Skip to content

Commit d1f901f

Browse files
authored
Merge pull request #276259 from alexbuckgit/alexbuckgit/docutune-autopr-20240524-054208-6114392-ignore-build
[BULK] - DocuTune - Fix line break issues
2 parents 1c142ac + 2dda04b commit d1f901f

File tree

7 files changed

+27
-111
lines changed

7 files changed

+27
-111
lines changed

articles/governance/blueprints/samples/iso27001-ase-sql-workload/control-mapping.md

Lines changed: 6 additions & 29 deletions
Original file line numberDiff line numberDiff line change
@@ -11,11 +11,7 @@ ms.topic: sample
1111
The following article details how the Azure Blueprints ISO 27001 ASE/SQL Workload blueprint sample
1212
maps to the ISO 27001 controls.
1313

14-
The following mappings are to the **ISO 27001:2013** controls. Use the navigation on the right to
15-
jump directly to a specific control mapping. Many of the mapped controls are implemented with an [Azure Policy](../../../policy/overview.md)
16-
initiative. To review the complete initiative, open **Policy** in the Azure portal and select the
17-
**Definitions** page. Then, find and select the **\[Preview\] Audit ISO 27001:2013 controls and deploy
18-
specific VM Extensions to support audit requirements** built-in policy initiative.
14+
The following mappings are to the **ISO 27001:2013** controls. Use the navigation on the right to jump directly to a specific control mapping. Many of the mapped controls are implemented with an [Azure Policy](../../../policy/overview.md) initiative. To review the complete initiative, open **Policy** in the Azure portal and select the **Definitions** page. Then, find and select the **\[Preview\] Audit ISO 27001:2013 controls and deploy specific VM Extensions to support audit requirements** built-in policy initiative.
1915

2016
> [!IMPORTANT]
2117
> Each control below is associated with one or more [Azure Policy](../../../policy/overview.md)
@@ -44,21 +40,13 @@ appropriate separation of duties.
4440

4541
## A.8.2.1 Classification of information
4642

47-
Azure's [SQL Vulnerability Assessment service](../../../../defender-for-cloud/sql-azure-vulnerability-assessment-overview.md)
48-
can help you discover sensitive data stored in your databases and includes recommendations to
49-
classify that data. This blueprint assigns an [Azure Policy](../../../policy/overview.md) definition
50-
to audit that vulnerabilities identified during SQL Vulnerability Assessment scan are remediated.
43+
Azure's [SQL Vulnerability Assessment service](../../../../defender-for-cloud/sql-azure-vulnerability-assessment-overview.md) can help you discover sensitive data stored in your databases and includes recommendations to classify that data. This blueprint assigns an [Azure Policy](../../../policy/overview.md) definition to audit that vulnerabilities identified during SQL Vulnerability Assessment scan are remediated.
5144

5245
- Vulnerabilities on your SQL databases should be remediated
5346

5447
## A.9.1.2 Access to networks and network services
5548

56-
Azure implements [Azure role-based access control (Azure RBAC)](../../../../role-based-access-control/overview.md)
57-
to manage who has access to Azure resources. This blueprint helps you control access to Azure
58-
resources by assigning seven [Azure Policy](../../../policy/overview.md) definitions. These policies
59-
audit use of resource types and configurations that may allow more permissive access to resources.
60-
Understanding resources that are in violation of these policies can help you take corrective actions
61-
to ensure access Azure resources is restricted to authorized users.
49+
Azure implements [Azure role-based access control (Azure RBAC)](../../../../role-based-access-control/overview.md) to manage who has access to Azure resources. This blueprint helps you control access to Azure resources by assigning seven [Azure Policy](../../../policy/overview.md) definitions. These policies audit use of resource types and configurations that may allow more permissive access to resources. Understanding resources that are in violation of these policies can help you take corrective actions to ensure access Azure resources is restricted to authorized users.
6250

6351
- Show audit results from Linux VMs that have accounts without passwords
6452
- Show audit results from Linux VMs that allow remote connections from accounts without passwords
@@ -104,11 +92,7 @@ corrective action to ensure authenticators aren't compromised.
10492

