Skip to content

Commit

Permalink
Built-in Policy Release cb9cc67d
Browse files Browse the repository at this point in the history
  • Loading branch information
Azure Policy Bot committed Dec 4, 2023
1 parent 886c4df commit be637a0
Show file tree
Hide file tree
Showing 10 changed files with 34 additions and 34 deletions.
Original file line number Diff line number Diff line change
Expand Up @@ -4,11 +4,11 @@
"policyType": "BuiltIn",
"description": "This initiative includes policies that address a subset of CMMC 2.0 Level 2 practices. Additional policies will be added in upcoming releases. For more information, visit https://aka.ms/cmmc2l2-initiative.",
"metadata": {
"version": "1.4.0-preview",
"version": "1.4.1-preview",
"category": "Regulatory Compliance",
"preview": true
},
"version": "1.4.0-preview",
"version": "1.4.1-preview",
"policyDefinitionGroups": [
{
"name": "CMMC_2.0_L2_AC.L1-3.1.1",
Expand Down Expand Up @@ -1345,7 +1345,7 @@
"effect-b54ed75b-3e1a-44ac-a333-05ba39b99ff0": {
"type": "string",
"metadata": {
"displayName": "Effect for policy: Service Fabric clusters should only use Azure Active Directory for client authentication",
"displayName": "Effect for policy: Service Fabric clusters should only use Microsoft Entra ID for client authentication",
"description": "The effect determines what happens when the policy rule is evaluated to match; for more information about effects, visit https://aka.ms/policyeffects"
},
"allowedValues": [
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -4,10 +4,10 @@
"policyType": "BuiltIn",
"description": "This initiative includes policies that address a subset of Cybersecurity Maturity Model Certification (CMMC) Level 3 requirements. Additional policies will be added in upcoming releases. For more information, visit https://aka.ms/cmmc-initiative.",
"metadata": {
"version": "9.3.0",
"version": "9.3.1",
"category": "Regulatory Compliance"
},
"version": "9.3.0",
"version": "9.3.1",
"policyDefinitionGroups": [
{
"name": "CMMC_L3_AC.1.001",
Expand Down Expand Up @@ -2479,7 +2479,7 @@
"Disabled"
],
"metadata": {
"displayName": "Effect for policy: An Azure Active Directory administrator should be provisioned for SQL servers",
"displayName": "Effect for policy: A Microsoft Entra administrator should be provisioned for SQL servers",
"description": "For more information about effects, visit https://aka.ms/policyeffects"
}
},
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -4,10 +4,10 @@
"policyType": "BuiltIn",
"description": "This initiative includes policies that address a subset of DoD Impact Level 4 (IL4) controls. Additional policies will be added in upcoming releases. For more information, visit https://aka.ms/dodil4-initiative.",
"metadata": {
"version": "22.4.0",
"version": "22.4.1",
"category": "Regulatory Compliance"
},
"version": "22.4.0",
"version": "22.4.1",
"policyDefinitionGroups": [
{
"name": "DoD_IL4_R4_AC-1",
Expand Down Expand Up @@ -2283,7 +2283,7 @@
"Disabled"
],
"metadata": {
"displayName": "Effect for policy: Service Fabric clusters should only use Azure Active Directory for client authentication",
"displayName": "Effect for policy: Service Fabric clusters should only use Microsoft Entra ID for client authentication",
"description": "The effect determines what happens when the policy rule is evaluated to match; for more information about effects, visit https://aka.ms/policyeffects"
}
},
Expand Down Expand Up @@ -3178,7 +3178,7 @@
"Disabled"
],
"metadata": {
"displayName": "Effect for policy: An Azure Active Directory administrator should be provisioned for SQL servers",
"displayName": "Effect for policy: A Microsoft Entra administrator should be provisioned for SQL servers",
"description": "The effect determines what happens when the policy rule is evaluated to match; for more information about effects, visit https://aka.ms/policyeffects"
}
},
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -4,11 +4,11 @@
"policyType": "BuiltIn",
"description": "This initiative has been deprecated. The Azure Security Benchmark v2 policy set is now represented in the consolidated Azure Security Benchmark initiative, which also serves as the Azure Security Center default policy initiative. Please assign that initiative, or manage its policies and compliance results within Azure Security Center",
