Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
40 commits
Select commit Hold shift + click to select a range
af761ad
GH 1423 - Policy PaaS should Disable Public Access for Container Apps…
4pplied Oct 27, 2023
f91351f
Merge branch 'main' of https://github.com/Azure/Enterprise-Scale into…
Springstone Nov 16, 2023
546318d
Updating Portal Accelerator MDFC VM Vulnerability Assessment to use m…
Springstone Nov 20, 2023
d19a8c2
Update vulnerability assessment provider to mdeTvm
Springstone Nov 20, 2023
4e816fe
Merge branch 'main' of https://github.com/Azure/Enterprise-Scale into…
Springstone Dec 6, 2023
f066f9b
New assignment
Springstone Dec 6, 2023
8bca6e6
Doc updates
Springstone Dec 6, 2023
f5c6aa6
Doh
Springstone Dec 6, 2023
4b893b1
Auto-update Portal experience [Springstone/4e816fe4]
github-actions[bot] Dec 6, 2023
149b7e0
Merge branch 'ZoneResilience' of https://github.com/Springstone/Enter…
Springstone Dec 6, 2023
40af2ba
Excel update
Springstone Dec 6, 2023
a9ba97c
Merge branch 'Springstone-ZoneResilience' into policy-refresh-q2fy24
Springstone Dec 6, 2023
2f95324
Initial commit
Springstone Dec 6, 2023
81509ed
Merge branch 'policy-refresh-q3fy24' of https://github.com/Azure/Ente…
Springstone Mar 12, 2024
0396a45
Fix display name typo and add backup policies
Springstone Mar 12, 2024
64e3bb0
Update policy set definitions versions, add ASR to PublicPaas and add…
Springstone Mar 12, 2024
2de93f0
Add Enforce-Backup policy set definition
Springstone Mar 12, 2024
86ceaa7
Add enforceBackup option to ESLZ portal configuration
Springstone Mar 12, 2024
f6bbaaf
What's New update for new Azure policies for backup and recovery serv…
Springstone Mar 12, 2024
8a60e16
Add Policy Refresh Q3 FY24 to Updates section
Springstone Mar 12, 2024
2ee5a7a
Add Enforce-Backup initiative and default assignment to Landing Zones…
Springstone Mar 12, 2024
54b719f
Refactor code to improve performance and readability
Springstone Mar 12, 2024
fd65c7e
Update display name for Azure Recovery Services guardrails
Springstone Mar 12, 2024
f067636
Add nonComplianceMessages to ENFORCE-BackupPolicyAssignment.json
Springstone Mar 12, 2024
eba8c7c
Fix typo in Enforce-Backup.json
Springstone Mar 12, 2024
e5ddbe5
Fix typo in Enforce-Backup.json policy set definition
Springstone Mar 12, 2024
9621f56
Update Enforce-Backup policy assignment name
Springstone Mar 12, 2024
2d99f05
Merge branch 'Azure:main' into BackupInitiative
Springstone Mar 13, 2024
63b589a
.
Springstone Mar 13, 2024
d85090a
Merge branch 'BackupInitiative' of https://github.com/Springstone/Ent…
Springstone Mar 13, 2024
ddbadf6
Merge branch 'policy-refresh-q3fy24' of https://github.com/Azure/Ente…
Springstone Mar 13, 2024
b192ba0
Update ALZ Policy Assignments v2.xlsx
Springstone Mar 13, 2024
bf187ea
Auto-update Portal experience [Springstone/805f5370]
github-actions[bot] Mar 13, 2024
26c3d50
Correct initiative version.
Springstone Mar 15, 2024
44669fb
Auto-update Portal experience [Springstone/805f5370]
github-actions[bot] Mar 15, 2024
48b0339
Merge branch 'policy-refresh-q3fy24' of https://github.com/Azure/Ente…
Springstone Mar 19, 2024
0de2f41
Auto-update Portal experience [Springstone/360f0a2f]
github-actions[bot] Mar 19, 2024
f34c95f
Add soft delete policy for Recovery Services Vaults
Springstone Mar 19, 2024
6b6ffc9
Merge branch 'BackupInitiative' of https://github.com/Springstone/Ent…
Springstone Mar 19, 2024
b6b4d7b
Auto-update Portal experience [Springstone/360f0a2f]
github-actions[bot] Mar 19, 2024
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
6 changes: 4 additions & 2 deletions docs/wiki/ALZ-Policies.md
Original file line number Diff line number Diff line change
Expand Up @@ -105,13 +105,14 @@ This management group contains all the platform child management groups, like ma

