3da8c-1d68-4392-badd-0ff3c43ab5b0
Kubernetes8dfab9c4-fe7b-49ad-85e4-1e9be085358f[Preview]: Azure Arc enabled Kubernetes clusters should have Microsoft Defender for Cloud extension installedMicrosoft Defender for Cloud extension for Azure Arc provides threat protection for your Arc enabled Kubernetes clusters. The extension collects data from all nodes in the cluster and sends it to the Azure Defender for Kubernetes backend in the cloud for further analysis. Learn more in https://docs.microsoft.com/azure/defender-for-cloud/defender-for-containers-enable?pivots=defender-for-container-arc. Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2021-05-26 13:43:16
change: Major, suffix remains equal (1.0.0-preview > 2.0.0-preview)
Web PubSub1b9c0b58-fc7b-42c8-8010-cdfa1d1b8544Configure Azure Web PubSub Service with private endpointsPrivate endpoints connect your virtual networks to Azure services without a public IP address at the source or destination. By mapping private endpoints to Azure Web PubSub service, you can reduce data leakage risks. Learn more about private links at: https://aka.ms/awps/privatelink. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Network Contributor
SignalR/Web PubSub Contributor
2021-05-26 13:43:16
add: 1b9c0b58-fc7b-42c8-8010-cdfa1d1b8544
Monitoringa4034bc6-ae50-406d-bf76-50f4ee5a7811Configure Linux virtual machines to run Azure Monitor Agent with system-assigned managed identity-based authenticationAutomate the deployment of Azure Monitor Agent extension on your Linux virtual machines for collecting telemetry data from the guest OS. This policy will install the extension if the OS and region are supported and system-assigned managed identity is enabled, and skip install otherwise. Learn more: https://aka.ms/AMAOverview. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Virtual Machine Contributor
2021-05-26 13:43:16
change: Version remains equal, old suffix: preview (1.0.0-preview > 1.0.0)
Monitoringeab1f514-22e3-42e3-9a1f-e1dc9199355cConfigure Windows Machines to be associated with a Data Collection RuleDeploy Association to link Windows virtual machines, virtual machine scale sets, and Arc machines to specified Data Collection Rule. The list of locations and OS images are updated over time as support is increased. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Monitoring Contributor
Log Analytics Contributor
2021-05-26 13:43:16
add: eab1f514-22e3-42e3-9a1f-e1dc9199355c
Site Recovery942bd215-1a66-44be-af65-6a1c0318dbe2[Preview]: Configure Azure Recovery Services vaults to use private DNS zonesUse private DNS zones to override the DNS resolution for a private endpoint. A private DNS zone links to your virtual network to resolve to Recovery Services Vaults. Learn more at: https://aka.ms/privatednszone. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Network Contributor
2021-05-26 13:43:16
add: 942bd215-1a66-44be-af65-6a1c0318dbe2
Kubernetes708b60a6-d253-4fe0-9114-4be4c00f012c[Preview]: Configure Azure Arc enabled Kubernetes clusters to install Microsoft Defender for Cloud extensionMicrosoft Defender for Cloud extension for Azure Arc provides threat protection for your Arc enabled Kubernetes clusters. The extension collects data from all nodes in the cluster and sends it to the Azure Defender for Kubernetes backend in the cloud for further analysis. Learn more in https://docs.microsoft.com/azure/defender-for-cloud/defender-for-containers-enable?pivots=defender-for-container-arc. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Contributor
Log Analytics Contributor
2021-05-26 13:43:16
add: 708b60a6-d253-4fe0-9114-4be4c00f012c
Site Recoverye95a8a5c-0987-421f-84ab-df4d88ebf7d1[Preview]: Configure private endpoints on Azure Recovery Services vaultsPrivate endpoints connect your virtual network to Azure services without a public IP address at the source or destination. By mapping private endpoints to your site recovery resources of Recovery Services vaults, you can reduce data leakage risks. To use private links, managed service identity must be assigned to Recovery Services Vaults. Learn more about private links at: https://docs.microsoft.com/azure/site-recovery/azure-to-azure-how-to-enable-replication-private-endpoints. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Network Contributor
Site Recovery Contributor
2021-05-26 13:43:16
add: e95a8a5c-0987-421f-84ab-df4d88ebf7d1
Web PubSub82909236-25f3-46a6-841c-fe1020f95ae1Azure Web PubSub Service should use a SKU that supports private linkWith supported SKU, Azure Private Link lets you connect your virtual network to Azure services without a public IP address at the source or destination. The Private Link platform handles the connectivity between the consumer and services over the Azure backbone network. By mapping private endpoints to Azure Web PubSub service, you can reduce data leakage risks. Learn more about private links at: https://aka.ms/awps/privatelink. Default: Audit
Allowed: (Audit, Deny, Disabled)
2021-05-26 13:43:16
add: 82909236-25f3-46a6-841c-fe1020f95ae1
SQL18adea5e-f416-4d0f-8aa8-d24321e3e274PostgreSQL servers should use customer-managed keys to encrypt data at restUse customer-managed keys to manage the encryption at rest of your PostgreSQL servers. By default, the data is encrypted at rest with service-managed keys, but customer-managed keys are commonly required to meet regulatory compliance standards. Customer-managed keys enable the data to be encrypted with an Azure Key Vault key created and owned by you. You have full control and responsibility for the key lifecycle, including rotation and management. Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2021-05-26 13:43:16
change: Patch (1.0.3 > 1.0.4)
Monitoring2ea82cdd-f2e8-4500-af75-67a2e084ca74Configure Linux Machines to be associated with a Data Collection RuleDeploy Association to link Linux virtual machines, virtual machine scale sets, and Arc machines to the specified Data Collection Rule. The list of locations and OS images are updated over time as support is increased. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Monitoring Contributor
Log Analytics Contributor
2021-05-26 13:43:16
add: 2ea82cdd-f2e8-4500-af75-67a2e084ca74
Backupaf783da1-4ad1-42be-800d-d19c70038820[Preview]: Configure Recovery Services vaults to use private DNS zones for backupUse private DNS zones to override the DNS resolution for a private endpoint. A private DNS zone links to your virtual network to resolve to your Recovery Services vault. Learn more at: https://aka.ms/AB-PrivateEndpoints. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Network Contributor
2021-05-26 13:43:16
add: af783da1-4ad1-42be-800d-d19c70038820
Web PubSubbf45113f-264e-4a87-88f9-29ac8a0aca6aAzure Web PubSub Service should disable public network accessDisabling public network access improves security by ensuring that Azure Web PubSub service isn't exposed on the public internet. Creating private endpoints can limit exposure of Azure Web PubSub service. Learn more at: https://aka.ms/awps/networkacls. Default: Audit
Allowed: (Audit, Deny, Disabled)
2021-05-26 13:43:16
add: bf45113f-264e-4a87-88f9-29ac8a0aca6a
Monitoringca817e41-e85a-4783-bc7f-dc532d36235eConfigure Windows virtual machines to run Azure Monitor Agent using system-assigned managed identityAutomate the deployment of Azure Monitor Agent extension on your Windows virtual machines for collecting telemetry data from the guest OS. This policy will install the extension if the OS and region are supported and system-assigned managed identity is enabled, and skip install otherwise. Learn more: https://aka.ms/AMAOverview. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Virtual Machine Contributor
2021-05-26 13:43:16
change: Version remains equal, old suffix: preview (1.0.0-preview > 1.0.0)
App Serviced79ab062-dffd-4318-8344-f70de714c0bc[Deprecated]: App Service should disable public network accessDisabling public network access improves security by ensuring that the app service is not exposed on the public internet. Creating private endpoints can limit exposure of the app service. Learn more at: https://aka.ms/app-service-private-endpoint. Default: Audit
Allowed: (Audit, Disabled)
2021-05-26 13:43:16
add: d79ab062-dffd-4318-8344-f70de714c0bc
Synapse5c8cad01-ef30-4891-b230-652dadb4876aConfigure Azure Synapse workspaces to disable public network accessDisable public network access for your Synapse workspace so that it is not accessible over the public internet. This can reduce data leakage risks. Learn more at: https://docs.microsoft.com/azure/synapse-analytics/security/connectivity-settings. Default: Modify
Allowed: (Modify, Disabled)
Contributor
2021-05-18 14:34:48
add: 5c8cad01-ef30-4891-b230-652dadb4876a
Media Servicesdaccf7e4-9808-470c-a848-1c5b582a1afbAzure Media Services content key policies should use token authenticationContent key policies define the conditions that must be met to access content keys. A token restriction ensures content keys can only be accessed by users that have valid tokens from an authentication service, for example Azure Active Directory. Default: Audit
Allowed: (Audit, Deny, Disabled)
2021-05-18 14:34:48
add: daccf7e4-9808-470c-a848-1c5b582a1afb
Guest Configurationf79fef0d-0050-4c18-a303-5babb9c14ac7Windows machines should only have local accounts that are allowedRequires that prerequisites are deployed to the policy assignment scope. For details, visit https://aka.ms/gcpol. This definition is not supported on Windows Server 2012 or 2012 R2. Managing user accounts using Azure Active Directory is a best practice for management of identities. Reducing local machine accounts helps prevent the proliferation of identities managed outside a central system. Machines are non-compliant if local user accounts exist that are enabled and not listed in the policy parameter. Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2021-05-18 14:34:48
add: f79fef0d-0050-4c18-a303-5babb9c14ac7
Synapse38d8df46-cf4e-4073-8e03-48c24b29de0dAzure Synapse workspaces should disable public network accessDisabling public network access improves security by ensuring that the Synapse workspace isn't exposed on the public internet. Creating private endpoints can limit exposure of your Synapse workspaces. Learn more at: https://docs.microsoft.com/azure/synapse-analytics/security/connectivity-settings. Default: Audit
Allowed: (Audit, Deny, Disabled)
2021-05-18 14:34:48
add: 38d8df46-cf4e-4073-8e03-48c24b29de0d
Network5e1cd26a-5090-4fdb-9d6a-84a90335e22dConfigure network security groups to use specific workspace for traffic analyticsIf it already has traffic analytics enabled, then policy will overwrite its existing settings with the ones provided during policy creation. Traffic analytics is a cloud-based solution that provides visibility into user and application activity in cloud networks. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Contributor
2021-05-18 14:34:48
add: 5e1cd26a-5090-4fdb-9d6a-84a90335e22d
Azure Active Directory3aa87b5a-7813-4b57-8a43-42dd9df5aaa7Azure Active Directory Domain Services managed domains should use TLS 1.2 only modeUse TLS 1.2 only mode for your managed domains. By default, Azure AD Domain Services enables the use of ciphers such as NTLM v1 and TLS v1. These ciphers may be required for some legacy applications, but are considered weak and can be disabled if you don't need them. When TLS 1.2 only mode is enabled, any client making a request that is not using TLS 1.2 will fail. Learn more at https://docs.microsoft.com/azure/active-directory-domain-services/secure-your-domain. Default: Audit
Allowed: (Audit, Deny, Disabled)
2021-05-18 14:34:48
change: Minor (1.0.0 > 1.1.0)
Monitoringf47b5582-33ec-4c5c-87c0-b010a6b2e917Virtual machines should be connected to a specified workspaceReports virtual machines as non-compliant if they aren't logging to the Log Analytics workspace specified in the policy/initiative assignment. Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2021-05-18 14:34:48
change: Minor (1.0.1 > 1.1.0)
Media Servicese9914afe-31cd-4b8a-92fa-c887f847d477Azure Media Services jobs with HTTPS inputs should limit input URIs to permitted URI patternsRestrict HTTPS inputs used by Media Services jobs to known endpoints. Inputs from HTTPS endpoints can be disabled entirely by setting an empty list of allowed job input patterns. Where job inputs specify a 'baseUri' the patterns will be matched against this value; when 'baseUri' is not set, the pattern is matched against the 'files' property. Default: Deny
Allowed: (Deny, Disabled)
2021-05-18 14:34:48
change: Patch (1.0.0 > 1.0.1)
Media Servicesccf93279-9c91-4143-a841-8d1f21505455Azure Media Services accounts that allow access to the legacy v2 API should be blockedThe Media Services legacy v2 API allows requests that cannot be managed using Azure Policy. Media Services resources created using the 2020-05-01 API or later block access to the legacy v2 API. Default: Audit
Allowed: (Audit, Deny, Disabled)
2021-05-18 14:34:48
add: ccf93279-9c91-4143-a841-8d1f21505455
Guest Configuration73db37c4-f180-4b0f-ab2c-8ee96467686bLinux machines should only have local accounts that are allowedRequires that prerequisites are deployed to the policy assignment scope. For details, visit https://aka.ms/gcpol. Managing user accounts using Azure Active Directory is a best practice for management of identities. Reducing local machine accounts helps prevent the proliferation of identities managed outside a central system. Machines are non-compliant if local user accounts exist that are enabled and not listed in the policy parameter. Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2021-05-18 14:34:48
add: 73db37c4-f180-4b0f-ab2c-8ee96467686b