10593
## A.9.2.5 Review of user access rights
10694

107-
Azure implements [Azure role-based access control (Azure RBAC)](../../../../role-based-access-control/overview.md)
108-
to help you manage who has access to resources in Azure. Using the Azure portal, you can
109-
review who has access to Azure resources and their permissions. This blueprint assigns four [Azure
110-
Policy](../../../policy/overview.md) definitions to audit accounts that should be prioritized for
111-
review, including depreciated accounts and external accounts with elevated permissions.
95+
Azure implements [Azure role-based access control (Azure RBAC)](../../../../role-based-access-control/overview.md) to help you manage who has access to resources in Azure. Using the Azure portal, you can review who has access to Azure resources and their permissions. This blueprint assigns four [Azure Policy](../../../policy/overview.md) definitions to audit accounts that should be prioritized for review, including depreciated accounts and external accounts with elevated permissions.
11296

11397
- Deprecated accounts should be removed from your subscription
11498
- Deprecated accounts with owner permissions should be removed from your subscription
@@ -117,13 +101,7 @@ review, including depreciated accounts and external accounts with elevated permi
117101

118102
## A.9.2.6 Removal or adjustment of access rights
119103

120-
Azure implements [Azure role-based access control (Azure RBAC)](../../../../role-based-access-control/overview.md)
121-
to help you manage who has access to resources in Azure. Using [Azure Active
122-
Directory](../../../../active-directory/fundamentals/active-directory-whatis.md) and Azure RBAC, you can
123-
update user roles to reflect organizational changes. When needed, accounts can be blocked from
124-
signing in (or removed), which immediately removes access rights to Azure resources. This blueprint
125-
assigns two [Azure Policy](../../../policy/overview.md) definitions to audit depreciated account
126-
that should be considered for removal.
104+
Azure implements [Azure role-based access control (Azure RBAC)](../../../../role-based-access-control/overview.md) to help you manage who has access to resources in Azure. Using [Azure Active Directory](../../../../active-directory/fundamentals/active-directory-whatis.md) and Azure RBAC, you can update user roles to reflect organizational changes. When needed, accounts can be blocked from signing in (or removed), which immediately removes access rights to Azure resources. This blueprint assigns two [Azure Policy](../../../policy/overview.md) definitions to audit depreciated account that should be considered for removal.
127105

128106
- Deprecated accounts should be removed from your subscription
129107
- Deprecated accounts with owner permissions should be removed from your subscription
@@ -156,8 +134,7 @@ with policy.
156134

157135
## A.10.1.1 Policy on the use of cryptographic controls
158136

159-
This blueprint helps you enforce your policy on the use of cryptograph controls by assigning 13 [Azure Policy](../../../policy/overview.md)
160-
definitions that enforce specific cryptograph controls and audit use of weak cryptographic settings.
137+
This blueprint helps you enforce your policy on the use of cryptograph controls by assigning 13 [Azure Policy](../../../policy/overview.md) definitions that enforce specific cryptograph controls and audit use of weak cryptographic settings.
161138
Understanding where your Azure resources may have non-optimal cryptographic configurations can help
162139
you take corrective actions to ensure resources are configured in accordance with your information
163140
security policy. Specifically, the policies assigned by this blueprint require encryption for blob

articles/governance/blueprints/samples/iso27001-shared/control-mapping.md

Lines changed: 5 additions & 22 deletions
Original file line numberDiff line numberDiff line change
@@ -46,21 +46,13 @@ appropriate separation of duties.
4646
## A.8.2.1 Classification of information
4747

4848
Azure's
49-
[SQL Vulnerability Assessment service](../../../../defender-for-cloud/sql-azure-vulnerability-assessment-overview.md)
50-
can help you discover sensitive data stored in your databases and includes recommendations to
51-
classify that data. This blueprint assigns an [Azure Policy](../../../policy/overview.md) definition
52-
to audit that vulnerabilities identified during SQL Vulnerability Assessment scan are remediated.
49+
[SQL Vulnerability Assessment service](../../../../defender-for-cloud/sql-azure-vulnerability-assessment-overview.md) can help you discover sensitive data stored in your databases and includes recommendations to classify that data. This blueprint assigns an [Azure Policy](../../../policy/overview.md) definition to audit that vulnerabilities identified during SQL Vulnerability Assessment scan are remediated.
5350

