Skip to content

Commit 5ef9caa

Browse files
authored
Merge pull request #249582 from MicrosoftDocs/repo_sync_working_branch
Confirm merge from repo_sync_working_branch to main to sync with https://github.com/MicrosoftDocs/azure-docs (branch main)
2 parents 911fce9 + 52ed6ea commit 5ef9caa

File tree

4 files changed

+23
-22
lines changed

4 files changed

+23
-22
lines changed

articles/communication-services/concepts/numbers/phone-number-management-for-australia.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -43,6 +43,7 @@ More details on eligible subscription types are as follows:
4343
## Azure subscription billing locations where Australia phone numbers are available
4444
| Country/Region |
4545
| :---------- |
46+
| Australia |
4647
|Canada|
4748
|Denmark|
4849
|Ireland|

articles/container-apps/manage-secrets.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -162,14 +162,14 @@ Secrets are defined at the application level in the `resources.properties.config
162162
{
163163
"name": "queue-connection-string",
164164
"keyVaultUrl": "<KEY-VAULT-SECRET-URI>",
165-
"identity": "System"
165+
"identity": "system"
166166
}],
167167
}
168168
}
169169
}
170170
```
171171

172-
Here, a connection string to a queue storage account is declared in the `secrets` array. Its value is automatically retrieved from Key Vault using the specified identity. To use a user managed identity, replace `System` with the identity's resource ID.
172+
Here, a connection string to a queue storage account is declared in the `secrets` array. Its value is automatically retrieved from Key Vault using the specified identity. To use a user managed identity, replace `system` with the identity's resource ID.
173173

174174
Replace `<KEY-VAULT-SECRET-URI>` with the URI of your secret in Key Vault.
175175

@@ -191,7 +191,7 @@ az containerapp create \
191191
--secrets "queue-connection-string=keyvaultref:<KEY_VAULT_SECRET_URI>,identityref:<USER_ASSIGNED_IDENTITY_ID>"
192192
```
193193

194-
Here, a connection string to a queue storage account is declared in the `--secrets` parameter. Replace `<KEY_VAULT_SECRET_URI>` with the URI of your secret in Key Vault. Replace `<USER_ASSIGNED_IDENTITY_ID>` with the resource ID of the user assigned identity. For system assigned identity, use `System` instead of the resource ID.
194+
Here, a connection string to a queue storage account is declared in the `--secrets` parameter. Replace `<KEY_VAULT_SECRET_URI>` with the URI of your secret in Key Vault. Replace `<USER_ASSIGNED_IDENTITY_ID>` with the resource ID of the user assigned identity. For system assigned identity, use `system` instead of the resource ID.
195195

196196
> [!NOTE]
197197
> The user assigned identity must have access to read the secret in Key Vault. System assigned identity can't be used with the create command because it's not available until after the container app is created.

articles/event-grid/delivery-properties.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@ To set headers with a fixed value, provide the name of the header and its value
2525

2626
:::image type="content" source="./media/delivery-properties/static-header-property.png" alt-text="Delivery properties - static":::
2727

28-
You may want check **Is secret?** when providing sensitive data. Sensitive data won't be displayed on the Azure portal.
28+
You might want to check **Is secret?** when you're providing sensitive data. The visibility of sensitive data on the Azure portal depends on the user's RBAC permission.
2929

3030
## Setting dynamic header values
3131
You can set the value of a header based on a property in an incoming event. Use JsonPath syntax to refer to an incoming event's property value to be used as the value for a header in outgoing requests. For example, to set the value of a header named **Channel** using the value of the incoming event property **system** in the event data, configure your event subscription in the following way:

articles/security/fundamentals/identity-management-best-practices.md

Lines changed: 18 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -65,7 +65,7 @@ The following sections list best practices for identity and access security usin
6565

6666
In a hybrid identity scenario we recommend that you integrate your on-premises and cloud directories. Integration enables your IT team to manage accounts from one location, regardless of where an account is created. Integration also helps your users be more productive by providing a common identity for accessing both cloud and on-premises resources.
6767

68-
**Best practice**: Establish a single Azure AD instance. Consistency and a single authoritative source will increase clarity and reduce security risks from human errors and configuration complexity.
68+
**Best practice**: Establish a single Azure AD instance. Consistency and a single authoritative source will increase clarity and reduce security risks from human errors and configuration complexity.
6969
**Detail**: Designate a single Azure AD directory as the authoritative source for corporate and organizational accounts.
7070