Network2f080164-9f4d-497e-9db6-416dc9f7b48aNetwork Watcher flow logs should have traffic analytics enabledTraffic analytics analyzes Network Watcher network security group flow logs to provide insights into traffic flow in your Azure cloud. It can be used to visualize network activity across your Azure subscriptions and identify hot spots, identify security threats, understand traffic flow patterns, pinpoint network misconfigurations and more. Default: Audit
Allowed: (Audit, Disabled)
2021-05-18 14:34:48
add: 2f080164-9f4d-497e-9db6-416dc9f7b48a
Media Servicesa77d8bb4-8d22-4bc1-a884-f582a705b480Azure Media Services accounts should use an API that supports Private LinkMedia Services accounts should be created with an API that supports private link. Default: Audit
Allowed: (Audit, Deny, Disabled)
2021-05-18 14:34:48
add: a77d8bb4-8d22-4bc1-a884-f582a705b480
Networke920df7f-9a64-4066-9b58-52684c02a091Configure network security groups to enable traffic analyticsTraffic analytics can be enabled for all network security groups hosted in a particular region with the settings provided during policy creation. If it already has Traffic analytics enabled, then policy does not overwrite its settings. Flow Logs are also enabled for the Network security groups that do not have it. Traffic analytics is a cloud-based solution that provides visibility into user and application activity in cloud networks. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Contributor
2021-05-18 14:34:48
add: e920df7f-9a64-4066-9b58-52684c02a091
SQLdb048e65-913c-49f9-bb5f-1084184671d3Configure Advanced Threat Protection to be enabled on Azure database for PostgreSQL serversEnable Advanced Threat Protection on your non-Basic tier Azure database for PostgreSQL servers to detect anomalous activities indicating unusual and potentially harmful attempts to access or exploit databases. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Contributor
2021-05-11 14:06:18
add: db048e65-913c-49f9-bb5f-1084184671d3
Data Factory0088bc63-6dee-4a9c-9d29-91cfdc848952SQL Server Integration Services integration runtimes on Azure Data Factory should be joined to a virtual networkAzure Virtual Network deployment provides enhanced security and isolation for your SQL Server Integration Services integration runtimes on Azure Data Factory, as well as subnets, access control policies, and other features to further restrict access. Default: Audit
Allowed: (Audit, Deny, Disabled)
2021-05-11 14:06:18
change: Major (1.0.0 > 2.0.0)
Monitoring1bc02227-0cb6-4e11-8f53-eb0b22eab7e8Application Insights components should block log ingestion and querying from public networksImprove Application Insights security by blocking log ingestion and querying from public networks. Only private-link connected networks will be able to ingest and query logs of this component. Learn more at https://aka.ms/AzMonPrivateLink#configure-application-insights. Default: Audit
Allowed: (audit, Audit, deny, Deny, disabled, Disabled)
2021-05-11 14:06:18
add: 1bc02227-0cb6-4e11-8f53-eb0b22eab7e8
Machine Learninge96a9a5f-07ca-471b-9bc5-6a0f33cbd68fMachine Learning computes should have local authentication methods disabledDisabling local authentication methods improves security by ensuring that Machine Learning computes require Azure Active Directory identities exclusively for authentication. Learn more at: https://aka.ms/azure-ml-aad-policy. Default: Audit
Allowed: (Audit, Deny, Disabled)
2021-05-11 14:06:18
add: e96a9a5f-07ca-471b-9bc5-6a0f33cbd68f
Guest Configuration72650e9f-97bc-4b2a-ab5f-9781a9fcecbcWindows machines should meet requirements of the Azure compute security baselineRequires that prerequisites are deployed to the policy assignment scope. For details, visit https://aka.ms/gcpol. Machines are non-compliant if the machine is not configured correctly for one of the recommendations in the Azure compute security baseline. Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2021-05-11 14:06:18
change: Patch, suffix remains equal (1.0.0-preview > 1.0.1-preview)
Computebc05b96c-0b36-4ca9-82f0-5c53f96ce05aConfigure disk access resources to use private DNS zonesUse private DNS zones to override the DNS resolution for a private endpoint. A private DNS zone links to your virtual network to resolve to a managed disk. Learn more at: https://aka.ms/disksprivatelinksdoc. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Network Contributor
2021-05-11 14:06:18
add: bc05b96c-0b36-4ca9-82f0-5c53f96ce05a
Guest Configuration385f5831-96d4-41db-9a3c-cd3af78aaae6Deploy the Windows Guest Configuration extension to enable Guest Configuration assignments on Windows VMsThis policy deploys the Windows Guest Configuration extension to Windows virtual machines hosted in Azure that are supported by Guest Configuration. The Windows Guest Configuration extension is a prerequisite for all Windows Guest Configuration assignments and must be deployed to machines before using any Windows Guest Configuration policy definition. For more information on Guest Configuration, visit https://aka.ms/gcpol. Fixed: deployIfNotExistsContributor
2021-05-11 14:06:18
change: Patch (1.0.0 > 1.0.1)
SQLa6cf7411-da9e-49e2-aec0-cba0250eaf8cConfigure Advanced Threat Protection to be enabled on Azure database for MariaDB serversEnable Advanced Threat Protection on your non-Basic tier Azure database for MariaDB servers to detect anomalous activities indicating unusual and potentially harmful attempts to access or exploit databases. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Contributor
2021-05-11 14:06:18
add: a6cf7411-da9e-49e2-aec0-cba0250eaf8c
Guest Configuration5752e6d6-1206-46d8-8ab1-ecc2f71a8112Windows web servers should be configured to use secure communication protocolsTo protect the privacy of information communicated over the Internet, your web servers should use the latest version of the industry-standard cryptographic protocol, Transport Layer Security (TLS). TLS secures communications over a network by using security certificates to encrypt a connection between machines. Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2021-05-11 14:06:18
change: Major (2.1.0 > 3.0.0)
Monitoring6c53d030-cc64-46f0-906d-2bc061cd1334Log Analytics workspaces should block log ingestion and querying from public networksImprove workspace security by blocking log ingestion and querying from public networks. Only private-link connected networks will be able to ingest and query logs on this workspace. Learn more at https://aka.ms/AzMonPrivateLink#configure-log-analytics. Default: Audit
Allowed: (audit, Audit, deny, Deny, disabled, Disabled)
2021-05-11 14:06:18
add: 6c53d030-cc64-46f0-906d-2bc061cd1334
SQL80ed5239-4122-41ed-b54a-6f1fa7552816Configure Advanced Threat Protection to be enabled on Azure database for MySQL serversEnable Advanced Threat Protection on your non-Basic tier Azure database for MySQL servers to detect anomalous activities indicating unusual and potentially harmful attempts to access or exploit databases. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Contributor
2021-05-11 14:06:18
add: 80ed5239-4122-41ed-b54a-6f1fa7552816
SQL9a7c7a7d-49e5-4213-bea8-6a502b6272e0Deploy Diagnostic Settings for Azure SQL Database to Event HubDeploys the diagnostic settings for Azure SQL Database to stream to a regional Event Hub on any Azure SQL Database which is missing this diagnostic settings is created or updated. Fixed: DeployIfNotExistsContributor
2021-05-11 14:06:18
change: Minor (1.1.0 > 1.2.0)
Monitoring41388f1c-2db0-4c25-95b2-35d7f5ccbfa9Azure Monitor should collect activity logs from all regionsThis policy audits the Azure Monitor log profile which does not export activities from all Azure supported regions including global. Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2021-05-11 14:06:18
change: Major (1.0.0 > 2.0.0)
Guest Configurationfc9b3da7-8347-4380-8e70-0a0361d8deddLinux machines should meet requirements for the Azure compute security baselineRequires that prerequisites are deployed to the policy assignment scope. For details, visit https://aka.ms/gcpol. Machines are non-compliant if the machine is not configured correctly for one of the recommendations in the Azure compute security baseline. Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2021-05-11 14:06:18
change: Patch, suffix remains equal (1.1.0-preview > 1.1.1-preview)
Kubernetes95edb821-ddaf-4404-9732-666045e056b4Kubernetes cluster should not allow privileged containersDo not allow privileged containers creation in a Kubernetes cluster. This recommendation is part of CIS 5.2.1 which is intended to improve the security of your Kubernetes environments. This policy is generally available for Kubernetes Service (AKS), and preview for AKS Engine and Azure Arc enabled Kubernetes. For more information, see https://aka.ms/kubepolicydoc. Default: Deny
Allowed: (audit, Audit, deny, Deny, disabled, Disabled)
2021-05-11 14:06:18
change: Major (6.0.0 > 7.0.0)
Storage044985bb-afe1-42cd-8a36-9d5d42424537Storage account keys should not be expiredEnsure the user storage account keys are not expired when key expiration policy is set, for improving security of account keys by taking action when the keys are expired. Default: Audit
Allowed: (Audit, Deny, Disabled)
2021-05-11 14:06:18
add: 044985bb-afe1-42cd-8a36-9d5d42424537
Machine Learninga6f9a2d0-cff7-4855-83ad-4cd750666512Configure Machine Learning computes to disable local authentication methodsDisable location authentication methods so that your Machine Learning computes require Azure Active Directory identities exclusively for authentication. Learn more at: https://aka.ms/azure-ml-aad-policy. Default: Modify
Allowed: (Modify, Disabled)
Contributor
2021-05-11 14:06:18
add: a6f9a2d0-cff7-4855-83ad-4cd750666512
Guest Configuration331e8ea8-378a-410f-a2e5-ae22f38bb0daDeploy the Linux Guest Configuration extension to enable Guest Configuration assignments on Linux VMsThis policy deploys the Linux Guest Configuration extension to Linux virtual machines hosted in Azure that are supported by Guest Configuration. The Linux Guest Configuration extension is a prerequisite for all Linux Guest Configuration assignments and must be deployed to machines before using any Linux Guest Configuration policy definition. For more information on Guest Configuration, visit https://aka.ms/gcpol. Fixed: deployIfNotExistsContributor
2021-05-11 14:06:18
change: Patch (1.0.0 > 1.0.1)
Storageb5ec538c-daa0-4006-8596-35468b9148e8Storage account encryption scopes should use customer-managed keys to encrypt data at restUse customer-managed keys to manage the encryption at rest of your storage account encryption scopes. Customer-managed keys enable the data to be encrypted with an Azure key-vault key created and owned by you. You have full control and responsibility for the key lifecycle, including rotation and management. Learn more about storage account encryption scopes at https://aka.ms/encryption-scopes-overview. Default: Audit
Allowed: (Audit, Deny, Disabled)
2021-05-04 14:34:06
add: b5ec538c-daa0-4006-8596-35468b9148e8
Security Center97566dd7-78ae-4997-8b36-1c7bfe0d8121[Preview]: Secure Boot should be enabled on supported Windows virtual machinesEnable Secure Boot on supported Windows virtual machines to mitigate against malicious and unauthorized changes to the boot chain. Once enabled, only trusted bootloaders, kernel and kernel drivers will be allowed to run. This assessment only applies to trusted launch enabled Windows virtual machines. Default: Audit
Allowed: (Audit, Disabled)
2021-05-04 14:34:06
add: 97566dd7-78ae-4997-8b36-1c7bfe0d8121
Security Center1c30f9cd-b84c-49cc-aa2c-9288447cc3b3[Preview]: vTPM should be enabled on supported virtual machinesEnable virtual TPM device on supported virtual machines to facilitate Measured Boot and other OS security features that require a TPM. Once enabled, vTPM can be used to attest boot integrity. This assessment only applies to trusted launch enabled virtual machines. Default: Audit
Allowed: (Audit, Disabled)
2021-05-04 14:34:06
add: 1c30f9cd-b84c-49cc-aa2c-9288447cc3b3
Media Servicese9914afe-31cd-4b8a-92fa-c887f847d477Azure Media Services jobs with HTTPS inputs should limit input URIs to permitted URI patternsRestrict HTTPS inputs used by Media Services jobs to known endpoints. Inputs from HTTPS endpoints can be disabled entirely by setting an empty list of allowed job input patterns. Where job inputs specify a 'baseUri' the patterns will be matched against this value; when 'baseUri' is not set, the pattern is matched against the 'files' property. Default: Deny
Allowed: (Deny, Disabled)
2021-05-04 14:34:06
add: e9914afe-31cd-4b8a-92fa-c887f847d477
Security Centerc9b2ae08-09e2-4f0e-bb43-b60bf0135bdf[Preview]: Configure supported Windows virtual machine scale sets to automatically install the Guest Attestation extensionConfigure supported Windows virtual machines scale sets to automatically install the Guest Attestation extension to allow Azure Security Center to proactively attest and monitor the boot integrity. Boot integrity is attested via Remote Attestation. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Virtual Machine Contributor
2021-05-04 14:34:06
add: c9b2ae08-09e2-4f0e-bb43-b60bf0135bdf
Security Center5f8eb305-9c9f-4abe-9bb0-df220d9faba2[Preview]: Configure supported Linux virtual machines to automatically install the Azure Security agentConfigure supported Linux virtual machines to automatically install the Azure Security agent. Security Center collects events from the agent and uses them to provide security alerts and tailored hardening tasks (recommendations). Target virtual machines must be in a supported location. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Virtual Machine Contributor
2021-05-04 14:34:06
change: Major, suffix remains equal (1.0.0-preview > 2.0.0-preview)
Bot Service52152f42-0dda-40d9-976e-abb1acdd611eBot Service should have isolated mode enabledBots should be set to 'isolated only' mode. This setting configures Bot Service channels that require traffic over the public internet to be disabled. Default: Audit
