You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/api-management/security-baseline.md
+7-7Lines changed: 7 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -183,7 +183,7 @@ Caution: When configuring an NSG on the API Management subnet, there are a set o
183
183
**Guidance**: Define and implement standard security configurations for network settings related to your Azure API Management deployments. Use Azure Policy aliases in the "Microsoft.ApiManagement" and "Microsoft.Network" namespaces to create custom policies to audit or enforce network configuration of your Azure API Management deployments and related resources. You may also make use of built-in policy definitions for Azure Virtual Networks, such as:
184
184
- DDoS Protection Standard should be enabled
185
185
186
-
You may also use Azure Blueprints to simplify large-scale Azure deployments by packaging key environment artifacts, such as Azure Resource manager templates, role-based access control (RBAC), and policies in a single blueprint definition. You can easily apply the blueprint to new subscriptions, environments, and fine-tune control and management through versioning.
186
+
You may also use Azure Blueprints to simplify large-scale Azure deployments by packaging key environment artifacts, such as Azure Resource Manager templates, role-based access control (RBAC), and policies in a single blueprint definition. You can easily apply the blueprint to new subscriptions, environments, and fine-tune control and management through versioning.
187
187
188
188
*[How to configure and manage Azure Policy](https://docs.microsoft.com/azure/governance/policy/tutorials/create-and-manage)
189
189
@@ -289,7 +289,7 @@ For data plane audit logging, diagnostic logs provide rich information about ope
289
289
290
290
### 2.6: Monitor and review Logs
291
291
292
-
**Guidance**: Azure API Management continuously emits logs and metrics to Azure Monitor, giving you anear real-time visibility into the state and health of your APIs. With Azure Monitor and Log Analytics workspace(s), you can review, query, visualize, route, archive, configure alerts, and take actions on metrics and logs coming from API Management and related resources. Analyze and monitor logs for anomalous behaviors and regularly review results.
292
+
**Guidance**: Azure API Management continuously emits logs and metrics to Azure Monitor, giving you a near real-time visibility into the state and health of your APIs. With Azure Monitor and Log Analytics workspace(s), you can review, query, visualize, route, archive, configure alerts, and take actions on metrics and logs coming from API Management and related resources. Analyze and monitor logs for anomalous behaviors and regularly review results.
293
293
294
294
Optionally, integrate API Management with Azure Application Insights and use it as primary or secondary monitoring, tracing, reporting, and alerting tool.
295
295
@@ -556,7 +556,7 @@ Configure advanced monitoring with API Management by using the `log-to-eventhub`
556
556
557
557
### 3.13: Provide Microsoft with access to relevant customer data during support scenarios
558
558
559
-
**Guidance**: Not yet available; Customer Lockbox is not yet supported for Azure API Management.
559
+
**Guidance**: Not currently available; Customer Lockbox is not currently supported for Azure API Management.
560
560
561
561
*[List of Customer Lockbox-supported services](https://docs.microsoft.com/azure/security/fundamentals/customer-lockbox-overview#supported-services-and-scenarios-in-general-availability)
562
562
@@ -596,7 +596,7 @@ Configure advanced monitoring with API Management by using the `log-to-eventhub`
596
596
597
597
### 4.3: Monitor and block unauthorized transfer of sensitive information
598
598
599
-
**Guidance**: Not yet available; data identification, classification, and loss prevention features are not yet available for Azure API Management.
599
+
**Guidance**: Not currently available; data identification, classification, and loss prevention features are not currently available for Azure API Management.
600
600
601
601
Microsoft manages the underlying infrastructure for Azure API Management and has implemented strict controls to prevent the loss or exposure of customer data.
602
602
@@ -624,7 +624,7 @@ Microsoft manages the underlying infrastructure for Azure API Management and has
624
624
625
625
### 4.5: Use an active discovery tool to identify sensitive data
626
626
627
-
**Guidance**: Not yet available; data identification, classification, and loss prevention features are not yet available for Azure API Management. Tag Azure API Management services that may be processing sensitive information as such and implement third-party solution if required for compliance purposes.
627
+
**Guidance**: Not currently available; data identification, classification, and loss prevention features are not currently available for Azure API Management. Tag Azure API Management services that may be processing sensitive information as such and implement third-party solution if required for compliance purposes.
628
628
629
629
For the underlying platform which is managed by Microsoft, Microsoft treats all customer content as sensitive and goes to great lengths to guard against customer data loss and exposure. To ensure customer data within Azure remains secure, Microsoft has implemented and maintains a suite of robust data protection controls and capabilities.
630
630
@@ -684,7 +684,7 @@ Microsoft manages the underlying infrastructure for Azure API Management and has
684
684
685
685
### 5.1: Run automated vulnerability scanning tools
686
686
687
-
**Guidance**: Not yet available; vulnerability assessment in Azure Security Center is not yet available for Azure API Management.
687
+
**Guidance**: Not currently available; vulnerability assessment in Azure Security Center is not currently available for Azure API Management.
688
688
689
689
Underlying platform scanned and patched by Microsoft. Review security controls available to reduce service configuration related vulnerabilities.
