From be637a02b993cb6591a0fe8163eb1bce28dd56e5 Mon Sep 17 00:00:00 2001 From: Azure Policy Bot Date: Mon, 4 Dec 2023 18:41:20 +0000 Subject: [PATCH] Built-in Policy Release cb9cc67d --- .../Regulatory Compliance/CMMC_2_0_L2.json | 6 +++--- .../Azure Government/Regulatory Compliance/CMMC_L3.json | 6 +++--- .../Regulatory Compliance/DOD_IL4_audit.json | 8 ++++---- .../Azure Government/Regulatory Compliance/asb_v2.json | 8 ++++---- .../Regulatory Compliance/CMMC_2_0_L2.json | 6 +++--- .../Regulatory Compliance/CMMC_L3.json | 6 +++--- .../Regulatory Compliance/IRAP_Audit.json | 8 ++++---- .../Regulatory Compliance/NZ_ISM_Restricted_v3_5.json | 6 +++--- .../Regulatory Compliance/RBI_ITF_NBFC_v2017.json | 6 +++--- .../Regulatory Compliance/asb_v2.json | 8 ++++---- 10 files changed, 34 insertions(+), 34 deletions(-) diff --git a/built-in-policies/policySetDefinitions/Azure Government/Regulatory Compliance/CMMC_2_0_L2.json b/built-in-policies/policySetDefinitions/Azure Government/Regulatory Compliance/CMMC_2_0_L2.json index fc29e484a..3452f8564 100644 --- a/built-in-policies/policySetDefinitions/Azure Government/Regulatory Compliance/CMMC_2_0_L2.json +++ b/built-in-policies/policySetDefinitions/Azure Government/Regulatory Compliance/CMMC_2_0_L2.json @@ -4,11 +4,11 @@ "policyType": "BuiltIn", "description": "This initiative includes policies that address a subset of CMMC 2.0 Level 2 practices. Additional policies will be added in upcoming releases. For more information, visit https://aka.ms/cmmc2l2-initiative.", "metadata": { - "version": "1.4.0-preview", + "version": "1.4.1-preview", "category": "Regulatory Compliance", "preview": true }, - "version": "1.4.0-preview", + "version": "1.4.1-preview", "policyDefinitionGroups": [ { "name": "CMMC_2.0_L2_AC.L1-3.1.1", @@ -1345,7 +1345,7 @@ "effect-b54ed75b-3e1a-44ac-a333-05ba39b99ff0": { "type": "string", "metadata": { - "displayName": "Effect for policy: Service Fabric clusters should only use Azure Active Directory for client authentication", + "displayName": "Effect for policy: Service Fabric clusters should only use Microsoft Entra ID for client authentication", "description": "The effect determines what happens when the policy rule is evaluated to match; for more information about effects, visit https://aka.ms/policyeffects" }, "allowedValues": [ diff --git a/built-in-policies/policySetDefinitions/Azure Government/Regulatory Compliance/CMMC_L3.json b/built-in-policies/policySetDefinitions/Azure Government/Regulatory Compliance/CMMC_L3.json index f976eada5..6aa3d15d1 100644 --- a/built-in-policies/policySetDefinitions/Azure Government/Regulatory Compliance/CMMC_L3.json +++ b/built-in-policies/policySetDefinitions/Azure Government/Regulatory Compliance/CMMC_L3.json @@ -4,10 +4,10 @@ "policyType": "BuiltIn", "description": "This initiative includes policies that address a subset of Cybersecurity Maturity Model Certification (CMMC) Level 3 requirements. Additional policies will be added in upcoming releases. For more information, visit https://aka.ms/cmmc-initiative.", "metadata": { - "version": "9.3.0", + "version": "9.3.1", "category": "Regulatory Compliance" }, - "version": "9.3.0", + "version": "9.3.1", "policyDefinitionGroups": [ { "name": "CMMC_L3_AC.1.001", @@ -2479,7 +2479,7 @@ "Disabled" ], "metadata": { - "displayName": "Effect for policy: An Azure Active Directory administrator should be provisioned for SQL servers", + "displayName": "Effect for policy: A Microsoft Entra administrator should be provisioned for SQL servers", "description": "For more information about effects, visit https://aka.ms/policyeffects" } }, diff --git a/built-in-policies/policySetDefinitions/Azure Government/Regulatory Compliance/DOD_IL4_audit.json b/built-in-policies/policySetDefinitions/Azure Government/Regulatory Compliance/DOD_IL4_audit.json index c99488036..5132ed7b0 100644 --- a/built-in-policies/policySetDefinitions/Azure Government/Regulatory Compliance/DOD_IL4_audit.json +++ b/built-in-policies/policySetDefinitions/Azure Government/Regulatory Compliance/DOD_IL4_audit.json @@ -4,10 +4,10 @@ "policyType": "BuiltIn", "description": "This