Allowed: (audit, Audit, deny, Deny, disabled, Disabled)
2021-05-04 14:34:06
add: 52152f42-0dda-40d9-976e-abb1acdd611e
Security Centerf655e522-adff-494d-95c2-52d4f6d56a42[Preview]: Guest Attestation extension should be installed on supported Windows virtual machines scale setsInstall Guest Attestation extension on supported virtual machines scale sets to allow Azure Security Center to proactively attest and monitor the boot integrity. Once installed, boot integrity will be attested via Remote Attestation. This assessment only applies to trusted launch enabled virtual machine scale sets. Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2021-05-04 14:34:06
add: f655e522-adff-494d-95c2-52d4f6d56a42
Security Center1cb4d9c2-f88f-4069-bee0-dba239a57b09[Preview]: Guest Attestation extension should be installed on supported Windows virtual machinesInstall Guest Attestation extension on supported virtual machines to allow Azure Security Center to proactively attest and monitor the boot integrity. Once installed, boot integrity will be attested via Remote Attestation. This assessment only applies to trusted launch enabled virtual machines. Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2021-05-04 14:34:06
add: 1cb4d9c2-f88f-4069-bee0-dba239a57b09
Security Center5a913c68-0590-402c-a531-e57e19379da3[Deprecated]: Operating system version should be the most current version for your cloud service rolesKeeping the operating system (OS) on the most recent supported version for your cloud service roles enhances the systems security posture. Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2021-05-04 14:34:06
change: Version remains equal, new suffix: deprecated (1.0.0 > 1.0.0-deprecated)
Security Center672fe5a1-2fcd-42d7-b85d-902b6e28c6ff[Preview]: Guest Attestation extension should be installed on supported Linux virtual machinesInstall Guest Attestation extension on supported Linux virtual machines to allow Azure Security Center to proactively attest and monitor the boot integrity. Once installed, boot integrity will be attested via Remote Attestation. This assessment only applies to trusted launch enabled Linux virtual machines. Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2021-05-04 14:34:06
add: 672fe5a1-2fcd-42d7-b85d-902b6e28c6ff
Security Center13ce0167-8ca6-4048-8e6b-f996402e3c1bConfigure machines to receive a vulnerability assessment providerAzure Defender includes vulnerability scanning for your machines at no extra cost. You don't need a Qualys license or even a Qualys account - everything's handled seamlessly inside Security Center. When you enable this policy, Azure Defender automatically deploys the Qualys vulnerability assessment provider to all supported machines that don't already have it installed. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Security Admin
2021-05-04 14:34:06
change: Minor, suffix remains equal (2.0.0-preview > 2.1.0-preview)
Security Center6074e9a3-c711-4856-976d-24d51f9e065b[Preview]: Configure supported Linux virtual machines to automatically install the Guest Attestation extensionConfigure supported Linux virtual machines to automatically install the Guest Attestation extension to allow Azure Security Center to proactively attest and monitor the boot integrity. Boot integrity is attested via Remote Attestation. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Virtual Machine Contributor
2021-05-04 14:34:06
add: 6074e9a3-c711-4856-976d-24d51f9e065b
App Service1bc1795e-d44a-4d48-9b3b-6fff0fd5f9baEnsure that 'PHP version' is the latest, if used as a part of the API appPeriodically, newer versions are released for PHP software either due to security flaws or to include additional functionality. Using the latest PHP version for API apps is recommended in order to take advantage of security fixes, if any, and/or new functionalities of the latest version. Currently, this policy only applies to Linux web apps. Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2021-05-04 14:34:06
change: Minor (2.0.0 > 2.1.0)
Monitoring17b3de92-f710-4cf4-aa55-0e7859f1ed7b[Preview]: Configure system-assigned managed identity to enable Azure Monitor assignments on VMsConfigure system-assigned managed identity to virtual machines hosted in Azure that are supported by Azure Monitor and do not have a system-assigned managed identity. A system-assigned managed identity is a prerequisite for all Azure Monitor assignments and must be added to machines before using any Azure Monitor extension. Target virtual machines must be in a supported location. Default: Modify
Allowed: (Modify, Disabled)
Virtual Machine Contributor
Managed Identity Contributor
Managed Identity Operator
2021-05-04 14:34:06
change: Major, suffix remains equal (1.2.0-preview > 2.0.0-preview)
Security Center57c2e3f0-98cf-4c3b-aa6b-e8f70726e74e[Preview]: Configure supported Linux virtual machine scale sets to automatically install the Guest Attestation extensionConfigure supported Linux virtual machines scale sets to automatically install the Guest Attestation extension to allow Azure Security Center to proactively attest and monitor the boot integrity. Boot integrity is attested via Remote Attestation. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Virtual Machine Contributor
2021-05-04 14:34:06
add: 57c2e3f0-98cf-4c3b-aa6b-e8f70726e74e
Security Centera21f8c92-9e22-4f09-b759-50500d1d2dda[Preview]: Guest Attestation extension should be installed on supported Linux virtual machines scale setsInstall Guest Attestation extension on supported Linux virtual machines scale sets to allow Azure Security Center to proactively attest and monitor the boot integrity. Once installed, boot integrity will be attested via Remote Attestation. This assessment only applies to trusted launch enabled Linux virtual machine scale sets. Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2021-05-04 14:34:06
add: a21f8c92-9e22-4f09-b759-50500d1d2dda
App Service7261b898-8a84-4db8-9e04-18527132abb3Ensure that 'PHP version' is the latest, if used as a part of the WEB appPeriodically, newer versions are released for PHP software either due to security flaws or to include additional functionality. Using the latest PHP version for web apps is recommended in order to take advantage of security fixes, if any, and/or new functionalities of the latest version. Currently, this policy only applies to Linux web apps. Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2021-05-04 14:34:06
change: Minor (2.0.0 > 2.1.0)
Security Center98ea2fc7-6fc6-4fd1-9d8d-6331154da071[Preview]: Configure supported Windows virtual machines to automatically install the Guest Attestation extensionConfigure supported Windows virtual machines to automatically install the Guest Attestation extension to allow Azure Security Center to proactively attest and monitor the boot integrity. Boot integrity is attested via Remote Attestation. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Virtual Machine Contributor
2021-05-04 14:34:06
add: 98ea2fc7-6fc6-4fd1-9d8d-6331154da071
App Serviced6545c6b-dd9d-4265-91e6-0b451e2f1c50App Service Environment should disable TLS 1.0 and 1.1TLS 1.0 and 1.1 are out-of-date protocols that do not support modern cryptographic algorithms. Disabling inbound TLS 1.0 and 1.1 traffic helps secure apps in an App Service Environment. Default: Audit
Allowed: (Audit, Deny, Disabled)
2021-05-04 14:34:06
change: Major (1.0.0 > 2.0.0)
SQL6134c3db-786f-471e-87bc-8f479dc890f6Deploy Advanced Data Security on SQL serversThis policy enables Advanced Data Security on SQL Servers. This includes turning on Threat Detection and Vulnerability Assessment. It will automatically create a storage account in the same region and resource group as the SQL server to store scan results, with a 'sqlva' prefix. Fixed: DeployIfNotExistsSQL Security Manager
Storage Account Contributor
2021-04-27 15:38:15
change: Minor (1.0.0 > 1.1.0)
SQL7ea8a143-05e3-4553-abfe-f56bef8b0b70Configure Azure SQL database servers diagnostic settings to Log Analytics workspaceEnables auditing logs for Azure SQL Database server and stream the logs to a Log Analytics workspace when any SQL Server which is missing this auditing is created or updated Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
SQL Security Manager
Log Analytics Contributor
2021-04-27 15:38:15
change: Patch (1.0.1 > 1.0.2)
Backup345fa903-145c-4fe1-8bcd-93ec2adccde8Configure backup on virtual machines with a given tag to an existing recovery services vault in the same locationEnforce backup for all virtual machines by backing them up to an existing central recovery services vault in the same location and subscription as the virtual machine. Doing this is useful when there is a central team in your organization managing backups for all resources in a subscription. You can optionally include virtual machines containing a specified tag to control the scope of assignment. See https://aka.ms/AzureVMCentralBackupIncludeTag. Default: DeployIfNotExists
Allowed: (auditIfNotExists, AuditIfNotExists, deployIfNotExists, DeployIfNotExists, disabled, Disabled)
Virtual Machine Contributor
Backup Contributor
2021-04-27 15:38:15
change: Major, suffix remains equal (2.0.0-preview > 3.0.0-preview)
Monitoring69af7d4a-7b18-4044-93a9-2651498ef203Configure Log Analytics extension on Azure Arc enabled Windows serversEnable VM insights on servers and machines connected to Azure through Arc enabled servers by installing the Log Analytics virtual machine extension. VM insights uses the Log Analytics agent to collect the guest OS performance data, and provides insights into their performance. See more - https://aka.ms/vminsightsdocs. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Log Analytics Contributor
2021-04-27 15:38:15
change: Minor, old suffix: preview (1.1.0-preview > 1.2.0)
Security Centera0c11ca4-5828-4384-a2f2-fd7444dd5b4dCloud Services (extended support) role instances should be configured securelyProtect your Cloud Service (extended support) role instances from attacks by ensuring they are not expolosed to any OS vulnerabilities. Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2021-04-27 15:38:15
add: a0c11ca4-5828-4384-a2f2-fd7444dd5b4d
Backup09ce66bc-1220-4153-8104-e3f51c936913Configure backup on virtual machines without a given tag to an existing recovery services vault in the same locationEnforce backup for all virtual machines by backing them up to an existing central recovery services vault in the same location and subscription as the virtual machine. Doing this is useful when there is a central team in your organization managing backups for all resources in a subscription. You can optionally exclude virtual machines containing a specified tag to control the scope of assignment. See https://aka.ms/AzureVMCentralBackupExcludeTag. Default: DeployIfNotExists
Allowed: (auditIfNotExists, AuditIfNotExists, deployIfNotExists, DeployIfNotExists, disabled, Disabled)
Virtual Machine Contributor
Backup Contributor
2021-04-27 15:38:15
change: Major (2.0.0 > 3.0.0)
SQLb219b9cf-f672-4f96-9ab0-f5a3ac5e1c13SQL Database should avoid using GRS backup redundancyDatabases should avoid using the default geo-redundant storage for backups, if data residency rules require data to stay within a specific region. Note: Azure Policy is not enforced when creating a database using T-SQL. If not explicitly specified, database with geo-redundant backup storage is created via T-SQL. Default: Deny
Allowed: (Deny, Disabled)
2021-04-27 15:38:15
change: Major (1.0.1 > 2.0.0)
Monitoring9d2b61b4-1d14-4a63-be30-d4498e7ad2cfConfigure Log Analytics extension on Azure Arc enabled Linux serversEnable VM insights on servers and machines connected to Azure through Arc enabled servers by installing the Log Analytics virtual machine extension. VM insights uses the Log Analytics agent to collect the guest OS performance data, and provides insights into their performance. See more - https://aka.ms/vminsightsdocs. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Log Analytics Contributor
2021-04-27 15:38:15
change: Minor, old suffix: preview (1.1.0-preview > 1.2.0)
Monitoring2465583e-4e78-4c15-b6be-a36cbc7c8b0fConfigure Azure Activity logs to stream to specified Log Analytics workspaceDeploys the diagnostic settings for Azure Activity to stream subscriptions audit logs to a Log Analytics workspace to monitor subscription-level events Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Monitoring Contributor
Log Analytics Contributor
2021-04-27 15:38:15
add: 2465583e-4e78-4c15-b6be-a36cbc7c8b0f
Monitoring91cb9edd-cd92-4d2f-b2f2-bdd8d065a3d4Configure Dependency agent on Azure Arc enabled Windows serversEnable VM insights on servers and machines connected to Azure through Arc enabled servers by installing the Dependency agent virtual machine extension. VM insights uses the Dependency agent to collect network metrics and discovered data about processes running on the machine and external process dependencies. See more - https://aka.ms/vminsightsdocs. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Log Analytics Contributor
2021-04-27 15:38:15
change: Patch (1.2.0 > 1.2.1)
App Serviced6545c6b-dd9d-4265-91e6-0b451e2f1c50App Service Environment should disable TLS 1.0 and 1.1TLS 1.0 and 1.1 are out-of-date protocols that do not support modern cryptographic algorithms. Disabling inbound TLS 1.0 and 1.1 traffic helps secure apps in an App Service Environment. Default: Audit
Allowed: (Audit, Deny, Disabled)
2021-04-27 15:38:15
add: d6545c6b-dd9d-4265-91e6-0b451e2f1c50
Monitoringdeacecc0-9f84-44d2-bb82-46f32d766d43Configure Dependency agent on Azure Arc enabled Linux serversEnable VM insights on servers and machines connected to Azure through Arc enabled servers by installing the Dependency agent virtual machine extension. VM insights uses the Dependency agent to collect network metrics and discovered data about processes running on the machine and external process dependencies. See more - https://aka.ms/vminsightsdocs. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Log Analytics Contributor
