You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -60,11 +61,16 @@ effect that takes place if the conditions are met.
60
61
61
62
In Azure Policy, we offer several built-in policies that are available by default. For example:
62
63
63
-
-**Allowed Storage Account SKUs**: Determines if a storage account being deployed is within a set of SKU sizes. Its effect is to deny all storage accounts that don't adhere to the set of defined SKU sizes.
64
-
-**Allowed Resource Type**: Defines the resource types that you can deploy. Its effect is to deny all resources that aren't part of this defined list.
65
-
-**Allowed Locations**: Restricts the available locations for new resources. Its effect is used to enforce your geo-compliance requirements.
64
+
-**Allowed Storage Account SKUs**: Determines if a storage account being deployed is within a set
65
+
of SKU sizes. Its effect is to deny all storage accounts that don't adhere to the set of defined
66
+
SKU sizes.
67
+
-**Allowed Resource Type**: Defines the resource types that you can deploy. Its effect is to deny
68
+
all resources that aren't part of this defined list.
69
+
-**Allowed Locations**: Restricts the available locations for new resources. Its effect is used to
70
+
enforce your geo-compliance requirements.
66
71
-**Allowed Virtual Machine SKUs**: Specifies a set of virtual machine SKUs that you can deploy.
67
-
-**Add a tag to resources**: Applies a required tag and its default value if it's not specified by the deploy request.
72
+
-**Add a tag to resources**: Applies a required tag and its default value if it's not specified by
73
+
the deploy request.
68
74
-**Enforce tag and its value**: Enforces a required tag and its value to a resource.
69
75
-**Not allowed resource types**: Prevents a list of resource types from being deployed.
70
76
@@ -75,7 +81,8 @@ Policy evaluation happens with several different actions, such as policy assignm
75
81
updates. For a complete list, see [Policy evaluation
@@ -127,11 +135,18 @@ definitions. They simplify by grouping a set of policies as one single item. For
127
135
create an initiative titled **Enable Monitoring in Azure Security Center**, with a goal to monitor
128
136
all the available security recommendations in your Azure Security Center.
129
137
138
+
> [!NOTE]
139
+
> The SDK, such as Azure CLI and Azure PowerShell, use properties and parameters named **PolicySet**
140
+
> to refer to initiatives.
141
+
130
142
Under this initiative, you would have policy definitions such as:
131
143
132
-
-**Monitor unencrypted SQL Database in Security Center** – For monitoring unencrypted SQL databases and servers.
133
-
-**Monitor OS vulnerabilities in Security Center** – For monitoring servers that don't satisfy the configured baseline.
134
-
-**Monitor missing Endpoint Protection in Security Center** – For monitoring servers without an installed endpoint protection agent.
144
+
-**Monitor unencrypted SQL Database in Security Center** – For monitoring unencrypted SQL databases
145
+
and servers.
146
+
-**Monitor OS vulnerabilities in Security Center** – For monitoring servers that don't satisfy the
147
+
configured baseline.
148
+
-**Monitor missing Endpoint Protection in Security Center** – For monitoring servers without an
149
+
installed endpoint protection agent.
135
150
136
151
## Initiative assignment
137
152
@@ -148,7 +163,8 @@ Like policy parameters, initiative parameters help simplify initiative managemen
148
163
redundancy. Initiative parameters are parameters being used by the policy definitions within the
149
164
initiative.
150
165
151
-
For example, take a scenario where you have an initiative definition - **initiativeC**, with policy definitions **policyA** and **policyB** each expecting a different type of parameter:
166
+
For example, take a scenario where you have an initiative definition - **initiativeC**, with policy
167
+
definitions **policyA** and **policyB** each expecting a different type of parameter:
152
168
153
169
| Policy | Name of parameter |Type of parameter |Note |
154
170
|---|---|---|---|
@@ -158,9 +174,15 @@ For example, take a scenario where you have an initiative definition - **initiat
158
174
In this scenario, when defining the initiative parameters for **initiativeC**, you have three
159
175
options:
160
176
161
-
- Use the parameters of the policy definitions within this initiative: In this example, *allowedLocations* and *allowedSingleLocation* become initiative parameters for **initiativeC**.
