Skip to content

Commit 09193ae

Browse files
authored
Merge pull request #276313 from davidsmatlak/ds-policy-regcomp-20240524-1
[AUTOGEN] Policy RegComp: Samples for 2024-05-24 (PR 1 of 4)
2 parents 6c9bf21 + 4da6c38 commit 09193ae

File tree

100 files changed

+242
-242
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

100 files changed

+242
-242
lines changed

articles/governance/policy/samples/australia-ism.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Regulatory Compliance details for Australian Government ISM PROTECTED
33
description: Details of the Australian Government ISM PROTECTED Regulatory Compliance built-in initiative. Each control is mapped to one or more Azure Policy definitions that assist with assessment.
4-
ms.date: 05/01/2024
4+
ms.date: 05/24/2024
55
ms.topic: sample
66
ms.custom: generated
77
---
@@ -11,7 +11,7 @@ The following article details how the Azure Policy Regulatory Compliance built-i
1111
definition maps to **compliance domains** and **controls** in Australian Government ISM PROTECTED.
1212
For more information about this compliance standard, see
1313
[Australian Government ISM PROTECTED](https://www.cyber.gov.au/acsc/view-all-content/ism). To understand
14-
_Ownership_, see [Azure Policy policy definition](../concepts/definition-structure.md#policy-type) and
14+
_Ownership_, review the [policy type](../concepts/definition-structure-basics.md#policy-type) and
1515
[Shared responsibility in the cloud](../../../security/fundamentals/shared-responsibility.md).
1616

1717
The following mappings are to the **Australian Government ISM PROTECTED** controls. Many of the controls

articles/governance/policy/samples/azure-security-benchmark.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Regulatory Compliance details for Microsoft cloud security benchmark
33
description: Details of the Microsoft cloud security benchmark Regulatory Compliance built-in initiative. Each control is mapped to one or more Azure Policy definitions that assist with assessment.
4-
ms.date: 05/01/2024
4+
ms.date: 05/24/2024
55
ms.topic: sample
66
ms.custom: generated
77
---
@@ -11,7 +11,7 @@ The following article details how the Azure Policy Regulatory Compliance built-i
1111
definition maps to **compliance domains** and **controls** in Microsoft cloud security benchmark.
1212
For more information about this compliance standard, see
1313
[Microsoft cloud security benchmark](/security/benchmark/azure/introduction). To understand
14-
_Ownership_, see [Azure Policy policy definition](../concepts/definition-structure.md#policy-type) and
14+
_Ownership_, review the [policy type](../concepts/definition-structure-basics.md#policy-type) and
1515
[Shared responsibility in the cloud](../../../security/fundamentals/shared-responsibility.md).
1616

1717
The following mappings are to the **Microsoft cloud security benchmark** controls. Many of the controls
@@ -533,7 +533,7 @@ initiative definition.
533533

534534
|Name<br /><sub>(Azure portal)</sub> |Description |Effect(s) |Version<br /><sub>(GitHub)</sub> |
535535
|---|---|---|---|
536-
|[Email notification for high severity alerts should be enabled](https://portal.azure.com/#blade/Microsoft_Azure_Policy/PolicyDetailBlade/definitionId/%2Fproviders%2FMicrosoft.Authorization%2FpolicyDefinitions%2F6e2593d9-add6-4083-9c9b-4b7d2188c899) |To ensure the relevant people in your organization are notified when there is a potential security breach in one of your subscriptions, enable email notifications for high severity alerts in Security Center. |AuditIfNotExists, Disabled |[1.1.0](https://github.com/Azure/azure-policy/blob/master/built-in-policies/policyDefinitions/Security%20Center/ASC_Email_notification.json) |
536+
|[Email notification for high severity alerts should be enabled](https://portal.azure.com/#blade/Microsoft_Azure_Policy/PolicyDetailBlade/definitionId/%2Fproviders%2FMicrosoft.Authorization%2FpolicyDefinitions%2F6e2593d9-add6-4083-9c9b-4b7d2188c899) |To ensure the relevant people in your organization are notified when there is a potential security breach in one of your subscriptions, enable email notifications for high severity alerts in Security Center. |AuditIfNotExists, Disabled |[1.2.0](https://github.com/Azure/azure-policy/blob/master/built-in-policies/policyDefinitions/Security%20Center/ASC_Email_notification.json) |
537537
|[Email notification to subscription owner for high severity alerts should be enabled](https://portal.azure.com/#blade/Microsoft_Azure_Policy/PolicyDetailBlade/definitionId/%2Fproviders%2FMicrosoft.Authorization%2FpolicyDefinitions%2F0b15565f-aa9e-48ba-8619-45960f2c314d) |To ensure your subscription owners are notified when there is a potential security breach in their subscription, set email notifications to subscription owners for high severity alerts in Security Center. |AuditIfNotExists, Disabled |[2.1.0](https://github.com/Azure/azure-policy/blob/master/built-in-policies/policyDefinitions/Security%20Center/ASC_Email_notification_to_subscription_owner.json) |
538538
|[Subscriptions should have a contact email address for security issues](https://portal.azure.com/#blade/Microsoft_Azure_Policy/PolicyDetailBlade/definitionId/%2Fproviders%2FMicrosoft.Authorization%2FpolicyDefinitions%2F4f4f78b8-e367-4b10-a341-d9a4ad5cf1c7) |To ensure the relevant people in your organization are notified when there is a potential security breach in one of your subscriptions, set a security contact to receive email notifications from Security Center. |AuditIfNotExists, Disabled |[1.0.1](https://github.com/Azure/azure-policy/blob/master/built-in-policies/policyDefinitions/Security%20Center/ASC_Security_contact_email.json) |
539539