"metadata": {
"version": "10.3.0-deprecated",
"version": "10.3.1-deprecated",
"deprecated": true,
"category": "Regulatory Compliance"
},
"version": "10.3.0",
"version": "10.3.1",
"policyDefinitionGroups": [
{
"name": "Azure_Security_Benchmark_v2.0_NS-1",
Expand Down Expand Up @@ -638,7 +638,7 @@
"Disabled"
],
"metadata": {
"displayName": "Effect for policy: An Azure Active Directory administrator should be provisioned for SQL servers",
"displayName": "Effect for policy: A Microsoft Entra administrator should be provisioned for SQL servers",
"description": "For more information about effects, visit https://aka.ms/policyeffects"
}
},
Expand All @@ -651,7 +651,7 @@
"Disabled"
],
"metadata": {
"displayName": "Effect for policy: Service Fabric clusters should only use Azure Active Directory for client authentication",
"displayName": "Effect for policy: Service Fabric clusters should only use Microsoft Entra ID for client authentication",
"description": "For more information about effects, visit https://aka.ms/policyeffects"
}
},
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -4,11 +4,11 @@
"policyType": "BuiltIn",
"description": "This initiative includes policies that address a subset of CMMC 2.0 Level 2 practices. Additional policies will be added in upcoming releases. For more information, visit https://aka.ms/cmmc2l2-initiative.",
"metadata": {
"version": "2.5.0-preview",
"version": "2.5.1-preview",
"category": "Regulatory Compliance",
"preview": true
},
"version": "2.5.0-preview",
"version": "2.5.1-preview",
"policyDefinitionGroups": [
{
"name": "CMMC_2.0_L2_AC.L1-3.1.1",
Expand Down Expand Up @@ -1604,7 +1604,7 @@
"effect-b54ed75b-3e1a-44ac-a333-05ba39b99ff0": {
"type": "string",
"metadata": {
"displayName": "Effect for policy: Service Fabric clusters should only use Azure Active Directory for client authentication",
"displayName": "Effect for policy: Service Fabric clusters should only use Microsoft Entra ID for client authentication",
"description": "The effect determines what happens when the policy rule is evaluated to match; for more information about effects, visit https://aka.ms/policyeffects"
},
"allowedValues": [
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -4,10 +4,10 @@
"policyType": "BuiltIn",
"description": "This initiative includes policies that address a subset of Cybersecurity Maturity Model Certification (CMMC) Level 3 requirements. Additional policies will be added in upcoming releases. For more information, visit https://aka.ms/cmmc-initiative.",
"metadata": {
"version": "11.3.0",
"version": "11.3.1",
"category": "Regulatory Compliance"
},
"version": "11.3.0",
"version": "11.3.1",
"policyDefinitionGroups": [
{
"name": "CMMC_L3_AC.1.001",
Expand Down Expand Up @@ -3480,7 +3480,7 @@
"Disabled"
],
"metadata": {
"displayName": "Effect for policy: An Azure Active Directory administrator should be provisioned for SQL servers",
"displayName": "Effect for policy: A Microsoft Entra administrator should be provisioned for SQL servers",
"description": "For more information about effects, visit https://aka.ms/policyeffects"
}
},
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -4,11 +4,11 @@
"policyType": "BuiltIn",
"description": "This initiative includes policies that address a subset of Australian Government Information Security Manual (ISM) controls. Additional policies will be added in upcoming releases. For more information, visit https://aka.ms/auism-initiative.",
"metadata": {
"version": "8.2.0-preview",
"version": "8.2.1-preview",
"category": "Regulatory Compliance",
"preview": true
},
"version": "8.2.0-preview",
"version": "8.2.1-preview",
"policyDefinitionGroups": [
{
"name": "AU_ISM_100",
Expand Down Expand Up @@ -3319,7 +3319,7 @@
"Disabled"
],
"metadata": {
"displayName": "Effect for policy: An Azure Active Directory administrator should be provisioned for SQL servers",
"displayName": "Effect for policy: A Microsoft Entra administrator should be provisioned for SQL servers",
"description": "The effect determines what happens when the policy rule is evaluated to match; for more information about effects, visit https://aka.ms/policyeffects"
}
},
Expand Down Expand Up @@ -3612,7 +3612,7 @@
