|
1 | 1 | ---
|
2 | 2 | title: Regulatory Compliance details for RMIT Malaysia
|
3 | 3 | description: Details of the RMIT Malaysia Regulatory Compliance built-in initiative. Each control is mapped to one or more Azure Policy definitions that assist with assessment.
|
4 |
| -ms.date: 05/10/2022 |
| 4 | +ms.date: 05/12/2022 |
5 | 5 | ms.topic: sample
|
6 | 6 | ms.custom: generated
|
| 7 | +ms.author: timwarner |
| 8 | +author: timwarner-msft |
7 | 9 | ---
|
8 | 10 | # Details of the RMIT Malaysia Regulatory Compliance built-in initiative
|
9 | 11 |
|
@@ -495,10 +497,6 @@ initiative definition.
|
495 | 497 | |[Not allowed resource types](https://portal.azure.com/#blade/Microsoft_Azure_Policy/PolicyDetailBlade/definitionId/%2Fproviders%2FMicrosoft.Authorization%2FpolicyDefinitions%2F6c112d4e-5bc7-47ae-a041-ea2d9dccd749) |Restrict which resource types can be deployed in your environment. Limiting resource types can reduce the complexity and attack surface of your environment while also helping to manage costs. Compliance results are only shown for non-compliant resources. |Audit, Deny, Disabled |[2.0.0](https://github.com/Azure/azure-policy/blob/master/built-in-policies/policyDefinitions/General/InvalidResourceTypes_Deny.json) |
|
496 | 498 | |[Only approved VM extensions should be installed](https://portal.azure.com/#blade/Microsoft_Azure_Policy/PolicyDetailBlade/definitionId/%2Fproviders%2FMicrosoft.Authorization%2FpolicyDefinitions%2Fc0e996f8-39cf-4af9-9f45-83fbde810432) |This policy governs the virtual machine extensions that are not approved. |Audit, Deny, Disabled |[1.0.0](https://github.com/Azure/azure-policy/blob/master/built-in-policies/policyDefinitions/Compute/VirtualMachines_ApprovedExtensions_Audit.json) |
|
497 | 499 |
|
498 |
| -## Security Operations Centre (SOC) |
499 |
| - |
500 |
| -### Security Operations Centre (SOC) - 11.17 |
501 |
| - |
502 | 500 | **ID**: RMiT 11.17
|
503 | 501 | **Ownership**: Shared
|
504 | 502 |
|
@@ -542,10 +540,6 @@ initiative definition.
|
542 | 540 | |---|---|---|---|
|
543 | 541 | |[Virtual machines and virtual machine scale sets should have encryption at host enabled](https://portal.azure.com/#blade/Microsoft_Azure_Policy/PolicyDetailBlade/definitionId/%2Fproviders%2FMicrosoft.Authorization%2FpolicyDefinitions%2Ffc4d8e41-e223-45ea-9bf5-eada37891d87) |Use encryption at host to get end-to-end encryption for your virtual machine and virtual machine scale set data. Encryption at host enables encryption at rest for your temporary disk and OS/data disk caches. Temporary and ephemeral OS disks are encrypted with platform-managed keys when encryption at host is enabled. OS/data disk caches are encrypted at rest with either customer-managed or platform-managed key, depending on the encryption type selected on the disk. Learn more at [https://aka.ms/vm-hbe](../../../virtual-machines/disks-enable-host-based-encryption-portal.md). |Audit, Deny, Disabled |[1.0.0](https://github.com/Azure/azure-policy/blob/master/built-in-policies/policyDefinitions/Compute/HostBasedEncryptionRequired_Deny.json) |
|
544 | 542 |
|
545 |
| -## Cyber Risk Management |
546 |
| - |
547 |
| -### Cyber Risk Management - 11.2 |
548 |
| - |
549 | 543 | **ID**: RMiT 11.2
|
550 | 544 | **Ownership**: Shared
|
551 | 545 |
|
@@ -712,4 +706,4 @@ Additional articles about Azure Policy:
|
712 | 706 | - See the [initiative definition structure](../concepts/initiative-definition-structure.md).
|
713 | 707 | - Review other examples at [Azure Policy samples](./index.md).
|
714 | 708 | - Review [Understanding policy effects](../concepts/effects.md).
|
715 |
| -- Learn how to [remediate non-compliant resources](../how-to/remediate-resources.md). |
| 709 | +- Learn how to [remediate non-compliant resources](../how-to/remediate-resources.md). |
0 commit comments