5451
- Vulnerabilities on your SQL databases should be remediated
5552

5653
## A.9.1.2 Access to networks and network services
5754

58-
[Azure role-based access control (Azure RBAC)](../../../../role-based-access-control/overview.md)
59-
helps to manage who has access to Azure resources. This blueprint helps you control access to Azure
60-
resources by assigning seven [Azure Policy](../../../policy/overview.md) definitions. These policies
61-
audit use of resource types and configurations that may allow more permissive access to resources.
62-
Understanding resources that are in violation of these policies can help you take corrective actions
63-
to ensure access Azure resources is restricted to authorized users.
55+
[Azure role-based access control (Azure RBAC)](../../../../role-based-access-control/overview.md) helps to manage who has access to Azure resources. This blueprint helps you control access to Azure resources by assigning seven [Azure Policy](../../../policy/overview.md) definitions. These policies audit use of resource types and configurations that may allow more permissive access to resources. Understanding resources that are in violation of these policies can help you take corrective actions to ensure access Azure resources is restricted to authorized users.
6456

6557
- Show audit results from Linux VMs that have accounts without passwords
6658
- Show audit results from Linux VMs that allow remote connections from accounts without passwords
@@ -107,11 +99,7 @@ corrective action to ensure authenticators aren't compromised.
10799

108100
## A.9.2.5 Review of user access rights
109101

110-
[Azure role-based access control (Azure RBAC)](../../../../role-based-access-control/overview.md)
111-
helps you manage who has access to resources in Azure. Using the Azure portal, you can review who
112-
has access to Azure resources and their permissions. This blueprint assigns four [Azure
113-
Policy](../../../policy/overview.md) definitions to audit accounts that should be prioritized for
114-
review, including depreciated accounts and external accounts with elevated permissions.
102+
[Azure role-based access control (Azure RBAC)](../../../../role-based-access-control/overview.md) helps you manage who has access to resources in Azure. Using the Azure portal, you can review who has access to Azure resources and their permissions. This blueprint assigns four [Azure Policy](../../../policy/overview.md) definitions to audit accounts that should be prioritized for review, including depreciated accounts and external accounts with elevated permissions.
115103

116104
- Deprecated accounts should be removed from your subscription
117105
- Deprecated accounts with owner permissions should be removed from your subscription
@@ -120,13 +108,8 @@ review, including depreciated accounts and external accounts with elevated permi
120108

121109
## A.9.2.6 Removal or adjustment of access rights
122110

123-
[Azure role-based access control (Azure RBAC)](../../../../role-based-access-control/overview.md)
124-
helps you manage who has access to resources in Azure. Using [Azure Active
125-
Directory](../../../../active-directory/fundamentals/active-directory-whatis.md) and Azure RBAC, you
126-
can update user roles to reflect organizational changes. When needed, accounts can be blocked from
127-
signing in (or removed), which immediately removes access rights to Azure resources. This blueprint
128-
assigns two [Azure Policy](../../../policy/overview.md) definitions to audit depreciated account
129-
that should be considered for removal.
111+
[Azure role-based access control (Azure RBAC)](../../../../role-based-access-control/overview.md) helps you manage who has access to resources in Azure. Using [Azure Active
112+
Directory](../../../../active-directory/fundamentals/active-directory-whatis.md) and Azure RBAC, you can update user roles to reflect organizational changes. When needed, accounts can be blocked from signing in (or removed), which immediately removes access rights to Azure resources. This blueprint assigns two [Azure Policy](../../../policy/overview.md) definitions to audit depreciated account that should be considered for removal.
130113

131114
- Deprecated accounts should be removed from your subscription
132115
- Deprecated accounts with owner permissions should be removed from your subscription

articles/governance/blueprints/samples/iso27001-shared/index.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -13,8 +13,7 @@ and policy guardrails that help toward ISO 27001 attestation. This blueprint hel
1313
cloud-based architectures that offer solutions to scenarios that have accreditation or compliance
1414
requirements.
1515

16-
The [ISO 27001 App Service Environment/SQL Database workload](../iso27001-ase-sql-workload/index.md)
17-
blueprint sample extends this sample.
16+
The [ISO 27001 App Service Environment/SQL Database workload](../iso27001-ase-sql-workload/index.md) blueprint sample extends this sample.
1817