162
-
- Provide values to the parameters of the policy definitions within this initiative definition. In this example, you can provide a list of locations to **policyA's parameter – allowedLocations** and **policyB's parameter – allowedSingleLocation**. You can also provide values when assigning this initiative.
163
-
- Provide a list of *value* options that can be used when assigning this initiative. When you assign this initiative, the inherited parameters from the policy definitions within the initiative, can only have values from this provided list.
177
+
- Use the parameters of the policy definitions within this initiative: In this example,
178
+
*allowedLocations* and *allowedSingleLocation* become initiative parameters for **initiativeC**.
179
+
- Provide values to the parameters of the policy definitions within this initiative definition. In
180
+
this example, you can provide a list of locations to **policyA's parameter – allowedLocations**
181
+
and **policyB's parameter – allowedSingleLocation**. You can also provide values when assigning
182
+
this initiative.
183
+
- Provide a list of *value* options that can be used when assigning this initiative. When you assign
184
+
this initiative, the inherited parameters from the policy definitions within the initiative, can
185
+
only have values from this provided list.
164
186
165
187
When creating value options in an initiative definition, you're unable to input a different value
166
188
during the initiative assignment because it's not part of the list.
@@ -174,30 +196,31 @@ during the initiative assignment because it's not part of the list.
174
196
Here are a few pointers and tips to keep in mind:
175
197
176
198
- Start with an audit effect instead of a deny effect to track impact of your policy definition on
177
-
the resources in your environment. If you have scripts already in place to autoscale your
178
-
applications, setting a deny effect may hinder such automation tasks already in place.
199
+
the resources in your environment. If you have scripts already in place to autoscale your
200
+
applications, setting a deny effect may hinder such automation tasks already in place.
179
201
180
202
- Consider organizational hierarchies when creating definitions and assignments. We recommend
181
-
creating definitions at higher levels such as the management group or subscription level. Then,
182
-
create the assignment at the next child level. If you create a definition at a management group,
183
-
the assignment can be scoped down to a subscription or resource group within that management group.
203
+
creating definitions at higher levels such as the management group or subscription level. Then,
204
+
create the assignment at the next child level. If you create a definition at a management group,
205
+
the assignment can be scoped down to a subscription or resource group within that management
206
+
group.
184
207
185
208
- We recommend creating and assigning initiative definitions even for a single policy definition.
186
-
For example, you have policy definition *policyDefA* and create it under initiative definition
187
-
*initiativeDefC*. If you create another policy definition later for *policyDefB* with goals similar
188
-
to *policyDefA*, you can add it under *initiativeDefC* and track them together.
209
+
For example, you have policy definition *policyDefA* and create it under initiative definition
210
+
*initiativeDefC*. If you create another policy definition later for *policyDefB* with goals
211
+
similar to *policyDefA*, you can add it under *initiativeDefC* and track them together.
189
212
190
-
- Once you've created an initiative assignment, policy definitions added to the initiative also become
191
-
part of that initiatives assignments.
213
+
- Once you've created an initiative assignment, policy definitions added to the initiative also
214
+
become part of that initiatives assignments.
192
215
193
-
- When an initiative assignment is evaluated, all policies within the initiative are also
194
-
evaluated. If you need to evaluate a policy individually, it's better to not include it in an
195
-
initiative.
216
+
- When an initiative assignment is evaluated, all policies within the initiative are also evaluated.
217
+
If you need to evaluate a policy individually, it's better to not include it in an initiative.
196
218
197
219
## Video overview
198
220
199
-
The following overview of Azure Policy is from Build 2018. For slides or video download,
200
-
visit [Govern your Azure environment through Azure Policy](https://channel9.msdn.com/events/Build/2018/THR2030) on Channel 9.
221
+
The following overview of Azure Policy is from Build 2018. For slides or video download, visit
222
+
[Govern your Azure environment through Azure Policy](https://channel9.msdn.com/events/Build/2018/THR2030)
0 commit comments