2021-04-27 15:38:15
change: Minor, old suffix: preview (1.1.0-preview > 1.2.0)
Backup83644c87-93dd-49fe-bf9f-6aff8fd0834eConfigure backup on virtual machines with a given tag to a new recovery services vault with a default policyEnforce backup for all virtual machines by deploying a recovery services vault in the same location and resource group as the virtual machine. Doing this is useful when different application teams in your organization are allocated separate resource groups and need to manage their own backups and restores. You can optionally include virtual machines containing a specified tag to control the scope of assignment. See https://aka.ms/AzureVMAppCentricBackupIncludeTag. Default: DeployIfNotExists
Allowed: (auditIfNotExists, AuditIfNotExists, deployIfNotExists, DeployIfNotExists, disabled, Disabled)
Virtual Machine Contributor
Backup Contributor
2021-04-27 15:38:15
change: Major, suffix remains equal (2.0.0-preview > 3.0.0-preview)
Automanage270610db-8c04-438a-a739-e8e6745b22d3[Deprecated]: Configure virtual machines to be onboarded to Azure AutomanageAzure Automanage enrolls, configures, and monitors virtual machines with best practice as defined in the Microsoft Cloud Adoption Framework for Azure. Use this policy to apply Automanage to your selected scope. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Contributor
2021-04-27 15:38:15
change: Minor (4.0.0 > 4.1.0)
App Servicefb74e86f-d351-4b8d-b034-93da7391c01fApp Service Environment should enable internal encryptionSetting InternalEncryption to true encrypts the pagefile, worker disks, and internal network traffic between the front ends and workers in an App Service Environment. To learn more, refer to https://docs.microsoft.com/azure/app-service/environment/app-service-app-service-environment-custom-settings#enable-internal-encryption. Default: Audit
Allowed: (Audit, Disabled)
2021-04-27 15:38:15
add: fb74e86f-d351-4b8d-b034-93da7391c01f
App Service33228571-70a4-4fa1-8ca1-26d0aba8d6efApp Service apps should enable outbound non-RFC 1918 traffic to Azure Virtual NetworkBy default, if one uses regional Azure Virtual Network (VNET) integration, the app only routes RFC1918 traffic into that respective virtual network. Using the API to set 'vnetRouteAllEnabled' to true enables all outbound traffic into the Azure Virtual Network. This setting allows features like network security groups and user defined routes to be used for all outbound traffic from the App Service app. Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2021-04-27 15:38:15
add: 33228571-70a4-4fa1-8ca1-26d0aba8d6ef
Security Center15fdbc87-8a47-4ee9-a2aa-9a2ea1f37554Log Analytics agent should be installed on your Cloud Services (extended support) role instancesSecurity Center collects data from your Cloud Services (extended support) role instances to monitor for security vulnerabilities and threats. Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2021-04-27 15:38:15
add: 15fdbc87-8a47-4ee9-a2aa-9a2ea1f37554
Security Center1e378679-f122-4a96-a739-a7729c46e1aaCloud Services (extended support) role instances should have an endpoint protection solution installedProtect your Cloud Services (extended support) role instances from threats and vulnerabilities by ensuring an endpoint protection solution is installed on them. Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2021-04-27 15:38:15
add: 1e378679-f122-4a96-a739-a7729c46e1aa
Security Center4df26ba8-026d-45b0-9521-bffa44d741d2Cloud Services (extended support) role instances should have system updates installedSecure your Cloud Services (extended support) role instances by ensuring the latest security and critical updates are installed on them. Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2021-04-27 15:38:15
add: 4df26ba8-026d-45b0-9521-bffa44d741d2
Backup98d0b9f8-fd90-49c9-88e2-d3baf3b0dd86Configure backup on virtual machines without a given tag to a new recovery services vault with a default policyEnforce backup for all virtual machines by deploying a recovery services vault in the same location and resource group as the virtual machine. Doing this is useful when different application teams in your organization are allocated separate resource groups and need to manage their own backups and restores. You can optionally exclude virtual machines containing a specified tag to control the scope of assignment. See https://aka.ms/AzureVMAppCentricBackupExcludeTag. Default: DeployIfNotExists
Allowed: (auditIfNotExists, AuditIfNotExists, deployIfNotExists, DeployIfNotExists, disabled, Disabled)
Virtual Machine Contributor
Backup Contributor
2021-04-27 15:38:15
change: Major, suffix remains equal (2.0.0-preview > 3.0.0-preview)
Cognitive Services2bdd0062-9d75-436e-89df-487dd8e4b3c7[Deprecated]: Cognitive Services accounts should enable data encryptionThis policy is deprecated. Cognitive Services have data encryption enforced. Default: Disabled
Allowed: (Audit, Deny, Disabled)
2021-04-21 13:28:46
change: Major, new suffix: deprecated (1.0.0 > 2.0.0-deprecated)
Key Vault9d4fad1f-5189-4a42-b29e-cf7929c6b6df[Preview]: Configure Azure Key Vaults with private endpointsPrivate endpoints connect your virtual networks to Azure services without a public IP address at the source or destination. By mapping private endpoints to key vault, you can reduce data leakage risks. Learn more about private links at: https://aka.ms/akvprivatelink. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Network Contributor
Key Vault Contributor
2021-04-21 13:28:46
add: 9d4fad1f-5189-4a42-b29e-cf7929c6b6df
Cognitive Servicesdb630ad5-52e9-4f4d-9c44-53912fe40053Configure Cognitive Services accounts with private endpointsPrivate endpoints connect your virtual networks to Azure services without a public IP address at the source or destination. By mapping private endpoints to Cognitive Services, you'll reduce the potential for data leakage. Learn more about private links at: https://go.microsoft.com/fwlink/?linkid=2129800. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Network Contributor
Cognitive Services Contributor
2021-04-21 13:28:46
add: db630ad5-52e9-4f4d-9c44-53912fe40053
Key Vaulta6abeaec-4d90-4a02-805f-6b26c4d3fbe9[Preview]: Azure Key Vaults should use private linkAzure Private Link lets you connect your virtual networks to Azure services without a public IP address at the source or destination. The Private Link platform handles the connectivity between the consumer and services over the Azure backbone network. By mapping private endpoints to key vault, you can reduce data leakage risks. Learn more about private links at: https://aka.ms/akvprivatelink. Default: Audit
Allowed: (Audit, Deny, Disabled)
2021-04-21 13:28:46
add: a6abeaec-4d90-4a02-805f-6b26c4d3fbe9
Guest Configuration5752e6d6-1206-46d8-8ab1-ecc2f71a8112Windows web servers should be configured to use secure communication protocolsTo protect the privacy of information communicated over the Internet, your web servers should use the latest version of the industry-standard cryptographic protocol, Transport Layer Security (TLS). TLS secures communications over a network by using security certificates to encrypt a connection between machines. Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2021-04-21 13:28:46
change: Minor (2.0.0 > 2.1.0)
Cognitive Services11566b39-f7f7-4b82-ab06-68d8700eb0a4[Deprecated]: Cognitive Services accounts should use customer owned storage or enable data encryption.This policy is deprecated. Cognitive Services have data encryption enforced. Default: Disabled
Allowed: (Audit, Deny, Disabled)
2021-04-21 13:28:46
change: Major, new suffix: deprecated (1.0.0 > 2.0.0-deprecated)
Cognitive Servicescddd188c-4b82-4c48-a19d-ddf74ee66a01Cognitive Services should use private linkAzure Private Link lets you connect your virtual networks to Azure services without a public IP address at the source or destination. The Private Link platform handles the connectivity between the consumer and services over the Azure backbone network. By mapping private endpoints to Cognitive Services, you'll reduce the potential for data leakage. Learn more about private links at: https://go.microsoft.com/fwlink/?linkid=2129800. Default: Audit
Allowed: (Audit, Disabled)
2021-04-21 13:28:46
add: cddd188c-4b82-4c48-a19d-ddf74ee66a01
Backup2e94d99a-8a36-4563-bc77-810d8893b671[Preview]: Azure Recovery Services vaults should use customer-managed keys for encrypting backup dataUse customer-managed keys to manage the encryption at rest of your backup data. By default, customer data is encrypted with service-managed keys, but customer-managed keys are commonly required to meet regulatory compliance standards. Customer-managed keys enable the data to be encrypted with an Azure Key Vault key created and owned by you. You have full control and responsibility for the key lifecycle, including rotation and management. Learn more at https://aka.ms/AB-CmkEncryption. Default: Audit
Allowed: (Audit, Deny, Disabled)
2021-04-21 13:28:46
add: 2e94d99a-8a36-4563-bc77-810d8893b671
Key Vaultac673a9a-f77d-4846-b2d8-a57f8e1c01d4[Preview]: Configure Azure Key Vaults to use private DNS zonesUse private DNS zones to override the DNS resolution for a private endpoint. A private DNS zone links to your virtual network to resolve to key vault. Learn more at: https://aka.ms/akvprivatelink. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Network Contributor
2021-04-21 13:28:46
add: ac673a9a-f77d-4846-b2d8-a57f8e1c01d4
Cognitive Servicesc4bc6f10-cb41-49eb-b000-d5ab82e2a091Configure Cognitive Services accounts to use private DNS zonesUse private DNS zones to override the DNS resolution for a private endpoint. A private DNS zone links to your virtual network to resolve to Cognitive Services accounts. Learn more at: https://go.microsoft.com/fwlink/?linkid=2110097. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Network Contributor
2021-04-21 13:28:46
add: c4bc6f10-cb41-49eb-b000-d5ab82e2a091
Key Vault55615ac9-af46-4a59-874e-391cc3dfb490[Preview]: Azure Key Vault should disable public network accessDisable public network access for your key vault so that it's not accessible over the public internet. This can reduce data leakage risks. Learn more at: https://aka.ms/akvprivatelink. Default: Audit
Allowed: (Audit, Deny, Disabled)
2021-04-21 13:28:46
change: Minor, suffix remains equal (1.0.2-preview > 1.1.0-preview)
Azure Active Directory3aa87b5a-7813-4b57-8a43-42dd9df5aaa7Azure Active Directory Domain Services managed domains should use TLS 1.2 only modeUse TLS 1.2 only mode for your managed domains. By default, Azure AD Domain Services enables the use of ciphers such as NTLM v1 and TLS v1. These ciphers may be required for some legacy applications, but are considered weak and can be disabled if you don't need them. When TLS 1.2 only mode is enabled, any client making a request that is not using TLS 1.2 will fail. Learn more at https://docs.microsoft.com/azure/active-directory-domain-services/secure-your-domain. Default: Audit
Allowed: (Audit, Deny, Disabled)
2021-04-21 13:28:46
add: 3aa87b5a-7813-4b57-8a43-42dd9df5aaa7
Backup013e242c-8828-4970-87b3-ab247555486dAzure Backup should be enabled for Virtual MachinesEnsure protection of your Azure Virtual Machines by enabling Azure Backup. Azure Backup is a secure and cost effective data protection solution for Azure. Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2021-04-21 13:28:46
change: Major (1.0.1 > 2.0.0)
Key Vaultac673a9a-f77d-4846-b2d8-a57f8e1c01dc[Preview]: Configure key vaults to disable public network accessDisable public network access for your key vault so that it's not accessible over the public internet. This can reduce data leakage risks. Learn more at: https://aka.ms/akvprivatelink. Default: Modify
Allowed: (Modify, Disabled)
Key Vault Contributor
2021-04-21 13:28:46
add: ac673a9a-f77d-4846-b2d8-a57f8e1c01dc
Automanage270610db-8c04-438a-a739-e8e6745b22d3[Deprecated]: Configure virtual machines to be onboarded to Azure AutomanageAzure Automanage enrolls, configures, and monitors virtual machines with best practice as defined in the Microsoft Cloud Adoption Framework for Azure. Use this policy to apply Automanage to your selected scope. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Contributor
2021-04-13 13:28:43
change: Major (3.0.0 > 4.0.0)
Data Factory8b0323be-cc25-4b61-935d-002c3798c6eaAzure Data Factory should use private linkAzure Private Link lets you connect your virtual network to Azure services without a public IP address at the source or destination. The Private Link platform handles the connectivity between the consumer and services over the Azure backbone network. By mapping private endpoints to Azure Data Factory, data leakage risks are reduced. Learn more about private links at: https://docs.microsoft.com/azure/data-factory/data-factory-private-link. Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2021-04-13 13:28:43
add: 8b0323be-cc25-4b61-935d-002c3798c6ea
Computef39f5f49-4abf-44de-8c70-0756997bfb51Disk access resources should use private linkAzure Private Link lets you connect your virtual network to Azure services without a public IP address at the source or destination. The Private Link platform handles the connectivity between the consumer and services over the Azure backbone network. By mapping private endpoints to diskAccesses, data leakage risks are reduced. Learn more about private links at: https://aka.ms/disksprivatelinksdoc. Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2021-04-07 13:27:17
add: f39f5f49-4abf-44de-8c70-0756997bfb51
