Skip to content

Commit 7d7f6ea

Browse files
authored
Merge pull request #190606 from v-rajagt/franlanglois
Link fixed.
2 parents 22b7d01 + 8559fde commit 7d7f6ea

File tree

2 files changed

+2
-3
lines changed

2 files changed

+2
-3
lines changed

articles/azure-cache-for-redis/cache-best-practices-development.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -79,7 +79,7 @@ While you can connect from outside of Azure, it is not recommended *especially w
7979

8080
Azure Cache for Redis requires TLS encrypted communications by default. TLS versions 1.0, 1.1 and 1.2 are currently supported. However, TLS 1.0 and 1.1 are on a path to deprecation industry-wide, so use TLS 1.2 if at all possible.
8181

82-
If your client library or tool doesn't support TLS, then enabling unencrypted connections is possible through the [Azure portal](cache-configure.md#access-ports) or [management APIs](/rest/api/redis/2021-06-01/redis/update). In cases where encrypted connections aren't possible, we recommend placing your cache and client application into a virtual network. For more information about which ports are used in the virtual network cache scenario, see this [table](cache-how-to-premium-vnet.md#outbound-port-requirements).
82+
If your client library or tool doesn't support TLS, then enabling unencrypted connections is possible through the [Azure portal](cache-configure.md#access-ports) or [management APIs](/rest/api/redis/redis/update). In cases where encrypted connections aren't possible, we recommend placing your cache and client application into a virtual network. For more information about which ports are used in the virtual network cache scenario, see this [table](cache-how-to-premium-vnet.md#outbound-port-requirements).
8383

8484
### Azure TLS Certificate Change
8585

includes/policy/standards/byrp/microsoft.cache.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -69,7 +69,7 @@ To review how the available Azure Policy built-ins for all Azure services map to
6969
standard, see
7070
[Azure Policy Regulatory Compliance - CMMC Level 3](../../../../articles/governance/policy/samples/cmmc-l3.md).
7171
For more information about this compliance standard, see
72-
[Cybersecurity Maturity Model Certification (CMMC)](https://www.acq.osd.mil/cmmc/docs/CMMC_Model_Main_20200203.pdf).
72+
[Cybersecurity Maturity Model Certification (CMMC)](https://www.scribd.com/document/497693966/CMMC-Model-Main-20200203).
7373

7474
|Domain |Control ID |Control title |Policy<br /><sub>(Azure portal)</sub> |Policy version<br /><sub>(GitHub)</sub> |
7575
|---|---|---|---|---|
@@ -204,4 +204,3 @@ For more information about this compliance standard, see
204204
|Domain |Control ID |Control title |Policy<br /><sub>(Azure portal)</sub> |Policy version<br /><sub>(GitHub)</sub> |
205205
|---|---|---|---|---|
206206
|Data in transit protection |1 |Data in transit protection |[Only secure connections to your Azure Cache for Redis should be enabled](https://portal.azure.com/#blade/Microsoft_Azure_Policy/PolicyDetailBlade/definitionId/%2Fproviders%2FMicrosoft.Authorization%2FpolicyDefinitions%2F22bee202-a82f-4305-9a2a-6d7f44d4dedb) |[1.0.0](https://github.com/Azure/azure-policy/blob/master/built-in-policies/policyDefinitions/Cache/RedisCache_AuditSSLPort_Audit.json) |
207-

0 commit comments

Comments
 (0)