7171
**Best practice**: Integrate your on-premises directories with Azure AD.
@@ -74,7 +74,7 @@ In a hybrid identity scenario we recommend that you integrate your on-premises a
7474
> [!Note]
7575
> There are [factors that affect the performance of Azure AD Connect](../../active-directory/hybrid/plan-connect-performance-factors.md). Ensure Azure AD Connect has enough capacity to keep underperforming systems from impeding security and productivity. Large or complex organizations (organizations provisioning more than 100,000 objects) should follow the [recommendations](../../active-directory/hybrid/whatis-hybrid-identity.md) to optimize their Azure AD Connect implementation.
7676
77-
**Best practice**: Don’t synchronize accounts to Azure AD that have high privileges in your existing Active Directory instance.
77+
**Best practice**: Don’t synchronize accounts to Azure AD that have high privileges in your existing Active Directory instance.
7878
**Detail**: Don’t change the default [Azure AD Connect configuration](../../active-directory/hybrid/how-to-connect-sync-configure-filtering.md) that filters out these accounts. This configuration mitigates the risk of adversaries pivoting from cloud to on-premises assets (which could create a major incident).
7979

8080
**Best practice**: Turn on password hash synchronization.
@@ -84,7 +84,7 @@ Even if you decide to use federation with Active Directory Federation Services (
8484

8585
For more information, see [Implement password hash synchronization with Azure AD Connect sync](../../active-directory/hybrid/how-to-connect-password-hash-synchronization.md).
8686

87-
**Best practice**: For new application development, use Azure AD for authentication.
87+
**Best practice**: For new application development, use Azure AD for authentication.
8888
**Detail**: Use the correct capabilities to support authentication:
8989

9090
- Azure AD for employees
@@ -123,7 +123,7 @@ To balance security and productivity, you need to think about how a resource is
123123
**Best practice**: Manage and control access to corporate resources.
124124
**Detail**: Configure common Azure AD [Conditional Access policies](../../active-directory/conditional-access/concept-conditional-access-policy-common.md) based on a group, location, and application sensitivity for SaaS apps and Azure AD–connected apps.
125125

126-
**Best practice**: Block legacy authentication protocols.
126+
**Best practice**: Block legacy authentication protocols.
127127
**Detail**: Attackers exploit weaknesses in older protocols every day, particularly for password spray attacks. Configure Conditional Access to [block legacy protocols](../../active-directory/conditional-access/howto-conditional-access-policy-block-legacy.md).
128128

129129
## Plan for routine security improvements
@@ -132,7 +132,7 @@ Security is always evolving, and it is important to build into your cloud and id
132132

133133
Identity Secure Score is a set of recommended security controls that Microsoft publishes that works to provide you a numerical score to objectively measure your security posture and help plan future security improvements. You can also view your score in comparison to those in other industries as well as your own trends over time.
134134

135-
**Best practice**: Plan routine security reviews and improvements based on best practices in your industry.
135+
**Best practice**: Plan routine security reviews and improvements based on best practices in your industry.
136136
**Detail**: Use the Identity Secure Score feature to rank your improvements over time.
137137

138138
## Enable password management
@@ -145,7 +145,7 @@ If you have multiple tenants or you want to enable users to [reset their own pas
145145
**Best practice**: Monitor how or if SSPR is really being used.
146146
**Detail**: Monitor the users who are registering by using the Azure AD [Password Reset Registration Activity report](../../active-directory/authentication/howto-sspr-reporting.md). The reporting feature that Azure AD provides helps you answer questions by using prebuilt reports. If you're appropriately licensed, you can also create custom queries.
147147

148-
**Best practice**: Extend cloud-based password policies to your on-premises infrastructure.
148+
**Best practice**: Extend cloud-based password policies to your on-premises infrastructure.
149149
**Detail**: Enhance password policies in your organization by performing the same checks for on-premises password changes as you do for cloud-based password changes. Install [Azure AD password protection](../../active-directory/authentication/concept-password-ban-bad.md) for Windows Server Active Directory agents on-premises to extend banned password lists to your existing infrastructure. Users and admins who change, set, or reset passwords on-premises are required to comply with the same password policy as cloud-only users.
150150

151151
## Enforce multi-factor verification for users
@@ -156,7 +156,7 @@ There are multiple options for requiring two-step verification. The best option
156156

157157
Following are options and benefits for enabling two-step verification:
158158

159-
**Option 1**: Enable MFA for all users and login methods with Azure AD Security Defaults
159+
**Option 1**: Enable MFA for all users and login methods with Azure AD Security Defaults
160160
**Benefit**: This option enables you to easily and quickly enforce MFA for all users in your environment with a stringent policy to:
161161