initiative includes policies that address a subset of DoD Impact Level 4 (IL4) controls. Additional policies will be added in upcoming releases. For more information, visit https://aka.ms/dodil4-initiative.", "metadata": { - "version": "22.4.0", + "version": "22.4.1", "category": "Regulatory Compliance" }, - "version": "22.4.0", + "version": "22.4.1", "policyDefinitionGroups": [ { "name": "DoD_IL4_R4_AC-1", @@ -2283,7 +2283,7 @@ "Disabled" ], "metadata": { - "displayName": "Effect for policy: Service Fabric clusters should only use Azure Active Directory for client authentication", + "displayName": "Effect for policy: Service Fabric clusters should only use Microsoft Entra ID for client authentication", "description": "The effect determines what happens when the policy rule is evaluated to match; for more information about effects, visit https://aka.ms/policyeffects" } }, @@ -3178,7 +3178,7 @@ "Disabled" ], "metadata": { - "displayName": "Effect for policy: An Azure Active Directory administrator should be provisioned for SQL servers", + "displayName": "Effect for policy: A Microsoft Entra administrator should be provisioned for SQL servers", "description": "The effect determines what happens when the policy rule is evaluated to match; for more information about effects, visit https://aka.ms/policyeffects" } }, diff --git a/built-in-policies/policySetDefinitions/Azure Government/Regulatory Compliance/asb_v2.json b/built-in-policies/policySetDefinitions/Azure Government/Regulatory Compliance/asb_v2.json index adf9c3f79..2d0af4cb1 100644 --- a/built-in-policies/policySetDefinitions/Azure Government/Regulatory Compliance/asb_v2.json +++ b/built-in-policies/policySetDefinitions/Azure Government/Regulatory Compliance/asb_v2.json @@ -4,11 +4,11 @@ "policyType": "BuiltIn", "description": "This initiative has been deprecated. The Azure Security Benchmark v2 policy set is now represented in the consolidated Azure Security Benchmark initiative, which also serves as the Azure Security Center default policy initiative. Please assign that initiative, or manage its policies and compliance results within Azure Security Center", "metadata": { - "version": "10.3.0-deprecated", + "version": "10.3.1-deprecated", "deprecated": true, "category": "Regulatory Compliance" }, - "version": "10.3.0", + "version": "10.3.1", "policyDefinitionGroups": [ { "name": "Azure_Security_Benchmark_v2.0_NS-1", @@ -638,7 +638,7 @@ "Disabled" ], "metadata": { - "displayName": "Effect for policy: An Azure Active Directory administrator should be provisioned for SQL servers", + "displayName": "Effect for policy: A Microsoft Entra administrator should be provisioned for SQL servers", "description": "For more information about effects, visit https://aka.ms/policyeffects" } }, @@ -651,7 +651,7 @@ "Disabled" ], "metadata": { - "displayName": "Effect for policy: Service Fabric clusters should only use Azure Active Directory for client authentication", + "displayName": "Effect for policy: Service Fabric clusters should only use Microsoft Entra ID for client authentication", "description": "For more information about effects, visit https://aka.ms/policyeffects" } }, diff --git a/built-in-policies/policySetDefinitions/Regulatory Compliance/CMMC_2_0_L2.json b/built-in-policies/policySetDefinitions/Regulatory Compliance/CMMC_2_0_L2.json index e0fd7ace7..134564572 100644 --- a/built-in-policies/policySetDefinitions/Regulatory Compliance/CMMC_2_0_L2.json +++ b/built-in-policies/policySetDefinitions/Regulatory Compliance/CMMC_2_0_L2.json @@ -4,11 +4,11 @@ "policyType": "BuiltIn", "description": "This initiative includes policies that address a subset of CMMC 2.0 Level 2 practices. Additional policies will be added in upcoming releases. For more information, visit https://aka.ms/cmmc2l2-initiative.", "metadata": { - "version": "2.5.0-preview", + "version": "2.5.1-preview", "category": "Regulatory Compliance", "preview": true }, - "version": "2.5.0-preview", + "version": "2.5.1-preview", "policyDefinitionGroups": [ { "name": "CMMC_2.0_L2_AC.L1-3.1.1", @@ -1604,7 +1604,7 @@ "effect-b54ed75b-3e1a-44ac-a333-05ba39b99ff0": { "type": "string", "metadata": { - "displayName": "Effect for policy: Service Fabric clusters should only use Azure Active Directory for client authentication", + "displayName": "Effect for policy: Service Fabric clusters should only use Microsoft Entra ID for client authentication", "description": "The effect determines what happens when the policy rule is evaluated to match; for more information about effects, visit https://aka.ms/policyeffects" }, "allowedValues": [ diff --git a/built-in-policies/policySetDefinitions/Regulatory Compliance/CMMC_L3.json b/built-in-policies/policySetDefinitions/Regulatory Compliance/CMMC_L3.json index cc833a719..ddb30873a 100644 --- a/built-in-policies/policySetDefinitions/Regulatory Compliance/CMMC_L3.json +++ b/built-in-policies/policySetDefinitions/Regulatory Compliance/CMMC_L3.json @@ -4,10 +4,10 @@ "policyType": "BuiltIn", "description": "This initiative includes policies that address a subset of Cybersecurity Maturity Model Certification (CMMC) Level 3 requirements. Additional policies will be added in upcoming releases. For more information, visit https://aka.ms/cmmc-initiative.", "metadata": { - "version": "11.3.0", + "version": "11.3.1", "category": "Regulatory Compliance" }, - "version": "11.3.0", + "version": "11.3.1", "policyDefinitionGroups": [ { "name": "CMMC_L3_AC.1.001", @@ -3480,7 +3480,7 @@ "Disabled" ], "metadata": { - "displayName": "Effect for policy: An Azure Active Directory administrator should be provisioned for SQL servers", + "displayName": "Effect for policy: A Microsoft Entra administrator should be provisioned for SQL servers", "description": "For more information about effects, visit https://aka.ms/policyeffects" } }, diff --git a/built-in-policies/policySetDefinitions/Regulatory Compliance/IRAP_Audit.json b/built-in-policies/policySetDefinitions/Regulatory Compliance/IRAP_Audit.json index 8a7a4c0a8..b77669298 100644 --- a/built-in-policies/policySetDefinitions/Regulatory Compliance/IRAP_Audit.json +++ b/built-in-policies/policySetDefinitions/Regulatory Compliance/IRAP_Audit.json @@ -4,11 +4,11 @@ "policyType": "BuiltIn", "description": "This initiative includes policies that address a subset of Australian Government Information Security Manual (ISM) controls. Additional policies will be added in upcoming releases. For more information, visit https://aka.ms/auism-initiative.", "metadata": { - "version": "8.2.0-preview", + "version": "8.2.1-preview", "category": "Regulatory Compliance", "preview": true }, - "version": "8.2.0-preview", + "version": "8.2.1-preview", "policyDefinitionGroups": [ { "name": "AU_ISM_100", @@ -3319,7 +3319,7 @@ "Disabled" ], "metadata": { - "displayName": "Effect for policy: An Azure Active Directory administrator should be provisioned for SQL servers", + "displayName": "Effect for policy: A Microsoft Entra administrator should be provisioned for SQL servers", "description": "The effect determines what happens when the policy rule is evaluated to match; for more information about effects, visit https://aka.ms/policyeffects" } }, @@ -3612,7 +3612,7 @@ "Disabled" ], "metadata": { - "displayName": "Effect for policy: Service Fabric clusters should only use Azure Active Directory for client authentication", + "displayName": "Effect for policy: Service Fabric clusters should only use Microsoft Entra ID for client authentication", "description": "The effect determines what happens when the policy rule is evaluated to match; for more information about effects, visit https://aka.ms/policyeffects" } }, diff --git a/built-in-policies/policySetDefinitions/Regulatory Compliance/NZ_ISM_Restricted_v3_5.json b/built-in-policies/policySetDefinitions/Regulatory Compliance/NZ_ISM_Restricted_v3_5.json index 5bcf0b174..e530f77f2 100644 --- a/built-in-policies/policySetDefinitions/Regulatory Compliance/NZ_ISM_Restricted_v3_5.json +++ b/built-in-policies/policySetDefinitions/Regulatory Compliance/NZ_ISM_Restricted_v3_5.json @@ -4,10 +4,10 @@ "policyType": "BuiltIn", "description": "This initiative includes policies that address a subset of New Zealand Information Security Manual v3.5 controls. Additional