| **Policy Type** | **Count** |
| :--- | :---: |
| `Policy Definition Sets` | **9** |
| `Policy Definition Sets` | **10** |
| `Policy Definitions` | **0** |
</td></tr> </table>

| Assignment Name | Definition Name | Policy Type | Description | Effect(s) |
| -------------------------------------------------------------------------- | -------------------------------------------------------------------------- | --------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | --------- |
| **Enforce recommended guardrails for Azure Key Vault** | **Enforce recommended guardrails for Azure Key Vault** | `Policy Definition Set`, **Custom** | This policy initiative enforces minimum guardrails for Azure Key Vault: <ul><li>Key vaults should have soft delete enabled (Deny)<li>Key vaults should have purge protection enabled (Deny)<li>Key Vault secrets should have an expiration date (Audit)<li>Key Vault keys should have an expiration date (Audit)<li>Azure Key Vault should have firewall enabled (Audit)<li>Certificates should have the specified lifetime action triggers (Audit)<li>Keys should have more than the specified number of days before expiration (Audit < 90 days)<li>Secrets should have more than the specified number of days before expiration (Audit < 90 days)</ul>| Audit, Deny |
| **Enforce enhanced recovery and backup policies** | **Enforce enhanced recovery and backup policies** | `Policy Definition Set`, **Custom** | This policy initiative enforces minimum guardrails for Azure Key Vault: <ul><li>Immutability must be enabled for backup vaults<li>Immutability must be enabled for Recovery Services vaults<li>Soft delete should be enabled for Backup Vaults<li>Multi-User Authorization (MUA) must be enabled for Backup Vaults<li>Multi-User Authorization (MUA) must be enabled for Recovery Services Vaults</ul>| Audit |
| **Enable Azure Monitor for VMs**\* | **Enable Azure Monitor for VMs with Azure Monitoring Agent(AMA)** | `Policy Definition Set`, **Built-in** | This policy initiative installs the Azure Monitoring Agent (AMA) on the virtual machines (VMs) and enables Azure Monitor for them. Azure Monitor collects and analyzes data from the VMs, such as performance metrics, logs, and dependencies. | DeployIfNotExists, Disabled |
| **Enable Azure Monitor for Virtual Machine Scale Sets**\* | **Enable Azure Monitor for VMSS with Azure Monitoring Agent(AMA)** | `Policy Definition Set`, **Built-in** | This policy initiative installs the Azure Monitoring Agent (AMA) on the virtual machines scale sets (VMSS) and enables Azure Monitor for them. Azure Monitor collects and analyzes data from the VMs, such as performance metrics, logs, and dependencies. | DeployIfNotExists, Disabled |
| **Enable Azure Monitor for Hybrid Virtual Machines**\* | **Enable Azure Monitor for Hybrid VMs with AMA** | `Policy Definition Set`, **Built-in** | This policy initiative installs the Azure Monitoring Agent (AMA) on Arc-enabled servers (Hybrid) and enables Azure Monitor for them. Azure Monitor collects and analyzes data from the VMs, such as performance metrics, logs, and dependencies. | DeployIfNotExists, Disabled |
Expand Down Expand Up @@ -220,7 +221,7 @@ This is the parent management group for all the landing zone child management gr

| **Policy Type** | **Count** |
| :--- | :---: |
| `Policy Definition Sets` | **12** |
| `Policy Definition Sets` | **13** |
| `Policy Definitions` | **15** |
</td></tr> </table>