Backup83644c87-93dd-49fe-bf9f-6aff8fd0834eConfigure backup on virtual machines with a given tag to a new recovery services vault with a default policyEnforce backup for all virtual machines by deploying a recovery services vault in the same location and resource group as the virtual machine. Doing this is useful when different application teams in your organization are allocated separate resource groups and need to manage their own backups and restores. You can optionally include virtual machines containing a specified tag to control the scope of assignment. See https://aka.ms/AzureVMAppCentricBackupIncludeTag. Default: DeployIfNotExists
Allowed: (auditIfNotExists, AuditIfNotExists, deployIfNotExists, DeployIfNotExists, disabled, Disabled)
Virtual Machine Contributor
Backup Contributor
2021-04-07 13:27:17
change: Major, suffix remains equal (1.0.0-preview > 2.0.0-preview)
Machine Learning6a6f7384-63de-11ea-bc55-0242ac130003[Preview]: Configure code signing for training code for specified Azure Machine Learning computesProvide code signing for training code in specified Azure Machine Learning computes and can be assigned at the workspace. For more information, visit https://aka.ms/amlpolicydoc. Default: enforceSetting
Allowed: (enforceSetting, disabled)
2021-04-07 13:27:17
change: Minor, suffix remains equal (2.0.0-preview > 2.1.0-preview)
Backup09ce66bc-1220-4153-8104-e3f51c936913Configure backup on virtual machines without a given tag to an existing recovery services vault in the same locationEnforce backup for all virtual machines by backing them up to an existing central recovery services vault in the same location and subscription as the virtual machine. Doing this is useful when there is a central team in your organization managing backups for all resources in a subscription. You can optionally exclude virtual machines containing a specified tag to control the scope of assignment. See https://aka.ms/AzureVMCentralBackupExcludeTag. Default: DeployIfNotExists
Allowed: (auditIfNotExists, AuditIfNotExists, deployIfNotExists, DeployIfNotExists, disabled, Disabled)
Virtual Machine Contributor
Backup Contributor
2021-04-07 13:27:17
change: Major (1.1.0 > 2.0.0)
Compute582bd7a6-a5f6-4dc6-b9dc-9cb81fe0d4c5Configure disk access resources with private endpointsPrivate endpoints connect your virtual networks to Azure services without a public IP address at the source or destination. By mapping private endpoints to disk access resources, you can reduce data leakage risks. Learn more about private links at: https://aka.ms/disksprivatelinksdoc. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Contributor
2021-04-07 13:27:17
add: 582bd7a6-a5f6-4dc6-b9dc-9cb81fe0d4c5
Backup345fa903-145c-4fe1-8bcd-93ec2adccde8Configure backup on virtual machines with a given tag to an existing recovery services vault in the same locationEnforce backup for all virtual machines by backing them up to an existing central recovery services vault in the same location and subscription as the virtual machine. Doing this is useful when there is a central team in your organization managing backups for all resources in a subscription. You can optionally include virtual machines containing a specified tag to control the scope of assignment. See https://aka.ms/AzureVMCentralBackupIncludeTag. Default: DeployIfNotExists
Allowed: (auditIfNotExists, AuditIfNotExists, deployIfNotExists, DeployIfNotExists, disabled, Disabled)
Virtual Machine Contributor
Backup Contributor
2021-04-07 13:27:17
change: Major, suffix remains equal (1.0.0-preview > 2.0.0-preview)
Machine Learning53c70b02-63dd-11ea-bc55-0242ac130003[Preview]: Configure allowed module authors for specified Azure Machine Learning computesProvide allowed module authors in specified Azure Machine Learning computes and can be assigned at the workspace. For more information, visit https://aka.ms/amlpolicydoc. Default: enforceSetting
Allowed: (enforceSetting, disabled)
2021-04-07 13:27:17
change: Minor, suffix remains equal (2.0.0-preview > 2.1.0-preview)
Data Factory496ca26b-f669-4322-a1ad-06b7b5e41882Configure private endpoints for Data factoriesPrivate endpoints connect your virtual network to Azure services without a public IP address at the source or destination. By mapping private endpoints to your Azure Data Factory, you can reduce data leakage risks. Learn more at: https://docs.microsoft.com/azure/data-factory/data-factory-private-link. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Data Factory Contributor
2021-04-07 13:27:17
add: 496ca26b-f669-4322-a1ad-06b7b5e41882
Data Factory86cd96e1-1745-420d-94d4-d3f2fe415aa4Configure private DNS zones for private endpoints that connect to Azure Data FactoryPrivate DNS records allow private connections to private endpoints. Private endpoint connections allow secure communication by enabling private connectivity to your Azure Data Factory without a need for public IP addresses at the source or destination. For more information on private endpoints and DNS zones in Azure Data Factory, see https://docs.microsoft.com/azure/data-factory/data-factory-private-link. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Network Contributor
2021-04-07 13:27:17
add: 86cd96e1-1745-420d-94d4-d3f2fe415aa4
Compute8405fdab-1faf-48aa-b702-999c9c172094Managed disks should disable public network accessDisabling public network access improves security by ensuring that a managed disk isn't exposed on the public internet. Creating private endpoints can limit exposure of managed disks. Learn more at: https://aka.ms/disksprivatelinksdoc. Default: Audit
Allowed: (Audit, Disabled)
2021-04-07 13:27:17
add: 8405fdab-1faf-48aa-b702-999c9c172094
Compute8426280e-b5be-43d9-979e-653d12a08638Configure managed disks to disable public network accessDisable public network access for your managed disk resource so that it's not accessible over the public internet. This can reduce data leakage risks. Learn more at: https://aka.ms/disksprivatelinksdoc. Default: Modify
Allowed: (Modify, Disabled)
Contributor
2021-04-07 13:27:17
add: 8426280e-b5be-43d9-979e-653d12a08638
Machine Learning3948394e-63de-11ea-bc55-0242ac130003[Preview]: Configure an approval endpoint called prior to jobs running for specified Azure Machine Learning computesConfigure an approval endpoint called prior to jobs running for specified Azure Machine Learning computes and can be assigned at the workspace. For more information. For more information, visit https://aka.ms/amlpolicydoc. Default: enforceSetting
Allowed: (enforceSetting, disabled)
2021-04-07 13:27:17
change: Minor, suffix remains equal (2.0.0-preview > 2.1.0-preview)
Backup98d0b9f8-fd90-49c9-88e2-d3baf3b0dd86Configure backup on virtual machines without a given tag to a new recovery services vault with a default policyEnforce backup for all virtual machines by deploying a recovery services vault in the same location and resource group as the virtual machine. Doing this is useful when different application teams in your organization are allocated separate resource groups and need to manage their own backups and restores. You can optionally exclude virtual machines containing a specified tag to control the scope of assignment. See https://aka.ms/AzureVMAppCentricBackupExcludeTag. Default: DeployIfNotExists
Allowed: (auditIfNotExists, AuditIfNotExists, deployIfNotExists, DeployIfNotExists, disabled, Disabled)
Virtual Machine Contributor
Backup Contributor
2021-04-07 13:27:17
change: Major, suffix remains equal (1.0.0-preview > 2.0.0-preview)
Data Factory08b1442b-7789-4130-8506-4f99a97226a7Configure Data Factories to disable public network accessDisable public network access for your Data Factory so that it is not accessible over the public internet. This can reduce data leakage risks. Learn more at: https://docs.microsoft.com/azure/data-factory/data-factory-private-link. Default: Modify
Allowed: (Modify, Disabled)
Data Factory Contributor
2021-04-07 13:27:17
add: 08b1442b-7789-4130-8506-4f99a97226a7
Machine Learning1d413020-63de-11ea-bc55-0242ac130003[Preview]: Configure log filter expressions and datastore to be used for full logs for specified Azure Machine Learning computesProvide log filter expression and datastore to be used for full logs in specified Azure Machine Learning computes and can be assigned at the workspace. For more information, visit https://aka.ms/amlpolicydoc. Default: enforceSetting
Allowed: (enforceSetting, disabled)
2021-03-31 14:35:06
change: Major, suffix remains equal (1.0.0-preview > 2.0.0-preview)
Machine Learning6a6f7384-63de-11ea-bc55-0242ac130003[Preview]: Configure code signing for training code for specified Azure Machine Learning computesProvide code signing for training code in specified Azure Machine Learning computes and can be assigned at the workspace. For more information, visit https://aka.ms/amlpolicydoc. Default: enforceSetting
Allowed: (enforceSetting, disabled)
2021-03-31 14:35:06
change: Major, suffix remains equal (1.0.0-preview > 2.0.0-preview)
Machine Learning3948394e-63de-11ea-bc55-0242ac130003[Preview]: Configure an approval endpoint called prior to jobs running for specified Azure Machine Learning computesConfigure an approval endpoint called prior to jobs running for specified Azure Machine Learning computes and can be assigned at the workspace. For more information. For more information, visit https://aka.ms/amlpolicydoc. Default: enforceSetting
Allowed: (enforceSetting, disabled)
2021-03-31 14:35:06
change: Major, suffix remains equal (1.0.0-preview > 2.0.0-preview)
Network94de2ad3-e0c1-4caf-ad78-5d47bbc83d3dVirtual networks should be protected by Azure DDoS Protection StandardProtect your virtual networks against volumetric and protocol attacks with Azure DDoS Protection Standard. For more information, visit https://aka.ms/ddosprotectiondocs. Default: Modify
Allowed: (Modify, Audit, Disabled)
Network Contributor
2021-03-31 14:35:06
add: 94de2ad3-e0c1-4caf-ad78-5d47bbc83d3d
Machine Learning53c70b02-63dd-11ea-bc55-0242ac130003[Preview]: Configure allowed module authors for specified Azure Machine Learning computesProvide allowed module authors in specified Azure Machine Learning computes and can be assigned at the workspace. For more information, visit https://aka.ms/amlpolicydoc. Default: enforceSetting
Allowed: (enforceSetting, disabled)
2021-03-31 14:35:06
change: Major, suffix remains equal (1.0.1-preview > 2.0.0-preview)
VM Image Builder2154edb9-244f-4741-9970-660785bccdaaVM Image Builder templates should use private linkAzure Private Link lets you connect your virtual network to Azure services without a public IP address at the source or destination. The Private Link platform handles the connectivity between the consumer and services over the Azure backbone network. By mapping private endpoints to your VM Image Builder building resources, data leakage risks are reduced. Learn more about private links at: https://docs.microsoft.com/azure/virtual-machines/linux/image-builder-networking#deploy-using-an-existing-vnet. Default: Audit
Allowed: (Audit, Disabled, Deny)
2021-03-31 14:35:06
change: Minor (1.0.1 > 1.1.0)
SQLf4c68484-132f-41f9-9b6d-3e4b1cb55036Configure SQL servers to have auditing enabledTo ensure the operations performed against your SQL assets are captured, SQL servers should have auditing enabled. This is sometimes required for compliance with regulatory standards. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
SQL Security Manager
Storage Account Contributor
2021-03-31 14:35:06
change: Minor (1.1.0 > 1.2.0)
Synapseac7891a4-ac7a-4ba0-9ae9-c923e5a225eeConfigure Synapse workspaces to have auditing enabledTo ensure the operations performed against your SQL assets are captured, Synapse workspaces should have auditing enabled. This is sometimes required for compliance with regulatory standards. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
SQL Security Manager
Storage Account Contributor
2021-03-31 14:35:06
change: Minor (1.0.0 > 1.1.0)
Searchb698b005-b660-4837-b833-a7aaab26ddbaConfigure Azure Cognitive Search services with private endpointsPrivate endpoints connect your virtual network to Azure services without a public IP address at the source or destination. By mapping private endpoints to your Azure Cognitive Search service, you can reduce data leakage risks. Learn more at: https://aka.ms/azure-cognitive-search/inbound-private-endpoints. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Network Contributor
Search Service Contributor
2021-03-31 14:35:06
add: b698b005-b660-4837-b833-a7aaab26ddba
SignalRef45854f-b33f-49a3-8041-9057e915d88fConfigure private endpoints to Azure SignalR ServicePrivate endpoints connect your virtual network to Azure services without a public IP address at the source or destination. By mapping private endpoints to Azure SignalR Service resources, you can reduce data leakage risks. Learn more at https://aka.ms/asrs/privatelink. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Network Contributor
SignalR/Web PubSub Contributor
2021-03-31 14:35:06
add: ef45854f-b33f-49a3-8041-9057e915d88f
Machine Learning77eeea86-7e81-4a7d-9067-de844d096752[Preview]: Configure allowed Python packages for specified Azure Machine Learning computesProvide allowed Python packages in specified Azure Machine Learning computes and can be assigned at the workspace. For more information, visit https://aka.ms/amlpolicydoc. Default: enforceSetting
Allowed: (enforceSetting, disabled)
2021-03-31 14:35:06
change: Major, suffix remains equal (1.0.0-preview > 2.0.0-preview)
Machine Learning5853517a-63de-11ea-bc55-0242ac130003[Preview]: Configure allowed registries for specified Azure Machine Learning computesProvide registries that are allowed in specified Azure Machine Learning computes and can be assigned at the workspace. For more information, visit https://aka.ms/amlpolicydoc. Default: enforceSetting
Allowed: (enforceSetting, disabled)
2021-03-31 14:35:06
change: Major, suffix remains equal (1.0.0-preview > 2.0.0-preview)
