last sync: 2025-Apr-29 17:15:47 UTC

[Preview]: Control the use of Key Vault in a Virtual Enclave

Azure BuiltIn Policy Initiative (PolicySet)

Source Azure Portal
Display name[Preview]: Control the use of Key Vault in a Virtual Enclave
Id4f4dba0f-a5ee-494b-8df7-f9727dea6f37
Version1.0.0-preview
Details on versioning
Versioning Versions supported for Versioning: 1
1.0.0-preview
Built-in Versioning [Preview]
CategoryVirtualEnclaves
Microsoft Learn
DescriptionThis initiative deploys Azure policies for Key Vaults ensuring boundary protection of this resource while it operates within the logically separated structure of Azure Virtual Enclaves. https://aka.ms/VirtualEnclaves
Cloud environmentsAzureCloud = true
AzureChinaCloud = unknown
AzureUSGovernment = true
Available in AzUSGovThe PolicySet is available in AzureUSGovernment cloud. Version: '1.0.0-preview'
Repository: Azure-Policy 4f4dba0f-a5ee-494b-8df7-f9727dea6f37
TypeBuiltIn
DeprecatedFalse
PreviewTrue
Policy-used summary
Policy types Policy states Policy categories
Total Policies: 2
Builtin Policies: 2
Static Policies: 0
GA: 2
1 categories:
Key Vault: 2
Policy-used
Policy DisplayName Policy Id Category Version Versioning Effect Roles# Roles State policy in AzUSGov
Azure Key Vault should disable public network access 405c5871-3e91-4644-8a63-58e19d68ff5b Key Vault 1.1.0 1x
1.1.0
Default
Audit
Allowed
Audit, Deny, Disabled
0 GA true
Key vaults should have soft delete enabled 1e66c121-a66a-4b1f-9b83-0fd99bf0fc2d Key Vault 3.0.0 1x
3.0.0
Default
Audit
Allowed
Audit, Deny, Disabled
0 GA true
Roles used No Roles used
History
Date/Time (UTC ymd) (i) Changes
2024-01-17 19:06:27 add Initiative 4f4dba0f-a5ee-494b-8df7-f9727dea6f37
JSON compare n/a
JSON
api-version=2023-04-01
EPAC