articles/governance/policy/samples/canada-federal-pbmm.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Regulatory Compliance details for Canada Federal PBMM
33
description: Details of the Canada Federal PBMM Regulatory Compliance built-in initiative. Each control is mapped to one or more Azure Policy definitions that assist with assessment.
4-
ms.date: 05/01/2024
4+
ms.date: 05/24/2024
55
ms.topic: sample
66
ms.custom: generated
77
---
@@ -11,7 +11,7 @@ The following article details how the Azure Policy Regulatory Compliance built-i
1111
definition maps to **compliance domains** and **controls** in Canada Federal PBMM.
1212
For more information about this compliance standard, see
1313
[Canada Federal PBMM](https://www.canada.ca/en/government/system/digital-government/digital-government-innovations/cloud-services/government-canada-security-control-profile-cloud-based-it-services.html). To understand
14-
_Ownership_, see [Azure Policy policy definition](../concepts/definition-structure.md#policy-type) and
14+
_Ownership_, review the [policy type](../concepts/definition-structure-basics.md#policy-type) and
1515
[Shared responsibility in the cloud](../../../security/fundamentals/shared-responsibility.md).
1616

1717
The following mappings are to the **Canada Federal PBMM** controls. Many of the controls

articles/governance/policy/samples/cis-azure-1-1-0.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Regulatory Compliance details for CIS Microsoft Azure Foundations Benchmark 1.1.0
33
description: Details of the CIS Microsoft Azure Foundations Benchmark 1.1.0 Regulatory Compliance built-in initiative. Each control is mapped to one or more Azure Policy definitions that assist with assessment.
4-
ms.date: 05/01/2024
4+
ms.date: 05/24/2024
55
ms.topic: sample
66
ms.custom: generated
77
---
@@ -11,7 +11,7 @@ The following article details how the Azure Policy Regulatory Compliance built-i
1111
definition maps to **compliance domains** and **controls** in CIS Microsoft Azure Foundations Benchmark 1.1.0.
1212
For more information about this compliance standard, see
1313
[CIS Microsoft Azure Foundations Benchmark 1.1.0](https://www.cisecurity.org/benchmark/azure/). To understand
14-
_Ownership_, see [Azure Policy policy definition](../concepts/definition-structure.md#policy-type) and
14+
_Ownership_, review the [policy type](../concepts/definition-structure-basics.md#policy-type) and
1515
[Shared responsibility in the cloud](../../../security/fundamentals/shared-responsibility.md).
1616

1717
The following mappings are to the **CIS Microsoft Azure Foundations Benchmark 1.1.0** controls. Many of the controls
@@ -418,7 +418,7 @@ initiative definition.
418418

419419
|Name<br /><sub>(Azure portal)</sub> |Description |Effect(s) |Version<br /><sub>(GitHub)</sub> |
420420
|---|---|---|---|
421-
|[Email notification for high severity alerts should be enabled](https://portal.azure.com/#blade/Microsoft_Azure_Policy/PolicyDetailBlade/definitionId/%2Fproviders%2FMicrosoft.Authorization%2FpolicyDefinitions%2F6e2593d9-add6-4083-9c9b-4b7d2188c899) |To ensure the relevant people in your organization are notified when there is a potential security breach in one of your subscriptions, enable email notifications for high severity alerts in Security Center. |AuditIfNotExists, Disabled |[1.1.0](https://github.com/Azure/azure-policy/blob/master/built-in-policies/policyDefinitions/Security%20Center/ASC_Email_notification.json) |
421+
|[Email notification for high severity alerts should be enabled](https://portal.azure.com/#blade/Microsoft_Azure_Policy/PolicyDetailBlade/definitionId/%2Fproviders%2FMicrosoft.Authorization%2FpolicyDefinitions%2F6e2593d9-add6-4083-9c9b-4b7d2188c899) |To ensure the relevant people in your organization are notified when there is a potential security breach in one of your subscriptions, enable email notifications for high severity alerts in Security Center. |AuditIfNotExists, Disabled |[1.2.0](https://github.com/Azure/azure-policy/blob/master/built-in-policies/policyDefinitions/Security%20Center/ASC_Email_notification.json) |
422422

