Skip to content

Commit 20b7d79

Browse files
authored
Merge pull request #269669 from robswain/1057275-policies
ADO 1057275 - add Azure Policy support
2 parents b7b67dd + b03ed42 commit 20b7d79

File tree

4 files changed

+46
-2
lines changed

4 files changed

+46
-2
lines changed
Lines changed: 24 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,24 @@
1+
---
2+
title: Azure Policy definitions for Azure Private 5G Core
3+
description: List of Azure Policy definitions for Azure Private 5G Core.
4+
author: robswain
5+
ms.author: robswain
6+
ms.service: private-5g-core
7+
ms.topic: reference
8+
ms.custom: subject-policy-reference
9+
ms.date: 03/20/2024
10+
---
11+
# Azure Policy policy definitions for Azure Private 5G Core
12+
13+
This page lists the [Azure Policy](../governance/policy/overview.md) policy definitions for Azure Private 5G Core. For the full list of Azure Policy definitions across Azure services, see [Azure Policy built-in definitions](../governance/policy/samples/built-in-policies.md).
14+
15+
The name of each policy definition links to the policy definition in the Azure portal. Use the link in the **Version** column to view the source on the [Azure Policy GitHub repo](https://github.com/Azure/azure-policy).
16+
17+
To assign a policy to your Azure Private 5G Core deployment, see [Create and manage policies to enforce compliance](../governance/policy/tutorials/create-and-manage.md).
18+
19+
[!INCLUDE [](../../includes/policy/reference/bycat/policies-mobile-network.md)]
20+
21+
## Next steps
22+
23+
- [Azure Policy definition structure](../governance/policy/concepts/definition-structure.md)
24+
- [Understanding policy effects](../governance/policy/concepts/effects.md)

articles/private-5g-core/security.md

Lines changed: 7 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -32,11 +32,14 @@ Azure Private 5G Core packet core instances are deployed on Azure Stack Edge dev
3232

3333
In addition to the default [Encryption at rest](#encryption-at-rest) using Microsoft-Managed Keys (MMK), you can optionally use Customer Managed Keys (CMK) when [creating a SIM group](manage-sim-groups.md#create-a-sim-group) or [when deploying a private mobile network](how-to-guide-deploy-a-private-mobile-network-azure-portal.md#deploy-your-private-mobile-network) to encrypt data with your own key.
3434

35-
If you elect to use a CMK, you will need to create a Key URI in your [Azure Key Vault](../key-vault/index.yml) and a [User-assigned identity](../active-directory/managed-identities-azure-resources/overview.md) with read, wrap, and unwrap access to the key.
35+
If you elect to use a CMK, you will need to create a Key URI in your [Azure Key Vault](../key-vault/index.yml) and a [User-assigned identity](../active-directory/managed-identities-azure-resources/overview.md) with read, wrap, and unwrap access to the key. Note that:
3636

3737
- The key must be configured to have an activation and expiration date and we recommend that you [configure cryptographic key auto-rotation in Azure Key Vault](../key-vault/keys/how-to-configure-key-rotation.md).
3838
- The SIM group accesses the key via the user-assigned identity.
39-
- For additional information on configuring CMK for a SIM group, see [Configure customer-managed keys](/azure/cosmos-db/how-to-setup-cmk).
39+
40+
For further information on configuring CMK, see [Configure customer-managed keys](/azure/cosmos-db/how-to-setup-cmk).
41+
42+
You can use Azure Policy to enforce using CMK for SIM groups. See [Azure Policy definitions for Azure Private 5G Core](azure-policy-reference.md).
4043

4144
> [!IMPORTANT]
4245
> Once a SIM group is created, you cannot change the encryption type. However, if the SIM group uses CMK, you can update the key used for encryption.
@@ -75,6 +78,8 @@ If you decide to set up Microsoft Entra ID for local monitoring access, after de
7578

7679
See [Choose the authentication method for local monitoring tools](collect-required-information-for-a-site.md#choose-the-authentication-method-for-local-monitoring-tools) for additional information on configuring local monitoring access authentication.
7780

81+
You can use Azure Policy to enforce using Entra ID for local monitoring access. See [Azure Policy definitions for Azure Private 5G Core](azure-policy-reference.md).
82+
7883
## Next steps
7984

8085
- [Deploy a private mobile network - Azure portal](how-to-guide-deploy-a-private-mobile-network-azure-portal.md)

articles/private-5g-core/toc.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -194,6 +194,8 @@ items:
194194
href: differentiated-services-codepoint-5qi-mapping.md
195195
- name: Support lifetime
196196
href: support-lifetime.md
197+
- name: Azure Policy definitions
198+
href: azure-policy-reference.md
197199
- name: Resources
198200
items:
199201
- name: Azure Private 5G Core product page

articles/private-5g-core/whats-new.md

Lines changed: 13 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -23,6 +23,19 @@ To help you stay up to date with the latest developments, this article covers:
2323
This page is updated regularly with the latest developments in Azure Private 5G Core.
2424

2525
## March 2024
26+
### Azure Policy support
27+
28+
**Type:** New feature
29+
30+
**Date available:** March 26, 2024
31+
32+
You can now use [Azure Policy](../governance/policy/overview.md) to enforce security-related settings in your AP5GC deployment. Azure Policy allows you to ensure compliance with organizational standards across supported Azure services. AP5GC has built-in policy definitions for:
33+
34+
- using Microsoft Entra ID to access local monitoring tools
35+
- using customer-managed keys to encrypt SIM groups.
36+
37+
See [Azure Policy policy definitions for Azure Private 5G Core](azure-policy-reference.md) for details.
38+
2639
### SUPI concealment
2740

2841
**Type:** New feature

0 commit comments

Comments
 (0)