"Disabled"
],
"metadata": {
"displayName": "Effect for policy: Service Fabric clusters should only use Azure Active Directory for client authentication",
"displayName": "Effect for policy: Service Fabric clusters should only use Microsoft Entra ID for client authentication",
"description": "The effect determines what happens when the policy rule is evaluated to match; for more information about effects, visit https://aka.ms/policyeffects"
}
},
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -4,10 +4,10 @@
"policyType": "BuiltIn",
"description": "This initiative includes policies that address a subset of New Zealand Information Security Manual v3.5 controls. Additional policies will be added in upcoming releases. For more information, visit https://aka.ms/nzism-initiative. ",
"metadata": {
"version": "2.5.0",
"version": "2.5.1",
"category": "Regulatory Compliance"
},
"version": "2.5.0",
"version": "2.5.1",
"policyDefinitionGroups": [
{
"name": "NZ_ISM_v3.5_AC-1",
Expand Down Expand Up @@ -1100,7 +1100,7 @@
"effect-b54ed75b-3e1a-44ac-a333-05ba39b99ff0": {
"type": "string",
"metadata": {
"displayName": "Effect for policy: Service Fabric clusters should only use Azure Active Directory for client authentication",
"displayName": "Effect for policy: Service Fabric clusters should only use Microsoft Entra ID for client authentication",
"description": "The effect determines what happens when the policy rule is evaluated to match; for more information about effects, visit https://aka.ms/policyeffects"
},
"allowedValues": [
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -4,11 +4,11 @@
"policyType": "BuiltIn",
"description": "This initiative includes policies that address a subset of Reserve Bank of India IT Framework for Non-Banking Financial Companies (NBFC) controls. Additional policies will be added in upcoming releases. For more information, visit https://aka.ms/rbiitfnbfc-initiative.",
"metadata": {
"version": "2.4.0-preview",
"version": "2.4.1-preview",
"category": "Regulatory Compliance",
"preview": true
},
"version": "2.4.0-preview",
"version": "2.4.1-preview",
"policyDefinitionGroups": [
{
"name": "RBI_ITF_NBFC_v2017_6",
Expand Down Expand Up @@ -633,7 +633,7 @@
"effect-e15effd4-2278-4c65-a0da-4d6f6d1890e2": {
"type": "String",
"metadata": {
"displayName": "Effect for policy: Log Analytics Workspaces should block non-Azure Active Directory based ingestion.",
"displayName": "Effect for policy: Log Analytics Workspaces should block non-Microsoft Entra ID based ingestion.",
"description": "The effect determines what happens when the policy rule is evaluated to match; for more information about effects, visit https://aka.ms/policyeffects"
},
"allowedValues": [
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -4,11 +4,11 @@
"policyType": "BuiltIn",
"description": "This initiative has been deprecated. The Azure Security Benchmark v2 policy set is now represented in the consolidated Azure Security Benchmark initiative, which also serves as the Azure Security Center default policy initiative. Please assign that initiative, or manage its policies and compliance results within Azure Security Center",
"metadata": {
"version": "11.3.0-deprecated",
"version": "11.3.1-deprecated",
"deprecated": true,
"category": "Regulatory Compliance"
},
"version": "11.3.0",
"version": "11.3.1",
"policyDefinitionGroups": [
{
"name": "Azure_Security_Benchmark_v2.0_NS-1",
Expand Down Expand Up @@ -796,7 +796,7 @@
"Disabled"
],
"metadata": {
"displayName": "Effect for policy: An Azure Active Directory administrator should be provisioned for SQL servers",
"displayName": "Effect for policy: A Microsoft Entra administrator should be provisioned for SQL servers",
"description": "For more information about effects, visit https://aka.ms/policyeffects"
}
},
Expand All @@ -809,7 +809,7 @@
"Disabled"
],
"metadata": {
"displayName": "Effect for policy: Service Fabric clusters should only use Azure Active Directory for client authentication",
"displayName": "Effect for policy: Service Fabric clusters should only use Microsoft Entra ID for client authentication",
"description": "For more information about effects, visit https://aka.ms/policyeffects"
}
},
Expand Down

0 comments on commit be637a0

Please sign in to comment.