423423
### Ensure that 'Send email also to subscription owners' is set to 'On'
424424

articles/governance/policy/samples/cis-azure-1-3-0.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Regulatory Compliance details for CIS Microsoft Azure Foundations Benchmark 1.3.0
33
description: Details of the CIS Microsoft Azure Foundations Benchmark 1.3.0 Regulatory Compliance built-in initiative. Each control is mapped to one or more Azure Policy definitions that assist with assessment.
4-
ms.date: 05/01/2024
4+
ms.date: 05/24/2024
55
ms.topic: sample
66
ms.custom: generated
77
---
@@ -11,7 +11,7 @@ The following article details how the Azure Policy Regulatory Compliance built-i
1111
definition maps to **compliance domains** and **controls** in CIS Microsoft Azure Foundations Benchmark 1.3.0.
1212
For more information about this compliance standard, see
1313
[CIS Microsoft Azure Foundations Benchmark 1.3.0](https://www.cisecurity.org/benchmark/azure/). To understand
14-
_Ownership_, see [Azure Policy policy definition](../concepts/definition-structure.md#policy-type) and
14+
_Ownership_, review the [policy type](../concepts/definition-structure-basics.md#policy-type) and
1515
[Shared responsibility in the cloud](../../../security/fundamentals/shared-responsibility.md).
1616

1717
The following mappings are to the **CIS Microsoft Azure Foundations Benchmark 1.3.0** controls. Many of the controls
@@ -403,7 +403,7 @@ initiative definition.
403403

404404
|Name<br /><sub>(Azure portal)</sub> |Description |Effect(s) |Version<br /><sub>(GitHub)</sub> |
405405
|---|---|---|---|
406-
|[Email notification for high severity alerts should be enabled](https://portal.azure.com/#blade/Microsoft_Azure_Policy/PolicyDetailBlade/definitionId/%2Fproviders%2FMicrosoft.Authorization%2FpolicyDefinitions%2F6e2593d9-add6-4083-9c9b-4b7d2188c899) |To ensure the relevant people in your organization are notified when there is a potential security breach in one of your subscriptions, enable email notifications for high severity alerts in Security Center. |AuditIfNotExists, Disabled |[1.1.0](https://github.com/Azure/azure-policy/blob/master/built-in-policies/policyDefinitions/Security%20Center/ASC_Email_notification.json) |
406+
|[Email notification for high severity alerts should be enabled](https://portal.azure.com/#blade/Microsoft_Azure_Policy/PolicyDetailBlade/definitionId/%2Fproviders%2FMicrosoft.Authorization%2FpolicyDefinitions%2F6e2593d9-add6-4083-9c9b-4b7d2188c899) |To ensure the relevant people in your organization are notified when there is a potential security breach in one of your subscriptions, enable email notifications for high severity alerts in Security Center. |AuditIfNotExists, Disabled |[1.2.0](https://github.com/Azure/azure-policy/blob/master/built-in-policies/policyDefinitions/Security%20Center/ASC_Email_notification.json) |
407407

408408
### Ensure that Azure Defender is set to On for App Service
409409

articles/governance/policy/samples/cis-azure-1-4-0.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Regulatory Compliance details for CIS Microsoft Azure Foundations Benchmark 1.4.0
33
description: Details of the CIS Microsoft Azure Foundations Benchmark 1.4.0 Regulatory Compliance built-in initiative. Each control is mapped to one or more Azure Policy definitions that assist with assessment.
4-
ms.date: 05/01/2024
4+
ms.date: 05/24/2024
55
ms.topic: sample
66
ms.custom: generated
77
---
@@ -11,7 +11,7 @@ The following article details how the Azure Policy Regulatory Compliance built-i
1111
definition maps to **compliance domains** and **controls** in CIS Microsoft Azure Foundations Benchmark 1.4.0.
1212
For more information about this compliance standard, see
1313
[CIS Microsoft Azure Foundations Benchmark 1.4.0](https://www.cisecurity.org/benchmark/azure/). To understand
14-
_Ownership_, see [Azure Policy policy definition](../concepts/definition-structure.md#policy-type) and
14+
_Ownership_, review the [policy type](../concepts/definition-structure-basics.md#policy-type) and
1515
[Shared responsibility in the cloud](../../../security/fundamentals/shared-responsibility.md).
1616

1717
The following mappings are to the **CIS Microsoft Azure Foundations Benchmark 1.4.0** controls. Many of the controls
@@ -387,7 +387,7 @@ initiative definition.
387387

