Skip to content

Commit abe1162

Browse files
authored
M48214,48215,48217,48218 - Fixing issues
Translator has reported possible source content issue. Description: * Line 124: removing breakline and adding corresponding link * Line 571: Adding colon at the end of sentence * Line 933: Adding period.
1 parent 646a801 commit abe1162

File tree

1 file changed

+4
-7
lines changed

1 file changed

+4
-7
lines changed

articles/key-vault/security-baseline.md

Lines changed: 4 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -121,10 +121,7 @@ Azure service tags overview: https://docs.microsoft.com/azure/virtual-network/se
121121

122122
### 1.9: Maintain standard security configurations for network devices
123123

124-
**Guidance**: Define and implement standard security configurations for network resources associated with your Azure Key Vault instances with Azure Policy. Use Azure Policy aliases in the "Microsoft.KeyVault" and "Microsoft.Network" namespaces to create custom policies to audit or enforce the network configuration of your Azure Key Vault instances. You may also make use of built-in policy definitions related to Azure Key Vault, such as:
125-
126-
127-
Key Vault should use a virtual network service endpoint
124+
**Guidance**: Define and implement standard security configurations for network resources associated with your Azure Key Vault instances with Azure Policy. Use Azure Policy aliases in the "Microsoft.KeyVault" and "Microsoft.Network" namespaces to create custom policies to audit or enforce the network configuration of your Azure Key Vault instances. You may also make use of built-in policy definitions related to Azure Key Vault, such as: [Key Vault should use a virtual network service endpoint](key-vault-overview-vnet-service-endpoints.md)
128125

129126

130127
Tutorial: Create and manage policies to enforce compliance:
@@ -568,10 +565,10 @@ https://docs.microsoft.com/azure/key-vault/key-vault-secure-your-key-vault
568565

569566
### 4.7: Use host-based data loss prevention to enforce access control
570567

571-
**Guidance**: Microsoft manages the underlying infrastructure for Azure Key Vault and has implemented strict controls to prevent the loss or exposure of customer data.
568+
**Guidance**: Microsoft manages the underlying infrastructure for Azure Key Vault and has implemented strict controls to prevent the loss or exposure of customer daUse Azure Security Center to perform baseline scans for your Azure Key Vault-protected resourcesta.
572569

573570

574-
What is Azure Key Vault?
571+
What is Azure Key Vault?:
575572
https://docs.microsoft.com/azure/key-vault/key-vault-overview
576573

577574
Azure customer data protection:
@@ -933,7 +930,7 @@ https://docs.microsoft.com/azure/governance/policy/tutorials/create-and-manage
933930

934931
### 7.9: Implement automated configuration monitoring for Azure services
935932

936-
**Guidance**: Use Azure Security Center to perform baseline scans for your Azure Key Vault-protected resources
933+
**Guidance**: Use Azure Security Center to perform baseline scans for your Azure Key Vault-protected resources.
937934

938935

939936

0 commit comments

Comments
 (0)