162162
* Challenge administrative accounts and administrative logon mechanisms
@@ -170,7 +170,7 @@ This method is available to all licensing tiers but is not able to be mixed with
170170

171171
To determine where Multi-Factor Authentication needs to be enabled, see [Which version of Azure AD MFA is right for my organization?](../../active-directory/authentication/concept-mfa-howitworks.md).
172172

173-
**Option 3**: [Enable Multi-Factor Authentication with Conditional Access policy](../../active-directory/authentication/howto-mfa-getstarted.md).
173+
**Option 3**: [Enable Multi-Factor Authentication with Conditional Access policy](../../active-directory/authentication/howto-mfa-getstarted.md).
174174
**Benefit**: This option allows you to prompt for two-step verification under specific conditions by using [Conditional Access](../../active-directory/conditional-access/concept-conditional-access-policy-common.md). Specific conditions can be user sign-in from different locations, untrusted devices, or applications that you consider risky. Defining specific conditions where you require two-step verification enables you to avoid constant prompting for your users, which can be an unpleasant user experience.
175175

176176
This is the most flexible way to enable two-step verification for your users. Enabling a Conditional Access policy works only for Azure AD Multi-Factor Authentication in the cloud and is a premium feature of Azure AD. You can find more information on this method in [Deploy cloud-based Azure AD Multi-Factor Authentication](../../active-directory/authentication/howto-mfa-getstarted.md).
@@ -199,22 +199,22 @@ Your security team needs visibility into your Azure resources in order to assess
199199

200200
You can use [Azure RBAC](../../role-based-access-control/overview.md) to assign permissions to users, groups, and applications at a certain scope. The scope of a role assignment can be a subscription, a resource group, or a single resource.
201201

202-
**Best practice**: Segregate duties within your team and grant only the amount of access to users that they need to perform their jobs. Instead of giving everybody unrestricted permissions in your Azure subscription or resources, allow only certain actions at a particular scope.
202+
**Best practice**: Segregate duties within your team and grant only the amount of access to users that they need to perform their jobs. Instead of giving everybody unrestricted permissions in your Azure subscription or resources, allow only certain actions at a particular scope.
203203
**Detail**: Use [Azure built-in roles](../../role-based-access-control/built-in-roles.md) in Azure to assign privileges to users.
204204

205205
> [!Note]
206206
> Specific permissions create unneeded complexity and confusion, accumulating into a “legacy” configuration that’s difficult to fix without fear of breaking something. Avoid resource-specific permissions. Instead, use management groups for enterprise-wide permissions and resource groups for permissions within subscriptions. Avoid user-specific permissions. Instead, assign access to groups in Azure AD.
207207
208-
**Best practice**: Grant security teams with Azure responsibilities access to see Azure resources so they can assess and remediate risk.
208+
**Best practice**: Grant security teams with Azure responsibilities access to see Azure resources so they can assess and remediate risk.
209209
**Detail**: Grant security teams the Azure RBAC [Security Reader](../../role-based-access-control/built-in-roles.md#security-reader) role. You can use the root management group or the segment management group, depending on the scope of responsibilities:
210210

211211
* **Root management group** for teams responsible for all enterprise resources
212212
* **Segment management group** for teams with limited scope (commonly because of regulatory or other organizational boundaries)
213213

214-
**Best practice**: Grant the appropriate permissions to security teams that have direct operational responsibilities.
214+
**Best practice**: Grant the appropriate permissions to security teams that have direct operational responsibilities.
215215
**Detail**: Review the Azure built-in roles for the appropriate role assignment. If the built-in roles don't meet the specific needs of your organization, you can create [Azure custom roles](../../role-based-access-control/custom-roles.md). As with built-in roles, you can assign custom roles to users, groups, and service principals at subscription, resource group, and resource scopes.
216216

217-
**Best practices**: Grant Microsoft Defender for Cloud access to security roles that need it. Defender for Cloud allows security teams to quickly identify and remediate risks.
217+
**Best practices**: Grant Microsoft Defender for Cloud access to security roles that need it. Defender for Cloud allows security teams to quickly identify and remediate risks.
218218
**Detail**: Add security teams with these needs to the Azure RBAC [Security Admin](../../role-based-access-control/built-in-roles.md#security-admin) role so they can view security policies, view security states, edit security policies, view alerts and recommendations, and dismiss alerts and recommendations. You can do this by using the root management group or the segment management group, depending on the scope of responsibilities.
219219