690
690
@@ -720,7 +720,7 @@ Underlying platform scanned and patched by Microsoft. Review security controls a
720
720
721
721
### 5.5: Use a risk-rating process to prioritize the remediation of discovered vulnerabilities
722
722
723
-
**Guidance**: Not yet available; vulnerability assessment in Azure Security Center is not yet available for Azure API Management.
723
+
**Guidance**: Not currently available; vulnerability assessment in Azure Security Center is not currently available for Azure API Management.
724
724
725
725
Underlying platform scanned and patched by Microsoft. Customer to review security controls available to them to reduce service configuration related vulnerabilities.
Copy file name to clipboardExpand all lines: articles/azure-databricks/security-baseline.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -300,7 +300,7 @@ Note: Azure Databricks diagnostic logs require the Azure Databricks Premium Plan
300
300
301
301
*[How to use the SCIM APIs](https://docs.microsoft.com/azure/databricks/dev-tools/api/latest/scim/)
302
302
303
-
*[How to add and removes users in Azure Databricks](https://docs.microsoft.com/azure/databricks/administration-guide/users-groups/users)
303
+
*[How to add and remove users in Azure Databricks](https://docs.microsoft.com/azure/databricks/administration-guide/users-groups/users)
304
304
305
305
**Azure Security Center monitoring**: Yes
306
306
@@ -504,7 +504,7 @@ Microsoft manages the underlying infrastructure for Azure Databricks and has imp
504
504
505
505
### 4.5: Use an active discovery tool to identify sensitive data
506
506
507
-
**Guidance**: Currently not available; data identification, classification, and loss prevention features are not yet available for Azure Databricks. Tag Azure Databricks instances and related resources that may be processing sensitive information as such and implement third-party solution if required for compliance purposes.
507
+
**Guidance**: Currently not available; data identification, classification, and loss prevention features are not currently available for Azure Databricks. Tag Azure Databricks instances and related resources that may be processing sensitive information as such and implement third-party solution if required for compliance purposes.
508
508
509
509
The Databricks platform is compute-only, and all the data is stored on other Azure data services. For the underlying platform which is managed by Microsoft, Microsoft treats all customer content as sensitive and goes to great lengths to guard against customer data loss and exposure. To ensure customer data within Azure remains secure, Microsoft has implemented and maintains a suite of robust data protection controls and capabilities.
510
510
@@ -626,7 +626,7 @@ If you have a vulnerability management platform subscription, you may use Azure
626
626
627
627
**Guidance**: Use Azure Resource Graph to query/discover all resources (such as compute, storage, network, ports, and protocols etc.) within your subscription(s). Ensure appropriate (read) permissions exist in your tenant and enumerate all Azure subscriptions as well as resources within your subscriptions.
628
628
629
-
Although classic Azure resources may be discovered via Resource Graph, it is highly recommended to create and use ARM resources going forward.
629
+
Although classic Azure resources may be discovered via Resource Graph, it is highly recommended to create and use Azure Resource Manager resources going forward.
630
630
631
631
*[How to create queries with Azure Resource Graph](https://docs.microsoft.com/azure/governance/resource-graph/first-query-portal)
632
632
@@ -738,7 +738,7 @@ Use Azure Resource Graph to query/discover resources within their subscription(s
738
738
739
739
**Responsibility**: Customer
740
740
741
-
### 6.11: Limit users' ability to interact with ARM via scripts
741
+
### 6.11: <div>Limit users' ability to interact with Azure Resource Manager via scripts</div>
742
742
743
743
**Guidance**: Use Azure Conditional Access to limit users' ability to interact with Azure Resource Manager by configuring "Block access" for the "Microsoft Azure Management" App.
Copy file name to clipboardExpand all lines: articles/azure-functions/security-baseline.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -514,7 +514,7 @@ You can streamline this process by creating diagnostic settings for Azure AD use
514
514
515
515
### 3.13: Provide Microsoft with access to relevant customer data during support scenarios
516
516
517
-
**Guidance**: Not yet available; Customer Lockbox is not yet supported for Azure Functions.
517
+
**Guidance**: Not currently available; Customer Lockbox is not currently supported for Azure Functions.
518
518
519
519
-[List of Customer Lockbox-supported services](https://docs.microsoft.com/azure/security/fundamentals/customer-lockbox-overview#supported-services-and-scenarios-in-general-availability)
520
520
@@ -582,7 +582,7 @@ Microsoft manages the underlying infrastructure for Azure Functions and has impl
582
582
583
583
### 4.5: Use an active discovery tool to identify sensitive data
584
584
585
-
**Guidance**: Not yet available; data identification, classification, and loss prevention features are not yet available for Azure Functions. Tag Function apps that may be processing sensitive information as such and implement third-party solution if required for compliance purposes.
585
+
**Guidance**: Not currently available; data identification, classification, and loss prevention features are not currently available for Azure Functions. Tag Function apps that may be processing sensitive information as such and implement third-party solution if required for compliance purposes.
586
586
587
587
For the underlying platform which is managed by Microsoft, Microsoft treats all customer content as sensitive and goes to great lengths to guard against customer data loss and exposure. To ensure customer data within Azure remains secure, Microsoft has implemented and maintains a suite of robust data protection controls and capabilities.
0 commit comments