1918
## Architecture
2019

articles/governance/blueprints/samples/swift-2020/control-mapping.md

Lines changed: 3 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -32,11 +32,7 @@ audit requirements** built-in policy initiative.
3232
3333
## 1.2 and 5.1 Account Management
3434

35-
This blueprint helps you review accounts that may not comply with your organization's account
36-
management requirements. This blueprint assigns [Azure Policy](../../../policy/overview.md)
37-
definitions that audit external accounts with read, write and owner permissions on a subscription
38-
and deprecated accounts. By reviewing the accounts audited by these policies, you can take
39-
appropriate action to ensure account management requirements are met.
35+
This blueprint helps you review accounts that may not comply with your organization's account management requirements. This blueprint assigns [Azure Policy](../../../policy/overview.md) definitions that audit external accounts with read, write and owner permissions on a subscription and deprecated accounts. By reviewing the accounts audited by these policies, you can take appropriate action to ensure account management requirements are met.
4036

4137
- Deprecated accounts should be removed from your subscription
4238
- Deprecated accounts with owner permissions should be removed from your subscription
@@ -91,12 +87,7 @@ separation of duties.
9187

9288
## 1.3, 5.1, and 6.4 Least Privilege | Review of User Privileges
9389

94-
[Azure role-based access control (Azure RBAC)](../../../../role-based-access-control/overview.md)
95-
helps you manage who has access to resources in Azure. Using the Azure portal, you can review who
96-
has access to Azure resources and their permissions. This blueprint assigns
97-
[Azure Policy](../../../policy/overview.md) definitions to audit accounts that should be prioritized
98-
for review. Reviewing these account indicators can help you ensure least privilege controls are
99-
implemented.
90+
[Azure role-based access control (Azure RBAC)](../../../../role-based-access-control/overview.md) helps you manage who has access to resources in Azure. Using the Azure portal, you can review who has access to Azure resources and their permissions. This blueprint assigns [Azure Policy](../../../policy/overview.md) definitions to audit accounts that should be prioritized for review. Reviewing these account indicators can help you ensure least privilege controls are implemented.
10091

10192
- A maximum of 3 owners should be designated for your subscription
10293
- Show audit results from Windows VMs that are not joined to the specified domain
@@ -210,12 +201,7 @@ been configured.
210201

211202
## 1.1 User-Installed Software
212203

213-
Adaptive application control in Azure Security Center is an intelligent, automated end-to-end
214-
application filtering solution that can block or prevent specific software from running on your
215-
virtual machines. Application control can help you enforce and monitor compliance with software
216-
restriction policies. This blueprint assigns an [Azure Policy](../../../policy/overview.md)
217-
definition that helps you monitor virtual machines where an application allowlist is recommended
218-
but has not yet been configured.
204+
Adaptive application control in Azure Security Center is an intelligent, automated end-to-end application filtering solution that can block or prevent specific software from running on your virtual machines. Application control can help you enforce and monitor compliance with software restriction policies. This blueprint assigns an [Azure Policy](../../../policy/overview.md) definition that helps you monitor virtual machines where an application allowlist is recommended but has not yet been configured.
219205

220206
- Adaptive application controls for defining safe applications should be enabled on your machines
221207
- Virtual machines should be migrated to new Azure Resource Manager resources

articles/governance/management-groups/azure-management.md

Lines changed: 1 addition & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -43,11 +43,7 @@ covers the different services used at [Monitoring Azure applications and resourc
4343

4444
## Configure
4545

46-
Configure refers to the initial deployment and configuration of resources and ongoing maintenance.
47-
Automation of these tasks allows you to eliminate redundancy, minimizing your time and effort and
48-
increasing your accuracy and efficiency. [Azure Automation](../../automation/overview.md)
49-
provides the bulk of services for automating configuration tasks. While runbooks handle process
50-
automation, configuration and update management help manage configuration.
46+
Configure refers to the initial deployment and configuration of resources and ongoing maintenance. Automation of these tasks allows you to eliminate redundancy, minimizing your time and effort and increasing your accuracy and efficiency. [Azure Automation](../../automation/overview.md) provides the bulk of services for automating configuration tasks. While runbooks handle process automation, configuration and update management help manage configuration.
5147

5248
## Govern
5349

0 commit comments

Comments
 (0)