Guest Configuration480d0f91-30af-4a76-9afb-f5710ac52b09Private endpoints for Guest Configuration assignments should be enabledPrivate endpoint connections enforce secure communication by enabling private connectivity to Guest Configuration for virtual machines. Virtual machines will be non-compliant unless they have the tag, 'EnablePrivateNetworkGC'. This tag enforces secure communication through private connectivity to Guest Configuration for Virtual Machines. Private connectivity limits access to traffic coming only from known networks and prevents access from all other IP addresses, including within Azure. Default: Audit
Allowed: (Audit, Deny, Disabled)
2021-03-31 14:35:06
add: 480d0f91-30af-4a76-9afb-f5710ac52b09
Search0fda3595-9f2b-4592-8675-4231d6fa82feAzure Cognitive Search services should use private linkAzure Private Link lets you connect your virtual network to Azure services without a public IP address at the source or destination. The Private Link platform handles the connectivity between the consumer and services over the Azure backbone network. By mapping private endpoints to Azure Cognitive Search, data leakage risks are reduced. Learn more about private links at: https://aka.ms/azure-cognitive-search/inbound-private-endpoints. Default: Audit
Allowed: (Audit, Disabled)
2021-03-31 14:35:06
add: 0fda3595-9f2b-4592-8675-4231d6fa82fe
Monitoring752154a7-1e0f-45c6-a880-ac75a7e4f648Public IP addresses should have resource logs enabled for Azure DDoS Protection StandardEnable resource logs for public IP addressess in diagnostic settings to stream to a Log Analytics workspace. Get detailed visibility into attack traffic and actions taken to mitigate DDoS attacks via notifications, reports and flow logs. Default: AuditIfNotExists
Allowed: (AuditIfNotExists, DeployIfNotExists, Disabled)
Log Analytics Contributor
2021-03-31 14:35:06
add: 752154a7-1e0f-45c6-a880-ac75a7e4f648
Storage6f8f98a4-f108-47cb-8e98-91a0d85cd474Configure diagnostic settings for storage accounts to Log Analytics workspaceDeploys the diagnostic settings for storage accounts to stream resource logs to a Log Analytics workspace when any storage account which is missing this diagnostic settings is created or updated. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Monitoring Contributor
Log Analytics Contributor
2021-03-24 14:32:48
change: Minor (1.1.0 > 1.3.0)
Computeac34a73f-9fa5-4067-9247-a3ecae514468Configure disaster recovery on virtual machines by enabling replication via Azure Site RecoveryVirtual machines without disaster recovery configurations are vulnerable to outages and other disruptions. If the virtual machine does not already have disaster recovery configured, this would initiate the same by enabling replication using preset configurations to facilitate business continuity. You can optionally include/exclude virtual machines containing a specified tag to control the scope of assignment. To learn more about disaster recovery, visit https://aka.ms/asr-doc. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Owner
2021-03-24 14:32:48
change: Minor (1.1.0 > 1.2.0)
SQL89099bee-89e0-4b26-a5f4-165451757743SQL servers with auditing to storage account destination should be configured with 90 days retention or higherFor incident investigation purposes, we recommend setting the data retention for your SQL Server' auditing to storage account destination to at least 90 days. Confirm that you are meeting the necessary retention rules for the regions in which you are operating. This is sometimes required for compliance with regulatory standards. Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2021-03-24 14:32:48
change: Major (2.1.0 > 3.0.0)
Cognitive Services46aa9b05-0e60-4eae-a88b-1e9d374fa515Cognitive Services accounts should use customer owned storageUse customer owned storage to control the data stored at rest in Cognitive Services. To learn more about customer owned storage, visit https://aka.ms/cogsvc-cmk. Default: Audit
Allowed: (Audit, Deny, Disabled)
2021-03-24 14:32:48
change: Major (1.0.0 > 2.0.0)
Kubernetes8dfab9c4-fe7b-49ad-85e4-1e9be085358f[Preview]: Azure Arc enabled Kubernetes clusters should have Microsoft Defender for Cloud extension installedMicrosoft Defender for Cloud extension for Azure Arc provides threat protection for your Arc enabled Kubernetes clusters. The extension collects data from all nodes in the cluster and sends it to the Azure Defender for Kubernetes backend in the cloud for further analysis. Learn more in https://docs.microsoft.com/azure/defender-for-cloud/defender-for-containers-enable?pivots=defender-for-container-arc. Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2021-03-24 14:32:48
add: 8dfab9c4-fe7b-49ad-85e4-1e9be085358f
Machine Learning40cec1dd-a100-4920-b15b-3024fe8901abAzure Machine Learning workspaces should use private linkAzure Private Link lets you connect your virtual network to Azure services without a public IP address at the source or destination. The Private Link platform handles the connectivity between the consumer and services over the Azure backbone network. By mapping private endpoints to Azure Machine Learning workspaces, data leakage risks are reduced. Learn more about private links at: https://docs.microsoft.com/azure/machine-learning/how-to-configure-private-link. Default: Audit
Allowed: (Audit, Deny, Disabled)
2021-03-24 14:32:48
change: Minor (1.0.0 > 1.1.0)
Storage970f84d8-71b6-4091-9979-ace7e3fb6dbbHPC Cache accounts should use customer-managed key for encryptionManage encryption at rest of Azure HPC Cache with customer-managed keys. By default, customer data is encrypted with service-managed keys, but customer-managed keys are commonly required to meet regulatory compliance standards. Customer-managed keys enable the data to be encrypted with an Azure Key Vault key created and owned by you. You have full control and responsibility for the key lifecycle, including rotation and management. Default: Audit
Allowed: (Audit, Disabled, Deny)
2021-03-24 14:32:48
change: Major (1.0.0 > 2.0.0)
Synapse529ea018-6afc-4ed4-95bd-7c9ee47b00bcSynapse workspaces with SQL auditing to storage account destination should be configured with 90 days retention or higherFor incident investigation purposes, we recommend setting the data retention for your Synapse workspace' SQL auditing to storage account destination to at least 90 days. Confirm that you are meeting the necessary retention rules for the regions in which you are operating. This is sometimes required for compliance with regulatory standards. Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2021-03-24 14:32:48
change: Major (1.0.0 > 2.0.0)
Kubernetesd46c275d-1680-448d-b2ec-e495a3b6cc89Kubernetes cluster services should only use allowed external IPsUse allowed external IPs to avoid the potential attack (CVE-2020-8554) in a Kubernetes cluster. For more information, see https://aka.ms/kubepolicydoc. Default: Audit
Allowed: (audit, Audit, deny, Deny, disabled, Disabled)
2021-03-16 16:49:20
change: Major, old suffix: preview (2.0.0-preview > 3.0.0)
Container Registryd0793b48-0edc-4296-a390-4c75d1bdfd71Container registries should not allow unrestricted network accessAzure container registries by default accept connections over the internet from hosts on any network. To protect your registries from potential threats, allow access from only specific public IP addresses or address ranges. If your registry doesn't have an IP/firewall rule or a configured virtual network, it will appear in the unhealthy resources. Learn more about Container Registry network rules here: https://aka.ms/acr/portal/public-network and here https://aka.ms/acr/vnet. Default: Audit
Allowed: (Audit, Deny, Disabled)
2021-03-16 16:49:20
change: Minor (1.0.1 > 1.1.0)
Container Registryd85c6833-7d33-4cf5-a915-aaa2de84405fConfigure Container registries with private endpointsPrivate endpoints connect your virtual network to Azure services without a public IP address at the source or destination. By mapping private endpoints to your premium container registry resources, you can reduce data leakage risks. Learn more at: https://aka.ms/privateendpoints and https://aka.ms/acr/private-link. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Contributor
2021-03-16 16:49:20
add: d85c6833-7d33-4cf5-a915-aaa2de84405f
Computeac34a73f-9fa5-4067-9247-a3ecae514468Configure disaster recovery on virtual machines by enabling replication via Azure Site RecoveryVirtual machines without disaster recovery configurations are vulnerable to outages and other disruptions. If the virtual machine does not already have disaster recovery configured, this would initiate the same by enabling replication using preset configurations to facilitate business continuity. You can optionally include/exclude virtual machines containing a specified tag to control the scope of assignment. To learn more about disaster recovery, visit https://aka.ms/asr-doc. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Owner
2021-03-16 16:49:20
change: Minor (1.0.0 > 1.1.0)
Container Registrybd560fc0-3c69-498a-ae9f-aa8eb7de0e13Container registries should have SKUs that support Private LinksAzure Private Link lets you connect your virtual network to Azure services without a public IP address at the source or destination. The private link platform handles the connectivity between the consumer and services over the Azure backbone network. By mapping private endpoints to your container registries instead of the entire service, data leakage risks are reduced. Learn more at: https://aka.ms/acr/private-link. Default: Audit
Allowed: (Audit, Deny, Disabled)
2021-03-16 16:49:20
add: bd560fc0-3c69-498a-ae9f-aa8eb7de0e13
Container Registrya3701552-92ea-433e-9d17-33b7f1208fc9Configure Container registries to disable public network accessDisable public network access for your Container Registry resource so that it's not accessible over the public internet. This can reduce data leakage risks. Learn more at https://aka.ms/acr/portal/public-network and https://aka.ms/acr/private-link. Default: Modify
Allowed: (Modify, Disabled)
Contributor
2021-03-16 16:49:20
add: a3701552-92ea-433e-9d17-33b7f1208fc9
Monitoring91cb9edd-cd92-4d2f-b2f2-bdd8d065a3d4Configure Dependency agent on Azure Arc enabled Windows serversEnable VM insights on servers and machines connected to Azure through Arc enabled servers by installing the Dependency agent virtual machine extension. VM insights uses the Dependency agent to collect network metrics and discovered data about processes running on the machine and external process dependencies. See more - https://aka.ms/vminsightsdocs. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Log Analytics Contributor
2021-03-16 16:49:20
change: Minor, old suffix: preview (1.1.0-preview > 1.2.0)
Machine Learning7838fd83-5cbb-4b5d-888c-bfa240972597Configure Azure Machine Learning workspaces with private endpointsPrivate endpoints connect your virtual network to Azure services without a public IP address at the source or destination. By mapping private endpoints to your Azure Machine Learning workspace, you can reduce data leakage risks. Learn more about private links at: https://docs.microsoft.com/azure/machine-learning/how-to-configure-private-link. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Network Contributor
2021-03-16 16:49:20
add: 7838fd83-5cbb-4b5d-888c-bfa240972597
Machine Learning40cec1dd-a100-4920-b15b-3024fe8901abAzure Machine Learning workspaces should use private linkAzure Private Link lets you connect your virtual network to Azure services without a public IP address at the source or destination. The Private Link platform handles the connectivity between the consumer and services over the Azure backbone network. By mapping private endpoints to Azure Machine Learning workspaces, data leakage risks are reduced. Learn more about private links at: https://docs.microsoft.com/azure/machine-learning/how-to-configure-private-link. Default: Audit
Allowed: (Audit, Deny, Disabled)
2021-03-16 16:49:20
change: Patch (1.0.1 > 1.0.0)
Machine Learningee40564d-486e-4f68-a5ca-7a621edae0fbConfigure Azure Machine Learning workspace to use private DNS zonesUse private DNS zones to override the DNS resolution for a private endpoint. A private DNS zone links to your virtual network to resolve to Azure Machine Learning workspaces. Learn more at: https://docs.microsoft.com/azure/machine-learning/how-to-network-security-overview. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Network Contributor
2021-03-16 16:49:20
add: ee40564d-486e-4f68-a5ca-7a621edae0fb
Container Registrye9585a95-5b8c-4d03-b193-dc7eb5ac4c32Configure Container registries to use private DNS zonesUse private DNS zones to override the DNS resolution for a private endpoint. A private DNS zone links to your virtual network to resolve to your Container Registry. Learn more at: https://aka.ms/privatednszone and https://aka.ms/acr/private-link. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Network Contributor
2021-03-16 16:49:20
add: e9585a95-5b8c-4d03-b193-dc7eb5ac4c32
Container Registry0fdf0491-d080-4575-b627-ad0e843cba0fPublic network access should be disabled for Container registriesDisabling public network access improves security by ensuring that container registries are not exposed on the public internet. Creating private endpoints can limit exposure of container registry resources. Learn more at: https://aka.ms/acr/portal/public-network and https://aka.ms/acr/private-link. Default: Audit
Allowed: (Audit, Deny, Disabled)
2021-03-16 16:49:20
add: 0fdf0491-d080-4575-b627-ad0e843cba0f
Migrate7590a335-57cf-4c95-babd-ecbc8fafeb1fConfigure Azure Migrate resources to use private DNS zonesUse private DNS zones to override the DNS resolution for a private endpoint. A private DNS zone links to your virtual network to resolve to your Azure Migrate project. Learn more at: https://aka.ms/privatednszone. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Network Contributor
