Skip to content

Commit c995812

Browse files
committed
Daily rebuild
1 parent 44a4d77 commit c995812

File tree

3 files changed

+13
-13
lines changed

3 files changed

+13
-13
lines changed

articles/api-management/security-baseline.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -183,7 +183,7 @@ Caution: When configuring an NSG on the API Management subnet, there are a set o
183183
**Guidance**: Define and implement standard security configurations for network settings related to your Azure API Management deployments. Use Azure Policy aliases in the "Microsoft.ApiManagement" and "Microsoft.Network" namespaces to create custom policies to audit or enforce network configuration of your Azure API Management deployments and related resources. You may also make use of built-in policy definitions for Azure Virtual Networks, such as:
184184
- DDoS Protection Standard should be enabled
185185

186-
You may also use Azure Blueprints to simplify large-scale Azure deployments by packaging key environment artifacts, such as Azure Resource manager templates, role-based access control (RBAC), and policies in a single blueprint definition. You can easily apply the blueprint to new subscriptions, environments, and fine-tune control and management through versioning.
186+
You may also use Azure Blueprints to simplify large-scale Azure deployments by packaging key environment artifacts, such as Azure Resource Manager templates, role-based access control (RBAC), and policies in a single blueprint definition. You can easily apply the blueprint to new subscriptions, environments, and fine-tune control and management through versioning.
187187

188188
* [How to configure and manage Azure Policy](https://docs.microsoft.com/azure/governance/policy/tutorials/create-and-manage)
189189

@@ -289,7 +289,7 @@ For data plane audit logging, diagnostic logs provide rich information about ope
289289

290290
### 2.6: Monitor and review Logs
291291

292-
**Guidance**: Azure API Management continuously emits logs and metrics to Azure Monitor, giving you anear real-time visibility into the state and health of your APIs. With Azure Monitor and Log Analytics workspace(s), you can review, query, visualize, route, archive, configure alerts, and take actions on metrics and logs coming from API Management and related resources. Analyze and monitor logs for anomalous behaviors and regularly review results.
292+
**Guidance**: Azure API Management continuously emits logs and metrics to Azure Monitor, giving you a near real-time visibility into the state and health of your APIs. With Azure Monitor and Log Analytics workspace(s), you can review, query, visualize, route, archive, configure alerts, and take actions on metrics and logs coming from API Management and related resources. Analyze and monitor logs for anomalous behaviors and regularly review results.
293293

294294
Optionally, integrate API Management with Azure Application Insights and use it as primary or secondary monitoring, tracing, reporting, and alerting tool.
295295

@@ -556,7 +556,7 @@ Configure advanced monitoring with API Management by using the `log-to-eventhub`
556556

557557
### 3.13: Provide Microsoft with access to relevant customer data during support scenarios
558558

559-
**Guidance**: Not yet available; Customer Lockbox is not yet supported for Azure API Management.
559+
**Guidance**: Not currently available; Customer Lockbox is not currently supported for Azure API Management.
560560

561561
* [List of Customer Lockbox-supported services](https://docs.microsoft.com/azure/security/fundamentals/customer-lockbox-overview#supported-services-and-scenarios-in-general-availability)
562562

@@ -596,7 +596,7 @@ Configure advanced monitoring with API Management by using the `log-to-eventhub`
596596

597597
### 4.3: Monitor and block unauthorized transfer of sensitive information
598598

599-
**Guidance**: Not yet available; data identification, classification, and loss prevention features are not yet available for Azure API Management.
599+
**Guidance**: Not currently available; data identification, classification, and loss prevention features are not currently available for Azure API Management.
600600

601601
Microsoft manages the underlying infrastructure for Azure API Management and has implemented strict controls to prevent the loss or exposure of customer data.
602602

@@ -624,7 +624,7 @@ Microsoft manages the underlying infrastructure for Azure API Management and has
624624

625625
### 4.5: Use an active discovery tool to identify sensitive data
626626

627-
**Guidance**: Not yet available; data identification, classification, and loss prevention features are not yet available for Azure API Management. Tag Azure API Management services that may be processing sensitive information as such and implement third-party solution if required for compliance purposes.
627+
**Guidance**: Not currently available; data identification, classification, and loss prevention features are not currently available for Azure API Management. Tag Azure API Management services that may be processing sensitive information as such and implement third-party solution if required for compliance purposes.
628628

629629
For the underlying platform which is managed by Microsoft, Microsoft treats all customer content as sensitive and goes to great lengths to guard against customer data loss and exposure. To ensure customer data within Azure remains secure, Microsoft has implemented and maintains a suite of robust data protection controls and capabilities.
630630

@@ -684,7 +684,7 @@ Microsoft manages the underlying infrastructure for Azure API Management and has
684684

685685
### 5.1: Run automated vulnerability scanning tools
686686

687-
**Guidance**: Not yet available; vulnerability assessment in Azure Security Center is not yet available for Azure API Management.
687+
**Guidance**: Not currently available; vulnerability assessment in Azure Security Center is not currently available for Azure API Management.
688688

689689
Underlying platform scanned and patched by Microsoft. Review security controls available to reduce service configuration related vulnerabilities.
690690

