Source | Azure Portal | ||||||||||
Display name | [Preview]: Azure Key Vault Managed HSM Keys should have more than the specified number of days before expiration | ||||||||||
Id | ad27588c-0198-4c84-81ef-08efd0274653 | ||||||||||
Version | 1.0.1-preview Details on versioning |
||||||||||
Versioning |
Versions supported for Versioning: 1 1.0.1-preview Built-in Versioning [Preview] |
||||||||||
Category | Key Vault Microsoft Learn |
||||||||||
Description | To use this policy in preview, you must first follow these instructions at https://aka.ms/mhsmgovernance. If a key is too close to expiration, an organizational delay to rotate the key may result in an outage. Keys should be rotated at a specified number of days prior to expiration to provide sufficient time to react to a failure. | ||||||||||
Mode | Microsoft.ManagedHSM.Data | ||||||||||
Type | BuiltIn | ||||||||||
Preview | True | ||||||||||
Deprecated | False | ||||||||||
Effect | Default Audit Allowed Audit, Deny, Disabled |
||||||||||
RBAC role(s) | none | ||||||||||
Rule aliases | none | ||||||||||
Rule resource types | none | ||||||||||
Compliance | Not a Compliance control | ||||||||||
Initiatives usage |
|
||||||||||
History |
|
||||||||||
JSON compare |
compare mode:
version left:
version right:
|
||||||||||
JSON |
|