Skip to content

Commit 9420d0c

Browse files
Update rmit-malaysia.md
1 parent bbc085e commit 9420d0c

File tree

1 file changed

+4
-10
lines changed

1 file changed

+4
-10
lines changed

articles/governance/policy/samples/rmit-malaysia.md

Lines changed: 4 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,11 @@
11
---
22
title: Regulatory Compliance details for RMIT Malaysia
33
description: Details of the RMIT Malaysia Regulatory Compliance built-in initiative. Each control is mapped to one or more Azure Policy definitions that assist with assessment.
4-
ms.date: 05/10/2022
4+
ms.date: 05/12/2022
55
ms.topic: sample
66
ms.custom: generated
7+
ms.author: timwarner
8+
author: timwarner-msft
79
---
810
# Details of the RMIT Malaysia Regulatory Compliance built-in initiative
911

@@ -495,10 +497,6 @@ initiative definition.
495497
|[Not allowed resource types](https://portal.azure.com/#blade/Microsoft_Azure_Policy/PolicyDetailBlade/definitionId/%2Fproviders%2FMicrosoft.Authorization%2FpolicyDefinitions%2F6c112d4e-5bc7-47ae-a041-ea2d9dccd749) |Restrict which resource types can be deployed in your environment. Limiting resource types can reduce the complexity and attack surface of your environment while also helping to manage costs. Compliance results are only shown for non-compliant resources. |Audit, Deny, Disabled |[2.0.0](https://github.com/Azure/azure-policy/blob/master/built-in-policies/policyDefinitions/General/InvalidResourceTypes_Deny.json) |
496498
|[Only approved VM extensions should be installed](https://portal.azure.com/#blade/Microsoft_Azure_Policy/PolicyDetailBlade/definitionId/%2Fproviders%2FMicrosoft.Authorization%2FpolicyDefinitions%2Fc0e996f8-39cf-4af9-9f45-83fbde810432) |This policy governs the virtual machine extensions that are not approved. |Audit, Deny, Disabled |[1.0.0](https://github.com/Azure/azure-policy/blob/master/built-in-policies/policyDefinitions/Compute/VirtualMachines_ApprovedExtensions_Audit.json) |
497499

498-
## Security Operations Centre (SOC)
499-
500-
### Security Operations Centre (SOC) - 11.17
501-
502500
**ID**: RMiT 11.17
503501
**Ownership**: Shared
504502

@@ -542,10 +540,6 @@ initiative definition.
542540
|---|---|---|---|
543541
|[Virtual machines and virtual machine scale sets should have encryption at host enabled](https://portal.azure.com/#blade/Microsoft_Azure_Policy/PolicyDetailBlade/definitionId/%2Fproviders%2FMicrosoft.Authorization%2FpolicyDefinitions%2Ffc4d8e41-e223-45ea-9bf5-eada37891d87) |Use encryption at host to get end-to-end encryption for your virtual machine and virtual machine scale set data. Encryption at host enables encryption at rest for your temporary disk and OS/data disk caches. Temporary and ephemeral OS disks are encrypted with platform-managed keys when encryption at host is enabled. OS/data disk caches are encrypted at rest with either customer-managed or platform-managed key, depending on the encryption type selected on the disk. Learn more at [https://aka.ms/vm-hbe](../../../virtual-machines/disks-enable-host-based-encryption-portal.md). |Audit, Deny, Disabled |[1.0.0](https://github.com/Azure/azure-policy/blob/master/built-in-policies/policyDefinitions/Compute/HostBasedEncryptionRequired_Deny.json) |
544542

545-
## Cyber Risk Management
546-
547-
### Cyber Risk Management - 11.2
548-
549543
**ID**: RMiT 11.2
550544
**Ownership**: Shared
551545

@@ -712,4 +706,4 @@ Additional articles about Azure Policy:
712706
- See the [initiative definition structure](../concepts/initiative-definition-structure.md).
713707
- Review other examples at [Azure Policy samples](./index.md).
714708
- Review [Understanding policy effects](../concepts/effects.md).
715-
- Learn how to [remediate non-compliant resources](../how-to/remediate-resources.md).
709+
- Learn how to [remediate non-compliant resources](../how-to/remediate-resources.md).

0 commit comments

Comments
 (0)