You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
title: Azure Policy definitions for Azure Private 5G Core
3
+
description: List of Azure Policy definitions for Azure Private 5G Core.
4
+
author: robswain
5
+
ms.author: robswain
6
+
ms.service: private-5g-core
7
+
ms.topic: reference
8
+
ms.custom: subject-policy-reference
9
+
ms.date: 03/20/2024
10
+
---
11
+
# Azure Policy policy definitions for Azure Private 5G Core
12
+
13
+
This page lists the [Azure Policy](../governance/policy/overview.md) policy definitions for Azure Private 5G Core. For the full list of Azure Policy definitions across Azure services, see [Azure Policy built-in definitions](../governance/policy/samples/built-in-policies.md).
14
+
15
+
The name of each policy definition links to the policy definition in the Azure portal. Use the link in the **Version** column to view the source on the [Azure Policy GitHub repo](https://github.com/Azure/azure-policy).
16
+
17
+
To assign a policy to your Azure Private 5G Core deployment, see [Create and manage policies to enforce compliance](../governance/policy/tutorials/create-and-manage.md).
Copy file name to clipboardExpand all lines: articles/private-5g-core/security.md
+7-2Lines changed: 7 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -32,11 +32,14 @@ Azure Private 5G Core packet core instances are deployed on Azure Stack Edge dev
32
32
33
33
In addition to the default [Encryption at rest](#encryption-at-rest) using Microsoft-Managed Keys (MMK), you can optionally use Customer Managed Keys (CMK) when [creating a SIM group](manage-sim-groups.md#create-a-sim-group) or [when deploying a private mobile network](how-to-guide-deploy-a-private-mobile-network-azure-portal.md#deploy-your-private-mobile-network) to encrypt data with your own key.
34
34
35
-
If you elect to use a CMK, you will need to create a Key URI in your [Azure Key Vault](../key-vault/index.yml) and a [User-assigned identity](../active-directory/managed-identities-azure-resources/overview.md) with read, wrap, and unwrap access to the key.
35
+
If you elect to use a CMK, you will need to create a Key URI in your [Azure Key Vault](../key-vault/index.yml) and a [User-assigned identity](../active-directory/managed-identities-azure-resources/overview.md) with read, wrap, and unwrap access to the key. Note that:
36
36
37
37
- The key must be configured to have an activation and expiration date and we recommend that you [configure cryptographic key auto-rotation in Azure Key Vault](../key-vault/keys/how-to-configure-key-rotation.md).
38
38
- The SIM group accesses the key via the user-assigned identity.
39
-
- For additional information on configuring CMK for a SIM group, see [Configure customer-managed keys](/azure/cosmos-db/how-to-setup-cmk).
39
+
40
+
For further information on configuring CMK, see [Configure customer-managed keys](/azure/cosmos-db/how-to-setup-cmk).
41
+
42
+
You can use Azure Policy to enforce using CMK for SIM groups. See [Azure Policy definitions for Azure Private 5G Core](azure-policy-reference.md).
40
43
41
44
> [!IMPORTANT]
42
45
> Once a SIM group is created, you cannot change the encryption type. However, if the SIM group uses CMK, you can update the key used for encryption.
@@ -75,6 +78,8 @@ If you decide to set up Microsoft Entra ID for local monitoring access, after de
75
78
76
79
See [Choose the authentication method for local monitoring tools](collect-required-information-for-a-site.md#choose-the-authentication-method-for-local-monitoring-tools) for additional information on configuring local monitoring access authentication.
77
80
81
+
You can use Azure Policy to enforce using Entra ID for local monitoring access. See [Azure Policy definitions for Azure Private 5G Core](azure-policy-reference.md).
82
+
78
83
## Next steps
79
84
80
85
-[Deploy a private mobile network - Azure portal](how-to-guide-deploy-a-private-mobile-network-azure-portal.md)
Copy file name to clipboardExpand all lines: articles/private-5g-core/whats-new.md
+13Lines changed: 13 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -23,6 +23,19 @@ To help you stay up to date with the latest developments, this article covers:
23
23
This page is updated regularly with the latest developments in Azure Private 5G Core.
24
24
25
25
## March 2024
26
+
### Azure Policy support
27
+
28
+
**Type:** New feature
29
+
30
+
**Date available:** March 26, 2024
31
+
32
+
You can now use [Azure Policy](../governance/policy/overview.md) to enforce security-related settings in your AP5GC deployment. Azure Policy allows you to ensure compliance with organizational standards across supported Azure services. AP5GC has built-in policy definitions for:
33
+
34
+
- using Microsoft Entra ID to access local monitoring tools
35
+
- using customer-managed keys to encrypt SIM groups.
36
+
37
+
See [Azure Policy policy definitions for Azure Private 5G Core](azure-policy-reference.md) for details.
0 commit comments