Skip to content

Commit 20d53b4

Browse files
committed
Move policy includes back
1 parent 1e53e96 commit 20d53b4

File tree

7 files changed

+1227
-0
lines changed

7 files changed

+1227
-0
lines changed

includes/policy/reference/byrp/microsoft.containerregistry.md

Lines changed: 34 additions & 0 deletions
Large diffs are not rendered by default.

includes/policy/reference/byrp/microsoft.hybridcompute.md

Lines changed: 159 additions & 0 deletions
Large diffs are not rendered by default.

includes/policy/reference/byrp/microsoft.kubernetes.md

Lines changed: 69 additions & 0 deletions
Large diffs are not rendered by default.
Lines changed: 13 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,13 @@
1+
---
2+
ms.service: azure-policy
3+
ms.topic: include
4+
ms.date: 09/09/2024
5+
ms.author: davidsmatlak
6+
author: davidsmatlak
7+
ms.custom: generated
8+
---
9+
10+
|Name<br /><sub>(Azure portal)</sub> |Description |Effect(s) |Version<br /><sub>(GitHub)</sub> |
11+
|---|---|---|---|
12+
|[Allow managing tenant ids to onboard through Azure Lighthouse](https://portal.azure.com/#blade/Microsoft_Azure_Policy/PolicyDetailBlade/definitionId/%2Fproviders%2FMicrosoft.Authorization%2FpolicyDefinitions%2F7a8a51a3-ad87-4def-96f3-65a1839242b6) |Restricting Azure Lighthouse delegations to specific managing tenants increases security by limiting those who can manage your Azure resources. |deny |[1.0.1](https://github.com/Azure/azure-policy/blob/master/built-in-policies/policyDefinitions/Lighthouse/AllowCertainManagingTenantIds_Deny.json) |
13+
|[Audit delegation of scopes to a managing tenant](https://portal.azure.com/#blade/Microsoft_Azure_Policy/PolicyDetailBlade/definitionId/%2Fproviders%2FMicrosoft.Authorization%2FpolicyDefinitions%2F76bed37b-484f-430f-a009-fd7592dff818) |Audit delegation of scopes to a managing tenant via Azure Lighthouse. |Audit, Disabled |[1.0.0](https://github.com/Azure/azure-policy/blob/master/built-in-policies/policyDefinitions/Lighthouse/Delegations_Audit.json) |
Lines changed: 12 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,12 @@
1+
---
2+
ms.service: azure-policy
3+
ms.topic: include
4+
ms.date: 09/09/2024
5+
ms.author: davidsmatlak
6+
author: davidsmatlak
7+
ms.custom: generated
8+
---
9+
10+
|Name<br /><sub>(Azure portal)</sub> |Description |Effect(s) |Version<br /><sub>(GitHub)</sub> |
11+
|---|---|---|---|
12+
|[Shared dashboards should not have markdown tiles with inline content](https://portal.azure.com/#blade/Microsoft_Azure_Policy/PolicyDetailBlade/definitionId/%2Fproviders%2FMicrosoft.Authorization%2FpolicyDefinitions%2F04c655fe-0ac7-48ae-9a32-3a2e208c7624) |Disallow creating a shared dashboard that has inline content in markdown tiles and enforce that the content should be stored as a markdown file that's hosted online. If you use inline content in the markdown tile, you cannot manage encryption of the content. By configuring your own storage, you can encrypt, double encrypt and even bring your own keys. Enabling this policy restricts users to use 2020-09-01-preview or above version of shared dashboards REST API. |Audit, Deny, Disabled |[1.0.0](https://github.com/Azure/azure-policy/blob/master/built-in-policies/policyDefinitions/Portal/SharedDashboardInlineContent_Deny.json) |

includes/policy/standards/byrp/microsoft.containerregistry.md

Lines changed: 257 additions & 0 deletions
Large diffs are not rendered by default.

includes/policy/standards/byrp/microsoft.hybridcompute.md

Lines changed: 683 additions & 0 deletions
Large diffs are not rendered by default.

0 commit comments

Comments
 (0)