Expand All @@ -230,6 +231,7 @@ The table below provides the specific **Custom** and **Built-in** **policy defin
| ------------------------------------------------------------------------------------------------------------------- | ------------------------------------------------------------------------------------------------------------------- | ----------------------------------- | ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | ------------------------------------------------ |
| **Deny or Deploy and append TLS requirements and SSL enforcement on resources without Encryption in transit** | **Deny or Deploy and append TLS requirements and SSL enforcement on resources without Encryption in transit** | `Policy Definition Set`, **Custom** | Description TBC | Audit, AuditIfNotExists, DeployIfNotExists, Deny |
| **Enforce recommended guardrails for Azure Key Vault** | **Enforce recommended guardrails for Azure Key Vault** | `Policy Definition Set`, **Custom** | This policy initiative enforces minimum guardrails for Azure Key Vault: <ul><li>Key vaults should have soft delete enabled (Deny)<li>Key vaults should have purge protection enabled (Deny)<li>Key Vault secrets should have an expiration date (Audit)<li>Key Vault keys should have an expiration date (Audit)<li>Azure Key Vault should have firewall enabled (Audit)<li>Certificates should have the specified lifetime action triggers (Audit)<li>Keys should have more than the specified number of days before expiration (Audit < 90 days)<li>Secrets should have more than the specified number of days before expiration (Audit < 90 days)</ul>| Audit, Deny |
| **Enforce enhanced recovery and backup policies** | **Enforce enhanced recovery and backup policies** | `Policy Definition Set`, **Custom** | This policy initiative enforces minimum guardrails for Azure Key Vault: <ul><li>Immutability must be enabled for backup vaults<li>Immutability must be enabled for Recovery Services vaults<li>Soft delete should be enabled for Backup Vaults<li>Multi-User Authorization (MUA) must be enabled for Backup Vaults<li>Multi-User Authorization (MUA) must be enabled for Recovery Services Vaults</ul>| Audit |
| **Enforce Azure Compute Security Benchmark compliance auditing** | **Enforce Azure Compute Security Benchmark compliance auditing** | `Policy Definition Set`, **Custom** | This policy initiative enables Azure Compute Security Basline compliance auditing for Windows and Linux virtual machines. | AuditIfNotExists |
| **Management port access from the Internet should be blocked** | **Management port access from the Internet should be blocked** | `Policy Definition`, **Custom** | This policy denies any network security rule that allows management port access from Internet (Default port 22, 3389). | Deny |
| **Subnets should have a Network Security Group** | **Subnets should have a Network Security Group** | `Policy Definition`, **Custom** | This policy denies the creation of a subnet without a Network Security Group. NSG help to protect traffic across subnet-level. | Deny |
Expand Down
17 changes: 14 additions & 3 deletions docs/wiki/Whats-new.md
Original file line number Diff line number Diff line change
@@ -1,6 +1,7 @@
## In this Section

- [Updates](#updates)
- [🔃 Policy Refresh Q3 FY24](#-policy-refresh-q3-fy24)
- [March 2024](#march-2024)
- [February 2024](#february-2024)
- [AMA Update for the Portal Accelerator](#ama-update-for-the-portal-accelerator)
Expand Down Expand Up @@ -41,9 +42,9 @@ This article will be updated as and when changes are made to the above and anyth

Here's what's changed in Enterprise Scale/Azure Landing Zones:

### Policy Refresh FY23Q3
### 🔃 Policy Refresh Q3 FY24

- Updated `Audit-PrivateLinkDnsZones` display name to inlcude the fact it can be `audit` or `deny`
- Updated `Audit-PrivateLinkDnsZones` display name to include the fact it can be `audit` or `deny`
- Added the [Configure BotService resources to use private DNS zones](https://www.azadvertizer.net/azpolicyadvertizer/6a4e6f44-f2af-4082-9702-033c9e88b9f8.html) built-in policy to the "Deploy-Private-DNS-Zones" initiative and assignment.
- Added the [Configure Azure Managed Grafana workspaces to use private DNS zones](https://www.azadvertizer.net/azpolicyadvertizer/4c8537f8-cd1b-49ec-b704-18e82a42fd58.html) built-in policy to the "Deploy-Private-DNS-Zones" initiative and assignment.
- Added the [Configure Azure Virtual Desktop hostpool resources to use private DNS zones](https://www.azadvertizer.net/azpolicyadvertizer/9427df23-0f42-4e1e-bf99-a6133d841c4a.html) built-in policy to the "Deploy-Private-DNS-Zones" initiative and assignment.
Expand All @@ -54,6 +55,14 @@ Here's what's changed in Enterprise Scale/Azure Landing Zones:
- Added the [Configure Recovery Services vaults to use private DNS zones for backup](https://www.azadvertizer.net/azpolicyadvertizer/af783da1-4ad1-42be-800d-d19c70038820.html) built-in policy to the "Deploy-Private-DNS-Zones" initiative and assignment.
- Added the [Configure a private DNS Zone ID for table groupID](https://www.azadvertizer.net/azpolicyadvertizer/028bbd88-e9b5-461f-9424-a1b63a7bee1a.html) built-in policy to the "Deploy-Private-DNS-Zones" initiative and assignment.
- Added the [Configure a private DNS Zone ID for table_secondary groupID](https://www.azadvertizer.net/azpolicyadvertizer/c1d634a5-f73d-4cdd-889f-2cc7006eb47f.html) built-in policy to the "Deploy-Private-DNS-Zones" initiative and assignment.
- Added new initiative and default assignment for [Enforce-Backup](https://www.azadvertizer.net/azpolicyinitiativesadvertizer/Enforce-Backup.html) scoped to the Landing Zones and Platform management groups in Audit mode:
- Added the [[Preview]: Immutability must be enabled for backup vaults](https://www.azadvertizer.net/azpolicyadvertizer/2514263b-bc0d-4b06-ac3e-f262c0979018.html) built-in policy
- Added the [[Preview]: Immutability must be enabled for Recovery Services vaults](https://www.azadvertizer.net/azpolicyadvertizer/d6f6f560-14b7-49a4-9fc8-d2c3a9807868.html) built-in policy
- Added the [[Preview]: Soft delete should be enabled for Backup Vaults](https://www.azadvertizer.net/azpolicyadvertizer/9798d31d-6028-4dee-8643-46102185c016.html) built-in policy
- Added the [[Preview]: Soft delete should be enabled for Recovery Services Vaults](https://www.azadvertizer.net/azpolicyadvertizer/31b8092a-36b8-434b-9af7-5ec844364148.html) built-in policy
- Added the [[Preview]: Multi-User Authorization (MUA) must be enabled for Backup Vaults.](https://www.azadvertizer.net/azpolicyadvertizer/c58e083e-7982-4e24-afdc-be14d312389e.html) built-in policy
- Added the [[Preview]: Multi-User Authorization (MUA) must be enabled for Recovery Services Vaults.](https://www.azadvertizer.net/azpolicyadvertizer/c7031eab-0fc0-4cd9-acd0-4497bd66d91a.html) built-in policy
- Added [[Preview]: Azure Recovery Services vaults should disable public network access](https://www.azadvertizer.net/azpolicyadvertizer/9ebbbba3-4d65-4da9-bb67-b22cfaaff090.html) built-in policy to the "Deny-PublicPaaSEndpoints" initiative and assignment.
- Added new initiative and assignment to enable auditing for Trust Launch capable virtual machines which includes the following built-in policies:
- [Disks and OS image should support TrustedLaunch](https://www.azadvertizer.net/azpolicyadvertizer/b03bb370-5249-4ea4-9fce-2552e87e45fa.html)
- [Virtual Machine should have TrustedLaunch enabled](https://www.azadvertizer.net/azpolicyadvertizer/c95b54ad-0614-4633-ab29-104b01235cbf.html)
Expand Down Expand Up @@ -173,6 +182,8 @@ Yes, the Q2 Policy Refresh has been delayed due to a light past quarter and some

#### Policy

- Added ['Container Apps environment should disable public network access'](https://www.azadvertizer.net/azpolicyadvertizer/d074ddf8-01a5-4b5e-a2b8-964aed452c0a.html) to ['Deny-PublicPaaSEndpoints'.](https://www.azadvertizer.net/azpolicyinitiativesadvertizer/Deny-PublicPaaSEndpoints.html)
- Added ['Container Apps should only be accessible over HTTPS'](https://www.azadvertizer.net/azpolicyadvertizer/0e80e269-43a4-4ae9-b5bc-178126b8a5cb.html) to this ['Deny or Deploy and append TLS requirements and SSL enforcement on resources without Encryption in transit'.](https://www.azadvertizer.net/azpolicyinitiativesadvertizer/Enforce-EncryptTransit.html)
- The portal accelerator experience has been updated to include deployment of Azure Monitor baseline alerts. Details on the policies deployed can be found [here](https://aka.ms/amba/alz).
- Fixed issue with couple of Policy file names to align with the actual name of the policies
- Bug fix for [Deploy-MDFC-Config](https://www.azadvertizer.net/azpolicyinitiativesadvertizer/Deploy-MDFC-Config.html) version
Expand Down Expand Up @@ -1111,4 +1122,4 @@ Note that a number of initiatives have been updated that will fail to deploy if