2021-03-16 16:49:20
add: 7590a335-57cf-4c95-babd-ecbc8fafeb1f
Security Center13ce0167-8ca6-4048-8e6b-f996402e3c1bConfigure machines to receive a vulnerability assessment providerAzure Defender includes vulnerability scanning for your machines at no extra cost. You don't need a Qualys license or even a Qualys account - everything's handled seamlessly inside Security Center. When you enable this policy, Azure Defender automatically deploys the Qualys vulnerability assessment provider to all supported machines that don't already have it installed. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Security Admin
2021-03-10 14:52:46
change: Major, suffix remains equal (1.0.0-preview > 2.0.0-preview)
SignalR62a3ae95-8169-403e-a2d2-b82141448092Modify Azure SignalR Service resources to disable public network accessTo improve the security of Azure SignalR Service resource, ensure that it isn't exposed to the public internet and can only be accessed from a private endpoint. Disable the public network access property as described in https://aka.ms/asrs/networkacls. This option disables access from any public address space outside the Azure IP range, and denies all logins that match IP or virtual network-based firewall rules. This reduces data leakage risks. Default: Modify
Allowed: (Modify, Disabled)
SignalR/Web PubSub Contributor
2021-03-09 14:37:41
add: 62a3ae95-8169-403e-a2d2-b82141448092
Automationc0c3130e-7dda-4187-aed0-ee4a472eaa60Configure private endpoint connections on Azure Automation accountsPrivate endpoint connections allow secure communication by enabling private connectivity to Azure Automation accounts without a need for public IP addresses at the source or destination. Learn more about private endpoints in Azure Automation at https://docs.microsoft.com/azure/automation/how-to/private-link-security. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Network Contributor
Contributor
2021-03-09 14:37:41
add: c0c3130e-7dda-4187-aed0-ee4a472eaa60
Container Instance0aa61e00-0a01-4a3c-9945-e93cffedf0e6Azure Container Instance container group should use customer-managed key for encryptionSecure your containers with greater flexibility using customer-managed keys. When you specify a customer-managed key, that key is used to protect and control access to the key that encrypts your data. Using customer-managed keys provides additional capabilities to control rotation of the key encryption key or cryptographically erase data. Default: Audit
Allowed: (Audit, Disabled, Deny)
2021-03-09 14:37:41
add: 0aa61e00-0a01-4a3c-9945-e93cffedf0e6
Security Center13ce0167-8ca6-4048-8e6b-f996402e3c1bConfigure machines to receive a vulnerability assessment providerAzure Defender includes vulnerability scanning for your machines at no extra cost. You don't need a Qualys license or even a Qualys account - everything's handled seamlessly inside Security Center. When you enable this policy, Azure Defender automatically deploys the Qualys vulnerability assessment provider to all supported machines that don't already have it installed. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Security Admin
2021-03-09 14:37:41
add: 13ce0167-8ca6-4048-8e6b-f996402e3c1b
Kubernetes040732e8-d947-40b8-95d6-854c95024bf8Azure Kubernetes Service Private Clusters should be enabledEnable the private cluster feature for your Azure Kubernetes Service cluster to ensure network traffic between your API server and your node pools remains on the private network only. This is a common requirement in many regulatory and industry compliance standards. Default: Audit
Allowed: (Audit, Deny, Disabled)
2021-03-09 14:37:41
add: 040732e8-d947-40b8-95d6-854c95024bf8
Security Center86b3d65f-7626-441e-b690-81a8b71cff60System updates should be installed on your machinesMissing security system updates on your servers will be monitored by Azure Security Center as recommendations Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2021-03-09 14:37:41
change: Major (3.0.0 > 4.0.0)
Internet of Thingsaaa64d2d-2fa3-45e5-b332-0b031b9b30e8Configure IoT Hub device provisioning instances to use private DNS zonesUse private DNS zones to override the DNS resolution for a private endpoint. A private DNS zone links to your virtual network to resolve to an IoT Hub device provisioning service instance. Learn more at: https://aka.ms/iotdpsvnet. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Contributor
2021-03-09 14:37:41
add: aaa64d2d-2fa3-45e5-b332-0b031b9b30e8
Security Centerbdc59948-5574-49b3-bb91-76b7c986428dAzure Defender for DNS should be enabledAzure Defender for DNS provides an additional layer of protection for your cloud resources by continuously monitoring all DNS queries from your Azure resources. Azure Defender alerts you about suspicious activity at the DNS layer. Learn more about the capabilities of Azure Defender for DNS at https://aka.ms/defender-for-dns . Enabling this Azure Defender plan results in charges. Learn about the pricing details per region on Security Center's pricing page: https://aka.ms/pricing-security-center . Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2021-03-09 14:37:41
add: bdc59948-5574-49b3-bb91-76b7c986428d
Kubernetes233a2a17-77ca-4fb1-9b6b-69223d272a44Kubernetes cluster services should listen only on allowed portsRestrict services to listen only on allowed ports to secure access to the Kubernetes cluster. This policy is generally available for Kubernetes Service (AKS), and preview for AKS Engine and Azure Arc enabled Kubernetes. For more information, see https://aka.ms/kubepolicydoc. Default: Deny
Allowed: (audit, Audit, deny, Deny, disabled, Disabled)
2021-03-09 14:37:41
change: Minor (6.0.0 > 6.1.0)
Cognitive Services47ba1dd7-28d9-4b07-a8d5-9813bed64e0cConfigure Cognitive Services accounts to disable public network accessDisable public network access for your Cognitive Services resource so that it's not accessible over the public internet. This can reduce data leakage risks. Learn more at: https://go.microsoft.com/fwlink/?linkid=2129800. Default: Modify
Allowed: (Disabled, Modify)
Contributor
2021-03-09 14:37:41
add: 47ba1dd7-28d9-4b07-a8d5-9813bed64e0c
Storage7433c107-6db4-4ad1-b57a-a76dce0154a1Storage accounts should be limited by allowed SKUsRestrict the set of storage account SKUs that your organization can deploy. Default: Deny
Allowed: (Audit, Deny, Disabled)
2021-03-09 14:37:41
change: Minor (1.0.0 > 1.1.0)
Synapse1e5ed725-f16c-478b-bd4b-7bfa2f7940b9Configure Azure Synapse workspaces to use private DNS zonesUse private DNS zones to override the DNS resolution for a private endpoint. A private DNS zone links to your virtual network to resolve to Azure Synapse workspace. Learn more at: https://docs.microsoft.com/azure/synapse-analytics/security/how-to-connect-to-workspace-from-restricted-network#appendix-dns-registration-for-private-endpoint. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Network Contributor
2021-03-09 14:37:41
add: 1e5ed725-f16c-478b-bd4b-7bfa2f7940b9
Internet of Things9b75ea5b-c796-4c99-aaaf-21c204daac43Configure IoT Hub device provisioning service instances with private endpointsPrivate endpoints connect your virtual network to Azure services without a public IP address at the source or destination. By mapping private endpoints to IoT Hub device provisioning service, you can reduce data leakage risks. Learn more about private links at: https://aka.ms/iotdpsvnet. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Contributor
2021-03-09 14:37:41
add: 9b75ea5b-c796-4c99-aaaf-21c204daac43
Security Centerc3d20c29-b36d-48fe-808b-99a87530ad99Azure Defender for Resource Manager should be enabledAzure Defender for Resource Manager automatically monitors the resource management operations in your organization. Azure Defender detects threats and alerts you about suspicious activity. Learn more about the capabilities of Azure Defender for Resource Manager at https://aka.ms/defender-for-resource-manager . Enabling this Azure Defender plan results in charges. Learn about the pricing details per region on Security Center's pricing page: https://aka.ms/pricing-security-center . Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2021-03-09 14:37:41
add: c3d20c29-b36d-48fe-808b-99a87530ad99
Synapsee04e5000-cd89-451d-bb21-a14d24ff9c73Auditing on Synapse workspace should be enabledAuditing on your Synapse workspace should be enabled to track database activities across all databases on the dedicated SQL pools and save them in an audit log. Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2021-03-09 14:37:41
add: e04e5000-cd89-451d-bb21-a14d24ff9c73
Cosmos DBa63cc0bd-cda4-4178-b705-37dc439d3e0fConfigure CosmosDB accounts to use private DNS zonesUse private DNS zones to override the DNS resolution for a private endpoint. A private DNS zone links to your virtual network to resolve to CosmosDB account. Learn more at: https://aka.ms/privatednszone. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Network Contributor
2021-03-09 14:37:41
add: a63cc0bd-cda4-4178-b705-37dc439d3e0f
SQL89099bee-89e0-4b26-a5f4-165451757743SQL servers with auditing to storage account destination should be configured with 90 days retention or higherFor incident investigation purposes, we recommend setting the data retention for your SQL Server' auditing to storage account destination to at least 90 days. Confirm that you are meeting the necessary retention rules for the regions in which you are operating. This is sometimes required for compliance with regulatory standards. Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2021-03-09 14:37:41
change: Minor (2.0.1 > 2.1.0)
Kubernetesc050047b-b21b-4822-8a2d-c1e37c3c0c6aConfigure Kubernetes clusters with specified GitOps configuration using SSH secretsDeploy a 'sourceControlConfiguration' to Kubernetes clusters to assure that the clusters get their source of truth for workloads and configurations from the defined git repo. This definition requires a SSH private key secret in Key Vault. For instructions, visit https://aka.ms/K8sGitOpsPolicy. Default: DeployIfNotExists
Allowed: (auditIfNotExists, AuditIfNotExists, deployIfNotExists, DeployIfNotExists, disabled, Disabled)
Contributor
2021-03-09 14:37:41
add: c050047b-b21b-4822-8a2d-c1e37c3c0c6a
Cognitive Services0725b4dd-7e76-479c-a735-68e7ee23d5caCognitive Services accounts should disable public network accessDisabling public network access improves security by ensuring that Cognitive Services account isn't exposed on the public internet. Creating private endpoints can limit exposure of Cognitive Services account. Learn more at: https://go.microsoft.com/fwlink/?linkid=2129800. Default: Audit
Allowed: (Audit, Deny, Disabled)
2021-03-09 14:37:41
change: Patch (1.0.0 > 1.0.1)
Cosmos DB797b37f7-06b8-444c-b1ad-fc62867f335aAzure Cosmos DB should disable public network accessDisabling public network access improves security by ensuring that your CosmosDB account isn't exposed on the public internet. Creating private endpoints can limit exposure of your CosmosDB account. Learn more at: https://docs.microsoft.com/azure/cosmos-db/how-to-configure-private-endpoints#blocking-public-network-access-during-account-creation. Default: Audit
Allowed: (Audit, Deny, Disabled)
2021-03-09 14:37:41
add: 797b37f7-06b8-444c-b1ad-fc62867f335a
Service Bus1c06e275-d63d-4540-b761-71f364c2111dAzure Service Bus namespaces should use private linkAzure Private Link lets you connect your virtual network to Azure services without a public IP address at the source or destination. The Private Link platform handles the connectivity between the consumer and services over the Azure backbone network. By mapping private endpoints to Service Bus namespaces, data leakage risks are reduced. Learn more at: https://docs.microsoft.com/azure/service-bus-messaging/private-link-service. Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2021-03-09 14:37:41
add: 1c06e275-d63d-4540-b761-71f364c2111d
Logic Apps1fafeaf6-7927-4059-a50a-8eb2a7a6f2b5Logic Apps Integration Service Environment should be encrypted with customer-managed keysDeploy into Integration Service Environment to manage encryption at rest of Logic Apps data using customer-managed keys. By default, customer data is encrypted with service-managed keys, but customer-managed keys are commonly required to meet regulatory compliance standards. Customer-managed keys enable the data to be encrypted with an Azure Key Vault key created and owned by you. You have full control and responsibility for the key lifecycle, including rotation and management. Default: Audit
Allowed: (Audit, Deny, Disabled)
2021-03-09 14:37:41
add: 1fafeaf6-7927-4059-a50a-8eb2a7a6f2b5
Cache30b3dfa5-a70d-4c8e-bed6-0083858f663dConfigure Azure Cache for Redis to disable public network accessDisable public network access for your Azure Cache for Redis resource so that it's not accessible over the public internet. This helps protect the cache against data leakage risks. Default: Modify
Allowed: (Modify, Disabled)
Redis Cache Contributor
2021-03-09 14:37:41
add: 30b3dfa5-a70d-4c8e-bed6-0083858f663d
Cosmos DBb609e813-3156-4079-91fa-a8494c1471c4Configure CosmosDB accounts with private endpoints Private endpoints connect your virtual network to Azure services without a public IP address at the source or destination. By mapping private endpoints to your CosmosDB account, you can reduce data leakage risks. Learn more about private links at: https://docs.microsoft.com/azure/cosmos-db/how-to-configure-private-endpoints. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Contributor
DocumentDB Account Contributor
2021-03-09 14:37:41
add: b609e813-3156-4079-91fa-a8494c1471c4
Search9cee519f-d9c1-4fd9-9f79-24ec3449ed30Configure Azure Cognitive Search services to disable public network accessDisable public network access for your Azure Cognitive Search service so that it is not accessible over the public internet. This can reduce data leakage risks. Learn more at: https://aka.ms/azure-cognitive-search/inbound-private-endpoints. Default: Modify
