last sync: 2024-Sep-19 17:51:32 UTC

Azure Kubernetes Service Private Clusters should be enabled

Azure BuiltIn Policy definition

Source Azure Portal
Display name Azure Kubernetes Service Private Clusters should be enabled
Id 040732e8-d947-40b8-95d6-854c95024bf8
Version 1.0.1
Details on versioning
Versioning Versions supported for Versioning: 1
1.0.1
Built-in Versioning [Preview]
Category Kubernetes
Microsoft Learn
Description Enable the private cluster feature for your Azure Kubernetes Service cluster to ensure network traffic between your API server and your node pools remains on the private network only. This is a common requirement in many regulatory and industry compliance standards.
Mode Indexed
Type BuiltIn
Preview False
Deprecated False
Effect Default
Audit
Allowed
Audit, Deny, Disabled
RBAC role(s) none
Rule aliases IF (1)
Alias Namespace ResourceType Path PathIsDefault DefaultPath Modifiable
Microsoft.ContainerService/managedClusters/apiServerAccessProfile.enablePrivateCluster Microsoft.ContainerService managedClusters properties.apiServerAccessProfile.enablePrivateCluster True False
Rule resource types IF (1)
Microsoft.ContainerService/managedClusters
Compliance Not a Compliance control
Initiatives usage
Initiative DisplayName Initiative Id Initiative Category State Type
[Preview]: Control the use of AKS in a Virtual Enclave d300338e-65d1-4be3-b18e-fb4ce5715a8f VirtualEnclaves Preview BuiltIn
Enforce recommended guardrails for Kubernetes Enforce-Guardrails-Kubernetes Kubernetes GA ALZ
Public network access should be disabled for PaaS services Deny-PublicPaaSEndpoints Network GA ALZ
History
Date/Time (UTC ymd) (i) Change type Change detail
2022-10-21 16:42:13 change Patch (1.0.0 > 1.0.1)
2021-03-09 14:37:41 add 040732e8-d947-40b8-95d6-854c95024bf8
JSON compare
compare mode: version left: version right:
JSON
api-version=2021-06-01
EPAC