#### Other

- Contoso Reference Implementation Update - Virtual WAN Hub default CIDR changed from `/16` to `/23` - closing issue [#440](https://github.com/Azure/Enterprise-Scale/issues/440)
- Contoso Reference Implementation Update - Virtual WAN Hub default CIDR changed from `/16` to `/23` - closing issue [#440](https://github.com/Azure/Enterprise-Scale/issues/440)
Binary file modified docs/wiki/media/ALZ Policy Assignments v2.xlsx
Binary file not shown.
51 changes: 51 additions & 0 deletions eslzArm/eslz-portal.json
Original file line number Diff line number Diff line change
Expand Up @@ -327,9 +327,34 @@
]
},
"visible": true
},
{
"name": "enforceBackupPlat",
"type": "Microsoft.Common.OptionsGroup",
"label": "Enforce Backup and Recovery recommended guardrails",
"defaultValue": "Yes (recommended)",
"toolTip": "If 'Yes' is selected, Azure Policy Initiative will be assigned to ensure recommended Azure Recovery Services policies are enabled.<br>Uses the custom initiative <a href=\"https://www.azadvertizer.net/azpolicyinitiativesadvertizer/Enforce-Backup.html\">Enforce enhanced recovery and backup policies</a>.",
"constraints": {
"allowedValues": [
{
"label": "Yes (recommended)",
"value": "Yes"
},
{
"label": "Audit only",
"value": "Audit"
},
{
"label": "No",
"value": "No"
}
]
},
"visible": true
}
]
},

{
"name": "multiPlatformMgmtSub",
"type": "Microsoft.Common.InfoBox",
Expand Down Expand Up @@ -3501,6 +3526,30 @@
},
"visible": true
},
{
"name": "enforceBackup",
"type": "Microsoft.Common.OptionsGroup",
"label": "Enforce Backup and Recovery recommended guardrails",
"defaultValue": "Yes (recommended)",
"toolTip": "If 'Yes' is selected, Azure Policy Initiative will be assigned to ensure recommended Azure Recovery Services policies are enabled.<br>Uses the custom initiative <a href=\"https://www.azadvertizer.net/azpolicyinitiativesadvertizer/Enforce-Backup.html\">Enforce enhanced recovery and backup policies</a>.",
"constraints": {
"allowedValues": [
{
"label": "Yes (recommended)",
"value": "Yes"
},
{
"label": "Audit only",
"value": "Audit"
},
{
"label": "No",
"value": "No"
}
]
},
"visible": true
},
{
"name": "auditAppGwWaf",
"type": "Microsoft.Common.OptionsGroup",
Expand Down Expand Up @@ -5429,6 +5478,7 @@
"denyVMUnmanagedDisk": "[steps('core').denyVMUnmanagedDisk]",
"telemetryOptOut": "[steps('core').cuaSection.telemetryOptOut]",
"enforceKvGuardrailsPlat": "[steps('management').esPlatformMgmtGroup.enforceKvGuardrailsPlat]",
"enforceBackupPlat": "[steps('management').esPlatformMgmtGroup.enforceBackupPlat]",
"enableLogAnalytics": "[steps('management').enableLogAnalytics]",
"enableChangeTracking": "[steps('management').enableChangeTracking]",
"enableUpdateMgmt": "[steps('management').enableUpdateMgmt]",
Expand Down Expand Up @@ -5520,6 +5570,7 @@
"enableSqlAudit": "[steps('landingZones').lzSection.enableSqlAudit]",
"enableStorageHttps": "[steps('landingZones').lzSection.enableStorageHttps]",
"enforceKvGuardrails": "[steps('landingZones').lzSection.enforceKvGuardrails]",
"enforceBackup": "[steps('landingZones').lzSection.enforceBackup]",
"denyHybridNetworking": "[steps('landingZones').corpSection.denyHybridNetworking]",
"auditPeDnsZones": "[steps('landingZones').corpSection.auditPeDnsZones]",
"auditAppGwWaf": "[steps('landingZones').lzSection.auditAppGwWaf]",
Expand Down
Loading