388388
|Name<br /><sub>(Azure portal)</sub> |Description |Effect(s) |Version<br /><sub>(GitHub)</sub> |
389389
|---|---|---|---|
390-
|[Email notification for high severity alerts should be enabled](https://portal.azure.com/#blade/Microsoft_Azure_Policy/PolicyDetailBlade/definitionId/%2Fproviders%2FMicrosoft.Authorization%2FpolicyDefinitions%2F6e2593d9-add6-4083-9c9b-4b7d2188c899) |To ensure the relevant people in your organization are notified when there is a potential security breach in one of your subscriptions, enable email notifications for high severity alerts in Security Center. |AuditIfNotExists, Disabled |[1.1.0](https://github.com/Azure/azure-policy/blob/master/built-in-policies/policyDefinitions/Security%20Center/ASC_Email_notification.json) |
390+
|[Email notification for high severity alerts should be enabled](https://portal.azure.com/#blade/Microsoft_Azure_Policy/PolicyDetailBlade/definitionId/%2Fproviders%2FMicrosoft.Authorization%2FpolicyDefinitions%2F6e2593d9-add6-4083-9c9b-4b7d2188c899) |To ensure the relevant people in your organization are notified when there is a potential security breach in one of your subscriptions, enable email notifications for high severity alerts in Security Center. |AuditIfNotExists, Disabled |[1.2.0](https://github.com/Azure/azure-policy/blob/master/built-in-policies/policyDefinitions/Security%20Center/ASC_Email_notification.json) |
391391

392392
### Ensure that Microsoft Defender for App Service is set to 'On'
393393

articles/governance/policy/samples/cis-azure-2-0-0.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Regulatory Compliance details for CIS Microsoft Azure Foundations Benchmark 2.0.0
33
description: Details of the CIS Microsoft Azure Foundations Benchmark 2.0.0 Regulatory Compliance built-in initiative. Each control is mapped to one or more Azure Policy definitions that assist with assessment.
4-
ms.date: 05/01/2024
4+
ms.date: 05/24/2024
55
ms.topic: sample
66
ms.custom: generated
77
---
@@ -11,7 +11,7 @@ The following article details how the Azure Policy Regulatory Compliance built-i
1111
definition maps to **compliance domains** and **controls** in CIS Microsoft Azure Foundations Benchmark 2.0.0.
1212
For more information about this compliance standard, see
1313
[CIS Microsoft Azure Foundations Benchmark 2.0.0](https://www.cisecurity.org/benchmark/azure/). To understand
14-
_Ownership_, see [Azure Policy policy definition](../concepts/definition-structure.md#policy-type) and
14+
_Ownership_, review the [policy type](../concepts/definition-structure-basics.md#policy-type) and
1515
[Shared responsibility in the cloud](../../../security/fundamentals/shared-responsibility.md).
1616

1717
The following mappings are to the **CIS Microsoft Azure Foundations Benchmark 2.0.0** controls. Many of the controls
@@ -463,7 +463,7 @@ initiative definition.
463463

464464
|Name<br /><sub>(Azure portal)</sub> |Description |Effect(s) |Version<br /><sub>(GitHub)</sub> |
465465
|---|---|---|---|
466-
|[Email notification for high severity alerts should be enabled](https://portal.azure.com/#blade/Microsoft_Azure_Policy/PolicyDetailBlade/definitionId/%2Fproviders%2FMicrosoft.Authorization%2FpolicyDefinitions%2F6e2593d9-add6-4083-9c9b-4b7d2188c899) |To ensure the relevant people in your organization are notified when there is a potential security breach in one of your subscriptions, enable email notifications for high severity alerts in Security Center. |AuditIfNotExists, Disabled |[1.1.0](https://github.com/Azure/azure-policy/blob/master/built-in-policies/policyDefinitions/Security%20Center/ASC_Email_notification.json) |
466+
|[Email notification for high severity alerts should be enabled](https://portal.azure.com/#blade/Microsoft_Azure_Policy/PolicyDetailBlade/definitionId/%2Fproviders%2FMicrosoft.Authorization%2FpolicyDefinitions%2F6e2593d9-add6-4083-9c9b-4b7d2188c899) |To ensure the relevant people in your organization are notified when there is a potential security breach in one of your subscriptions, enable email notifications for high severity alerts in Security Center. |AuditIfNotExists, Disabled |[1.2.0](https://github.com/Azure/azure-policy/blob/master/built-in-policies/policyDefinitions/Security%20Center/ASC_Email_notification.json) |
467467

468468
### Ensure that Microsoft Defender for Cloud Apps integration with Microsoft Defender for Cloud is Selected
469469

0 commit comments

Comments
 (0)