@@ -720,7 +720,7 @@ Underlying platform scanned and patched by Microsoft. Review security controls a
720720

721721
### 5.5: Use a risk-rating process to prioritize the remediation of discovered vulnerabilities
722722

723-
**Guidance**: Not yet available; vulnerability assessment in Azure Security Center is not yet available for Azure API Management.
723+
**Guidance**: Not currently available; vulnerability assessment in Azure Security Center is not currently available for Azure API Management.
724724

725725
Underlying platform scanned and patched by Microsoft. Customer to review security controls available to them to reduce service configuration related vulnerabilities.
726726

articles/azure-databricks/security-baseline.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -300,7 +300,7 @@ Note: Azure Databricks diagnostic logs require the Azure Databricks Premium Plan
300300

301301
* [How to use the SCIM APIs](https://docs.microsoft.com/azure/databricks/dev-tools/api/latest/scim/)
302302

303-
* [How to add and removes users in Azure Databricks](https://docs.microsoft.com/azure/databricks/administration-guide/users-groups/users)
303+
* [How to add and remove users in Azure Databricks](https://docs.microsoft.com/azure/databricks/administration-guide/users-groups/users)
304304

305305
**Azure Security Center monitoring**: Yes
306306

@@ -504,7 +504,7 @@ Microsoft manages the underlying infrastructure for Azure Databricks and has imp
504504

505505
### 4.5: Use an active discovery tool to identify sensitive data
506506

507-
**Guidance**: Currently not available; data identification, classification, and loss prevention features are not yet available for Azure Databricks. Tag Azure Databricks instances and related resources that may be processing sensitive information as such and implement third-party solution if required for compliance purposes.
507+
**Guidance**: Currently not available; data identification, classification, and loss prevention features are not currently available for Azure Databricks. Tag Azure Databricks instances and related resources that may be processing sensitive information as such and implement third-party solution if required for compliance purposes.
508508

509509
The Databricks platform is compute-only, and all the data is stored on other Azure data services. For the underlying platform which is managed by Microsoft, Microsoft treats all customer content as sensitive and goes to great lengths to guard against customer data loss and exposure. To ensure customer data within Azure remains secure, Microsoft has implemented and maintains a suite of robust data protection controls and capabilities.
510510

@@ -626,7 +626,7 @@ If you have a vulnerability management platform subscription, you may use Azure
626626

627627
**Guidance**: Use Azure Resource Graph to query/discover all resources (such as compute, storage, network, ports, and protocols etc.) within your subscription(s). Ensure appropriate (read) permissions exist in your tenant and enumerate all Azure subscriptions as well as resources within your subscriptions.
628628

629-
Although classic Azure resources may be discovered via Resource Graph, it is highly recommended to create and use ARM resources going forward.
629+
Although classic Azure resources may be discovered via Resource Graph, it is highly recommended to create and use Azure Resource Manager resources going forward.
630630

631631
* [How to create queries with Azure Resource Graph](https://docs.microsoft.com/azure/governance/resource-graph/first-query-portal)
632632

@@ -738,7 +738,7 @@ Use Azure Resource Graph to query/discover resources within their subscription(s
738738

739739
**Responsibility**: Customer
740740

741-
### 6.11: Limit users' ability to interact with ARM via scripts
741+
### 6.11: <div>Limit users' ability to interact with Azure Resource Manager via scripts</div>
742742

743743
**Guidance**: Use Azure Conditional Access to limit users' ability to interact with Azure Resource Manager by configuring "Block access" for the "Microsoft Azure Management" App.
744744

articles/azure-functions/security-baseline.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -514,7 +514,7 @@ You can streamline this process by creating diagnostic settings for Azure AD use
514514

515515
### 3.13: Provide Microsoft with access to relevant customer data during support scenarios
516516

517-
**Guidance**: Not yet available; Customer Lockbox is not yet supported for Azure Functions.
517+
**Guidance**: Not currently available; Customer Lockbox is not currently supported for Azure Functions.
518518

519519
- [List of Customer Lockbox-supported services](https://docs.microsoft.com/azure/security/fundamentals/customer-lockbox-overview#supported-services-and-scenarios-in-general-availability)
520520

@@ -582,7 +582,7 @@ Microsoft manages the underlying infrastructure for Azure Functions and has impl
582582

583583
### 4.5: Use an active discovery tool to identify sensitive data
584584

585-
**Guidance**: Not yet available; data identification, classification, and loss prevention features are not yet available for Azure Functions. Tag Function apps that may be processing sensitive information as such and implement third-party solution if required for compliance purposes.
585+
**Guidance**: Not currently available; data identification, classification, and loss prevention features are not currently available for Azure Functions. Tag Function apps that may be processing sensitive information as such and implement third-party solution if required for compliance purposes.
586586

587587
For the underlying platform which is managed by Microsoft, Microsoft treats all customer content as sensitive and goes to great lengths to guard against customer data loss and exposure. To ensure customer data within Azure remains secure, Microsoft has implemented and maintains a suite of robust data protection controls and capabilities.
588588

0 commit comments

Comments
 (0)