Skip to content

Commit 9f203a8

Browse files
committed
Updated redirection file
1 parent 5ec4db0 commit 9f203a8

File tree

1 file changed

+11
-28
lines changed

1 file changed

+11
-28
lines changed

articles/key-vault/security-baseline.md

Lines changed: 11 additions & 28 deletions
Original file line numberDiff line numberDiff line change
@@ -385,10 +385,9 @@ https://docs.microsoft.com/azure/security-center/security-center-identity-access
385385
**Guidance**: Use a Privileged Access Workstation (PAW) with Azure Multi-Factor Authentication (MFA) configured to log into and configure Key Vault enabled resources.
386386

387387

388-
Privileged Access Workstations:
389-
https://docs.microsoft.com/windows-server/identity/securing-privileged-access/privileged-access-workstations
390-
Planning a cloud-based Azure Multi-Factor Authentication deployment:
391-
https://docs.microsoft.com/azure/active-directory/authentication/howto-mfa-getstarted
388+
Privileged Access Workstations: https://docs.microsoft.com/windows-server/identity/securing-privileged-access/privileged-access-workstations
389+
390+
Planning a cloud-based Azure Multi-Factor Authentication deployment: https://docs.microsoft.com/azure/active-directory/authentication/howto-mfa-getstarted
392391

393392
**Azure Security Center monitoring**: Not applicable
394393

@@ -740,23 +739,14 @@ https://docs.microsoft.com/azure/azure-resource-manager/resource-group-using-tag
740739

741740
**Guidance**: Use Azure policies to put restrictions on the type of resources that can be created in customer subscription(s) using the following built-in policy definitions:
742741

743-
744-
Not allowed resource types
745-
746-
Allowed resource types
747-
742+
- Not allowed resource types
743+
- Allowed resource types
748744

749745
In addition, use the Azure Resource Graph to query/discover resources within the subscription(s).
750746

747+
Tutorial: Create and manage policies to enforce compliance: https://docs.microsoft.com/azure/governance/policy/tutorials/create-and-manage
751748

752-
Tutorial: Create and manage policies to enforce compliance:
753-
754-
https://docs.microsoft.com/azure/governance/policy/tutorials/create-and-manage
755-
756-
Quickstart: Run your first Resource Graph query using Azure Resource Graph Explorer:
757-
758-
https://docs.microsoft.com/azure/governance/resource-graph/first-query-portal
759-
749+
Quickstart: Run your first Resource Graph query using Azure Resource Graph Explorer: https://docs.microsoft.com/azure/governance/resource-graph/first-query-portal
760750

761751
**Azure Security Center monitoring**: Not applicable
762752

@@ -790,19 +780,12 @@ https://docs.microsoft.com/azure/governance/resource-graph/first-query-portal
790780

791781
**Guidance**: Use Azure policies to put restrictions on the type of resources that can be created in customer subscription(s) using the following built-in policy definitions:
792782

783+
- Not allowed resource types
784+
- Allowed resource types
793785

794-
Not allowed resource types
795-
796-
Allowed resource types
797-
798-
799-
Tutorial: Create and manage policies to enforce compliance:
800-
801-
https://docs.microsoft.com/azure/governance/policy/tutorials/create-and-manage
802-
803-
Azure Policy Samples:
786+
Tutorial: Create and manage policies to enforce compliance: https://docs.microsoft.com/azure/governance/policy/tutorials/create-and-manage
804787

805-
https://docs.microsoft.com/azure/governance/policy/samples/not-allowed-resource-types
788+
Azure Policy Samples: https://docs.microsoft.com/azure/governance/policy/samples/not-allowed-resource-types
806789

807790
**Azure Security Center monitoring**: Not applicable
808791

0 commit comments

Comments
 (0)