policies will be added in upcoming releases. For more information, visit https://aka.ms/nzism-initiative. ", "metadata": { - "version": "2.5.0", + "version": "2.5.1", "category": "Regulatory Compliance" }, - "version": "2.5.0", + "version": "2.5.1", "policyDefinitionGroups": [ { "name": "NZ_ISM_v3.5_AC-1", @@ -1100,7 +1100,7 @@ "effect-b54ed75b-3e1a-44ac-a333-05ba39b99ff0": { "type": "string", "metadata": { - "displayName": "Effect for policy: Service Fabric clusters should only use Azure Active Directory for client authentication", + "displayName": "Effect for policy: Service Fabric clusters should only use Microsoft Entra ID for client authentication", "description": "The effect determines what happens when the policy rule is evaluated to match; for more information about effects, visit https://aka.ms/policyeffects" }, "allowedValues": [ diff --git a/built-in-policies/policySetDefinitions/Regulatory Compliance/RBI_ITF_NBFC_v2017.json b/built-in-policies/policySetDefinitions/Regulatory Compliance/RBI_ITF_NBFC_v2017.json index 4418b423c..0e19d25d2 100644 --- a/built-in-policies/policySetDefinitions/Regulatory Compliance/RBI_ITF_NBFC_v2017.json +++ b/built-in-policies/policySetDefinitions/Regulatory Compliance/RBI_ITF_NBFC_v2017.json @@ -4,11 +4,11 @@ "policyType": "BuiltIn", "description": "This initiative includes policies that address a subset of Reserve Bank of India IT Framework for Non-Banking Financial Companies (NBFC) controls. Additional policies will be added in upcoming releases. For more information, visit https://aka.ms/rbiitfnbfc-initiative.", "metadata": { - "version": "2.4.0-preview", + "version": "2.4.1-preview", "category": "Regulatory Compliance", "preview": true }, - "version": "2.4.0-preview", + "version": "2.4.1-preview", "policyDefinitionGroups": [ { "name": "RBI_ITF_NBFC_v2017_6", @@ -633,7 +633,7 @@ "effect-e15effd4-2278-4c65-a0da-4d6f6d1890e2": { "type": "String", "metadata": { - "displayName": "Effect for policy: Log Analytics Workspaces should block non-Azure Active Directory based ingestion.", + "displayName": "Effect for policy: Log Analytics Workspaces should block non-Microsoft Entra ID based ingestion.", "description": "The effect determines what happens when the policy rule is evaluated to match; for more information about effects, visit https://aka.ms/policyeffects" }, "allowedValues": [ diff --git a/built-in-policies/policySetDefinitions/Regulatory Compliance/asb_v2.json b/built-in-policies/policySetDefinitions/Regulatory Compliance/asb_v2.json index 065740608..118c4ce85 100644 --- a/built-in-policies/policySetDefinitions/Regulatory Compliance/asb_v2.json +++ b/built-in-policies/policySetDefinitions/Regulatory Compliance/asb_v2.json @@ -4,11 +4,11 @@ "policyType": "BuiltIn", "description": "This initiative has been deprecated. The Azure Security Benchmark v2 policy set is now represented in the consolidated Azure Security Benchmark initiative, which also serves as the Azure Security Center default policy initiative. Please assign that initiative, or manage its policies and compliance results within Azure Security Center", "metadata": { - "version": "11.3.0-deprecated", + "version": "11.3.1-deprecated", "deprecated": true, "category": "Regulatory Compliance" }, - "version": "11.3.0", + "version": "11.3.1", "policyDefinitionGroups": [ { "name": "Azure_Security_Benchmark_v2.0_NS-1", @@ -796,7 +796,7 @@ "Disabled" ], "metadata": { - "displayName": "Effect for policy: An Azure Active Directory administrator should be provisioned for SQL servers", + "displayName": "Effect for policy: A Microsoft Entra administrator should be provisioned for SQL servers", "description": "For more information about effects, visit https://aka.ms/policyeffects" } }, @@ -809,7 +809,7 @@ "Disabled" ], "metadata": { - "displayName": "Effect for policy: Service Fabric clusters should only use Azure Active Directory for client authentication", + "displayName": "Effect for policy: Service Fabric clusters should only use Microsoft Entra ID for client authentication", "description": "For more information about effects, visit https://aka.ms/policyeffects" } },