You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
**Guidance**: Use a Privileged Access Workstation (PAW) with Azure Multi-Factor Authentication (MFA) configured to log into and configure Key Vault enabled resources.
**Guidance**: Use Azure policies to put restrictions on the type of resources that can be created in customer subscription(s) using the following built-in policy definitions:
742
741
743
-
744
-
Not allowed resource types
745
-
746
-
Allowed resource types
747
-
742
+
- Not allowed resource types
743
+
- Allowed resource types
748
744
749
745
In addition, use the Azure Resource Graph to query/discover resources within the subscription(s).
750
746
747
+
Tutorial: Create and manage policies to enforce compliance: https://docs.microsoft.com/azure/governance/policy/tutorials/create-and-manage
751
748
752
-
Tutorial: Create and manage policies to enforce compliance:
Quickstart: Run your first Resource Graph query using Azure Resource Graph Explorer: https://docs.microsoft.com/azure/governance/resource-graph/first-query-portal
760
750
761
751
**Azure Security Center monitoring**: Not applicable
**Guidance**: Use Azure policies to put restrictions on the type of resources that can be created in customer subscription(s) using the following built-in policy definitions:
792
782
783
+
- Not allowed resource types
784
+
- Allowed resource types
793
785
794
-
Not allowed resource types
795
-
796
-
Allowed resource types
797
-
798
-
799
-
Tutorial: Create and manage policies to enforce compliance:
0 commit comments