Allowed: (Modify, Disabled)
Network Contributor
Search Service Contributor
2021-03-09 14:37:41
add: 9cee519f-d9c1-4fd9-9f79-24ec3449ed30
Kubernetesfebd0533-8e55-448f-b837-bd0e06f16469Kubernetes cluster containers should only use allowed imagesUse images from trusted registries to reduce the Kubernetes cluster's exposure risk to unknown vulnerabilities, security issues and malicious images. This policy is generally available for Kubernetes Service (AKS), and preview for AKS Engine and Azure Arc enabled Kubernetes. For more information, see https://aka.ms/kubepolicydoc. Default: Deny
Allowed: (audit, Audit, deny, Deny, disabled, Disabled)
2021-03-09 14:37:41
change: Minor (6.0.0 > 6.1.0)
Synapse529ea018-6afc-4ed4-95bd-7c9ee47b00bcSynapse workspaces with SQL auditing to storage account destination should be configured with 90 days retention or higherFor incident investigation purposes, we recommend setting the data retention for your Synapse workspace' SQL auditing to storage account destination to at least 90 days. Confirm that you are meeting the necessary retention rules for the regions in which you are operating. This is sometimes required for compliance with regulatory standards. Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2021-03-09 14:37:41
add: 529ea018-6afc-4ed4-95bd-7c9ee47b00bc
Storage9f766f00-8d11-464e-80e1-4091d7874074Configure Storage account to use a private link connectionPrivate endpoints connect your virtual network to Azure services without a public IP address at the source or destination. By mapping private endpoints to your storage account, you can reduce data leakage risks. Learn more about private links at - https://aka.ms/azureprivatelinkoverview Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Network Contributor
Storage Account Contributor
2021-03-09 14:37:41
add: 9f766f00-8d11-464e-80e1-4091d7874074
Cache7803067c-7d34-46e3-8c79-0ca68fc4036dAzure Cache for Redis should use private linkPrivate endpoints lets you connect your virtual network to Azure services without a public IP address at the source or destination. By mapping private endpoints to your Azure Cache for Redis instances, data leakage risks are reduced. Learn more at: https://docs.microsoft.com/azure/azure-cache-for-redis/cache-private-link. Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2021-03-09 14:37:41
add: 7803067c-7d34-46e3-8c79-0ca68fc4036d
Searchee980b6d-0eca-4501-8d54-f6290fd512c3Azure Cognitive Search services should disable public network accessDisabling public network access improves security by ensuring that your Azure Cognitive Search service is not exposed on the public internet. Creating private endpoints can limit exposure of your Search service. Learn more at: https://aka.ms/azure-cognitive-search/inbound-private-endpoints. Default: Audit
Allowed: (Audit, Deny, Disabled)
2021-03-09 14:37:41
add: ee980b6d-0eca-4501-8d54-f6290fd512c3
Synapseac7891a4-ac7a-4ba0-9ae9-c923e5a225eeConfigure Synapse workspaces to have auditing enabledTo ensure the operations performed against your SQL assets are captured, Synapse workspaces should have auditing enabled. This is sometimes required for compliance with regulatory standards. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
SQL Security Manager
Storage Account Contributor
2021-03-09 14:37:41
add: ac7891a4-ac7a-4ba0-9ae9-c923e5a225ee
Cachee016b22b-e0eb-436d-8fd7-160c4eaed6e2Configure Azure Cache for Redis to use private DNS zonesUse private DNS zones to override the DNS resolution for a private endpoint. A private DNS zone can be linked to your virtual network to resolve to Azure Cache for Redis. Learn more at: https://aka.ms/privatednszone. Default: DeployIfNotExists
Allowed: (DeployIfNotExists, Disabled)
Network Contributor
2021-03-09 14:37:41
add: e016b22b-e0eb-436d-8fd7-160c4eaed6e2
Event Hubb8564268-eb4a-4337-89be-a19db070c59dEvent Hub namespaces should use private linkAzure Private Link lets you connect your virtual network to Azure services without a public IP address at the source or destination. The Private Link platform handles the connectivity between the consumer and services over the Azure backbone network. By mapping private endpoints to Event Hub namespaces, data leakage risks are reduced. Learn more at: https://docs.microsoft.com/azure/event-hubs/private-link-service. Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2021-03-09 14:37:41
add: b8564268-eb4a-4337-89be-a19db070c59d
Storage970f84d8-71b6-4091-9979-ace7e3fb6dbbHPC Cache accounts should use customer-managed key for encryptionManage encryption at rest of Azure HPC Cache with customer-managed keys. By default, customer data is encrypted with service-managed keys, but customer-managed keys are commonly required to meet regulatory compliance standards. Customer-managed keys enable the data to be encrypted with an Azure Key Vault key created and owned by you. You have full control and responsibility for the key lifecycle, including rotation and management. Default: Audit
Allowed: (Audit, Disabled, Deny)
2021-03-09 14:37:41
add: 970f84d8-71b6-4091-9979-ace7e3fb6dbb
Kubernetes440b515e-a580-421e-abeb-b159a61ddcbc[Deprecated]: Kubernetes cluster containers should only listen on allowed portsRestrict containers to listen only on allowed ports to secure access to the Kubernetes cluster. The policy is deprecating since container port is only informative field which cannot decide the port container is actually using. For more information, see https://aka.ms/kubepolicydoc. Default: Deny
Allowed: (audit, Audit, deny, Deny, disabled, Disabled)
2021-03-09 14:37:41
change: Minor (6.0.0 > 6.1.0)
Network27960feb-a23c-4577-8d36-ef8b5f35e0beFlow logs should be enabled for every network security groupAudit for flow log resources to verify if flow log status is enabled. Enabling flow logs allows to log information about IP traffic flowing through network security group. It can be used for optimizing network flows, monitoring throughput, verifying compliance, detecting intrusions and more. Default: Audit
Allowed: (Audit, Disabled)
2021-03-09 14:37:41
add: 27960feb-a23c-4577-8d36-ef8b5f35e0be
Internet of Things859dfc91-ea35-43a6-8256-31271c363794Configure IoT Hub device provisioning service instances to disable public network accessDisable public network access for your IoT Hub device provisioning instance so that it's not accessible over the public internet. This can reduce data leakage risks. Learn more at: https://aka.ms/iotdpsvnet. Default: Modify
Allowed: (Modify, Disabled)
Contributor
2021-03-09 14:37:41
add: 859dfc91-ea35-43a6-8256-31271c363794
Storage6edd7eda-6dd8-40f7-810d-67160c639cd9Storage accounts should use private linkAzure Private Link lets you connect your virtual network to Azure services without a public IP address at the source or destination. The Private Link platform handles the connectivity between the consumer and services over the Azure backbone network. By mapping private endpoints to your storage account, data leakage risks are reduced. Learn more about private links at - https://aka.ms/azureprivatelinkoverview Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
2021-03-09 14:37:41
change: Major (1.0.0 > 2.0.0)
Logic Appsdc595cb1-1cde-45f6-8faf-f88874e1c0e1Logic Apps should be deployed into Integration Service EnvironmentDeploying Logic Apps into Integration Service Environment in a virtual network unlocks advanced Logic Apps networking and security features and provides you with greater control over your network configuration. Learn more at: https://aka.ms/integration-service-environment. Deploying into Integration Service Environment also allows encryption with customer-managed keys which provides enhanced data protection by allowing you to manage your encryption keys. This is often to meet compliance requirements. Default: Audit
Allowed: (Audit, Deny, Disabled)
2021-03-09 14:37:41
add: dc595cb1-1cde-45f6-8faf-f88874e1c0e1
SignalR21a9766a-82a5-4747-abb5-650b6dbba6d0Azure SignalR Service should disable public network accessTo improve the security of Azure SignalR Service resource, ensure that it isn't exposed to the public internet and can only be accessed from a private endpoint. Disable the public network access property as described in https://aka.ms/asrs/networkacls. This option disables access from any public address space outside the Azure IP range, and denies all logins that match IP or virtual network-based firewall rules. This reduces data leakage risks. Default: Audit
Allowed: (Audit, Deny, Disabled)
2021-03-09 14:37:41
add: 21a9766a-82a5-4747-abb5-650b6dbba6d0
Searcha049bf77-880b-470f-ba6d-9f21c530cf83Azure Cognitive Search service should use a SKU that supports private linkWith supported SKUs of Azure Cognitive Search, Azure Private Link lets you connect your virtual network to Azure services without a public IP address at the source or destination. The private link platform handles the connectivity between the consumer and services over the Azure backbone network. By mapping private endpoints to your Search service, data leakage risks are reduced. Learn more at: https://aka.ms/azure-cognitive-search/inbound-private-endpoints. Default: Audit
Allowed: (Audit, Deny, Disabled)
2021-03-09 14:37:41
add: a049bf77-880b-470f-ba6d-9f21c530cf83
Synapse72d11df1-dd8a-41f7-8925-b05b960ebafcAzure Synapse workspaces should use private linkAzure Private Link lets you connect your virtual network to Azure services without a public IP address at the source or destination. The Private Link platform handles the connectivity between the consumer and services over the Azure backbone network. By mapping private endpoints to Azure Synapse workspace, data leakage risks are reduced. Learn more about private links at: https://docs.microsoft.com/azure/synapse-analytics/security/how-to-connect-to-workspace-with-private-links. Default: Audit
Allowed: (Audit, Disabled)
2021-03-09 14:37:41
change: Patch (1.0.0 > 1.0.1)
Kubernetesa6f560f4-f582-4b67-b123-a37dcd1bf7eaConfigure Kubernetes clusters with specified GitOps configuration using HTTPS secretsDeploy a 'sourceControlConfiguration' to Kubernetes clusters to assure that the clusters get their source of truth for workloads and configurations from the defined git repo. This definition requires HTTPS user and key secrets stored in Key Vault. For instructions, visit https://aka.ms/K8sGitOpsPolicy. Default: DeployIfNotExists
Allowed: (auditIfNotExists, AuditIfNotExists, deployIfNotExists, DeployIfNotExists, disabled, Disabled)
Contributor
2021-03-09 14:37:41
add: a6f560f4-f582-4b67-b123-a37dcd1bf7ea
Cache470baccb-7e51-4549-8b1a-3e5be069f663Azure Cache for Redis should disable public network accessDisabling public network access improves security by ensuring that the Azure Cache for Redis isn't exposed on the public internet. You can limit exposure of your Azure Cache for Redis by creating private endpoints instead. Learn more at: https://docs.microsoft.com/azure/azure-cache-for-redis/cache-private-link. Default: Audit
Allowed: (Audit, Deny, Disabled)
2021-03-09 14:37:41
add: 470baccb-7e51-4549-8b1a-3e5be069f663
Cognitive Servicesfe3fd216-4f83-4fc1-8984-2bbec80a3418Cognitive Services accounts should use a managed identityAssigning a managed identity to your Cognitive Service account helps ensure secure authentication. This identity is used by this Cognitive service account to communicate with other Azure services, like Azure Key Vault, in a secure way without you having to manage any credentials. Default: Audit
Allowed: (Audit, Deny, Disabled)
2021-03-09 14:37:41
add: fe3fd216-4f83-4fc1-8984-2bbec80a3418
Computed461a302-a187-421a-89ac-84acdb4edc04Managed disks should use a specific set of disk encryption sets for the customer-managed key encryptionRequiring a specific set of disk encryption sets to be used with managed disks give you control over the keys used for encryption at rest. You are able to select the allowed encrypted sets and all others are rejected when attached to a disk. Learn more at https://aka.ms/disks-cmk. Default: Audit
Allowed: (Audit, Deny, Disabled)
2021-03-09 14:37:41
change: Major (1.0.0 > 2.0.0)
Cosmos DBda69ba51-aaf1-41e5-8651-607cd0b37088Configure CosmosDB accounts to disable public network access Disable public network access for your CosmosDB resource so that it's not accessible over the public internet. This can reduce data leakage risks. Learn more at: https://docs.microsoft.com/azure/cosmos-db/how-to-configure-private-endpoints#blocking-public-network-access-during-account-creation. Default: Modify
Allowed: (Modify, Disabled)
Contributor
DocumentDB Account Contributor
2021-03-09 14:37:41
add: da69ba51-aaf1-41e5-8651-607cd0b37088
Container Instance8af8f826-edcb-4178-b35f-851ea6fea615Azure Container Instance container group should deploy into a virtual networkSecure communication between your containers with Azure Virtual Networks. When you specify a virtual network, resources within the virtual network can securely and privately communicate with each other. Default: Audit
Allowed: (Audit, Disabled, Deny)
2021-03-09 14:37:41
add: 8af8f826-edcb-4178-b35f-851ea6fea615
API Management73ef9241-5d81-4cd4-b483-8443d1730fe5API Management service should use a SKU that supports virtual networksWith supported SKUs of API Management, deploying service into a virtual network unlocks advanced API Management networking and security features which provides you greater control over your network security configuration. Learn more at: https://aka.ms/apimvnet. Default: Audit
Allowed: (Audit, Deny, Disabled)
2021-03-09 14:37:41
add: 73ef9241-5d81-4cd4-b483-8443d1730fe5
Event Hub91678b7c-d721-4fc5-b179-3cdf74e96b1cConfigure Event Hub namespaces with private endpointsPrivate endpoints connect your virtual network to Azure services without a public IP address at the source or destination