Source | Azure Portal | ||||||||||||||||||||||
Display name | Azure Attestation providers should disable public network access | ||||||||||||||||||||||
Id | 5e7e928c-8693-4a23-9bf3-1c77b9a8fe97 | ||||||||||||||||||||||
Version | 1.0.0 Details on versioning |
||||||||||||||||||||||
Versioning |
Versions supported for Versioning: 1 1.0.0 Built-in Versioning [Preview] |
||||||||||||||||||||||
Category | Attestation Microsoft Learn |
||||||||||||||||||||||
Description | To improve the security of Azure Attestation Service, ensure that it isn't exposed to the public internet and can only be accessed from a private endpoint. Disable the public network access property as described in aka.ms/azureattestation. This option disables access from any public address space outside the Azure IP range, and denies all logins that match IP or virtual network-based firewall rules. This reduces data leakage risks. | ||||||||||||||||||||||
Mode | Indexed | ||||||||||||||||||||||
Type | BuiltIn | ||||||||||||||||||||||
Preview | False | ||||||||||||||||||||||
Deprecated | False | ||||||||||||||||||||||
Effect | Default Audit Allowed Audit, Deny, Disabled |
||||||||||||||||||||||
RBAC role(s) | none | ||||||||||||||||||||||
Rule aliases | IF (1)
|
||||||||||||||||||||||
Rule resource types | IF (1) Microsoft.Attestation/attestationProviders |
||||||||||||||||||||||
Compliance |
The following 1 compliance controls are associated with this Policy definition 'Azure Attestation providers should disable public network access' (5e7e928c-8693-4a23-9bf3-1c77b9a8fe97)
| ||||||||||||||||||||||
Initiatives usage |
|
||||||||||||||||||||||
History |
|
||||||||||||||||||||||
JSON compare | n/a | ||||||||||||||||||||||
JSON |
|