220220
Organizations that don’t enforce data access control by using capabilities like Azure RBAC might be giving more privileges than necessary to their users. This can lead to data compromise by allowing users to access types of data (for example, high business impact) that they shouldn’t have.
@@ -235,7 +235,7 @@ The following summarizes the best practices found in [Securing privileged access
235235
**Best practice**: Ensure all critical admin accounts are managed Azure AD accounts.
236236
**Detail**: Remove any consumer accounts from critical admin roles (for example, Microsoft accounts like hotmail.com, live.com, and outlook.com).
237237

238-
**Best practice**: Ensure all critical admin roles have a separate account for administrative tasks in order to avoid phishing and other attacks to compromise administrative privileges.
238+
**Best practice**: Ensure all critical admin roles have a separate account for administrative tasks in order to avoid phishing and other attacks to compromise administrative privileges.
239239
**Detail**: Create a separate admin account that’s assigned the privileges needed to perform the administrative tasks. Block the use of these administrative accounts for daily productivity tools like Microsoft 365 email or arbitrary web browsing.
240240

241241
**Best practice**: Identify and categorize accounts that are in highly privileged roles.
@@ -259,24 +259,24 @@ The following summarizes the best practices found in [Securing privileged access
259259

260260
Evaluate the accounts that are assigned or eligible for the global admin role. If you don’t see any cloud-only accounts by using the `*.onmicrosoft.com` domain (intended for emergency access), create them. For more information, see [Managing emergency access administrative accounts in Azure AD](../../active-directory/roles/security-emergency-access.md).
261261

262-
**Best practice**: Have a “break glass" process in place in case of an emergency.
262+
**Best practice**: Have a “break glass" process in place in case of an emergency.
263263
**Detail**: Follow the steps in [Securing privileged access for hybrid and cloud deployments in Azure AD](../../active-directory/roles/security-planning.md).
264264

265-
**Best practice**: Require all critical admin accounts to be password-less (preferred), or require Multi-Factor Authentication.
265+
**Best practice**: Require all critical admin accounts to be password-less (preferred), or require Multi-Factor Authentication.
266266
**Detail**: Use the [Microsoft Authenticator app](../../active-directory/authentication/howto-authentication-passwordless-phone.md) to sign in to any Azure AD account without using a password. Like [Windows Hello for Business](/windows/security/identity-protection/hello-for-business/hello-identity-verification), the Microsoft Authenticator uses key-based authentication to enable a user credential that’s tied to a device and uses biometric authentication or a PIN.
267267

268268
Require Azure AD Multi-Factor Authentication at sign-in for all individual users who are permanently assigned to one or more of the Azure AD admin roles: Global Administrator, Privileged Role Administrator, Exchange Online Administrator, and SharePoint Online Administrator. Enable [Multi-Factor Authentication for your admin accounts](../../active-directory/authentication/howto-mfa-userstates.md) and ensure that admin account users have registered.
269269

270-
**Best practice**: For critical admin accounts, have an admin workstation where production tasks aren’t allowed (for example, browsing and email). This will protect your admin accounts from attack vectors that use browsing and email and significantly lower your risk of a major incident.
270+
**Best practice**: For critical admin accounts, have an admin workstation where production tasks aren’t allowed (for example, browsing and email). This will protect your admin accounts from attack vectors that use browsing and email and significantly lower your risk of a major incident.
271271
**Detail**: Use an admin workstation. Choose a level of workstation security:
272272

273273
- Highly secure productivity devices provide advanced security for browsing and other productivity tasks.
274274
- [Privileged Access Workstations (PAWs)](https://4sysops.com/archives/understand-the-microsoft-privileged-access-workstation-paw-security-model/) provide a dedicated operating system that’s protected from internet attacks and threat vectors for sensitive tasks.
275275

276-
**Best practice**: Deprovision admin accounts when employees leave your organization.
276+
**Best practice**: Deprovision admin accounts when employees leave your organization.
277277
**Detail**: Have a process in place that disables or deletes admin accounts when employees leave your organization.
278278

279-
**Best practice**: Regularly test admin accounts by using current attack techniques.
279+
**Best practice**: Regularly test admin accounts by using current attack techniques.
280280
**Detail**: Use Microsoft 365 Attack Simulator or a third-party offering to run realistic attack scenarios in your organization. This can help you find vulnerable users before a real attack occurs.
281281

282282
**Best practice**: Take steps to mitigate the most frequently used attacked techniques.

0 commit comments

Comments
 (0)