Skip to content

Commit e11244f

Browse files
committed
Policy samples 2025-07-23-3
1 parent ef9b8d7 commit e11244f

File tree

84 files changed

+98
-87
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

84 files changed

+98
-87
lines changed

includes/policy/reference/byrp/microsoft.cdn.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
ms.service: azure-policy
33
ms.topic: include
4-
ms.date: 07/08/2025
4+
ms.date: 07/23/2025
55
ms.author: jasongroce
66
author: jasongroce
77
ms.custom: generated

includes/policy/reference/byrp/microsoft.chaos.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
ms.service: azure-policy
33
ms.topic: include
4-
ms.date: 07/08/2025
4+
ms.date: 07/23/2025
55
ms.author: jasongroce
66
author: jasongroce
77
ms.custom: generated

includes/policy/reference/byrp/microsoft.classiccompute.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
ms.service: azure-policy
33
ms.topic: include
4-
ms.date: 07/08/2025
4+
ms.date: 07/23/2025
55
ms.author: jasongroce
66
author: jasongroce
77
ms.custom: generated

includes/policy/reference/byrp/microsoft.classicnetwork.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
ms.service: azure-policy
33
ms.topic: include
4-
ms.date: 07/08/2025
4+
ms.date: 07/23/2025
55
ms.author: jasongroce
66
author: jasongroce
77
ms.custom: generated

includes/policy/reference/byrp/microsoft.classicstorage.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
ms.service: azure-policy
33
ms.topic: include
4-
ms.date: 07/08/2025
4+
ms.date: 07/23/2025
55
ms.author: jasongroce
66
author: jasongroce
77
ms.custom: generated

includes/policy/reference/byrp/microsoft.cloudpartnerprogram.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
ms.service: azure-policy
33
ms.topic: include
4-
ms.date: 07/08/2025
4+
ms.date: 07/23/2025
55
ms.author: jasongroce
66
author: jasongroce
77
ms.custom: generated

includes/policy/reference/byrp/microsoft.cloudtest.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
ms.service: azure-policy
33
ms.topic: include
4-
ms.date: 07/08/2025
4+
ms.date: 07/23/2025
55
ms.author: jasongroce
66
author: jasongroce
77
ms.custom: generated

includes/policy/reference/byrp/microsoft.codesigning.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
ms.service: azure-policy
33
ms.topic: include
4-
ms.date: 07/08/2025
4+
ms.date: 07/23/2025
55
ms.author: jasongroce
66
author: jasongroce
77
ms.custom: generated

includes/policy/reference/byrp/microsoft.cognitiveservices.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,14 +1,15 @@
11
---
22
ms.service: azure-policy
33
ms.topic: include
4-
ms.date: 07/08/2025
4+
ms.date: 07/23/2025
55
ms.author: jasongroce
66
author: jasongroce
77
ms.custom: generated
88
---
99

1010
|Name<br /><sub>(Azure portal)</sub> |Description |Effect(s) |Version<br /><sub>(GitHub)</sub> |
1111
|---|---|---|---|
12+
|[\[Preview\]: Cognitive Services Deployments should only use approved Registry Models](https://portal.azure.com/#blade/Microsoft_Azure_Policy/PolicyDetailBlade/definitionId/%2Fproviders%2FMicrosoft.Authorization%2FpolicyDefinitions%2Faafe3651-cb78-4f68-9f81-e7e41509110f) |Restrict the deployment of Registry models to control externally created models used within your organization |Audit, Deny, Disabled |[1.0.0-preview](https://github.com/Azure/azure-policy/blob/master/built-in-policies/policyDefinitions/Cognitive%20Services/AllowDeployRegistryModels_Audit.json) |
1213
|[Azure AI Services resources should encrypt data at rest with a customer-managed key (CMK)](https://portal.azure.com/#blade/Microsoft_Azure_Policy/PolicyDetailBlade/definitionId/%2Fproviders%2FMicrosoft.Authorization%2FpolicyDefinitions%2F67121cc7-ff39-4ab8-b7e3-95b84dab487d) |Using customer-managed keys to encrypt data at rest provides more control over the key lifecycle, including rotation and management. This is particularly relevant for organizations with related compliance requirements. This is not assessed by default and should only be applied when required by compliance or restrictive policy requirements. If not enabled, the data will be encrypted using platform-managed keys. To implement this, update the 'Effect' parameter in the Security Policy for the applicable scope. |Audit, Deny, Disabled |[2.2.0](https://github.com/Azure/azure-policy/blob/master/built-in-policies/policyDefinitions/Cognitive%20Services/CustomerManagedKey_Audit.json) |
1314
|[Azure AI Services resources should have key access disabled (disable local authentication)](https://portal.azure.com/#blade/Microsoft_Azure_Policy/PolicyDetailBlade/definitionId/%2Fproviders%2FMicrosoft.Authorization%2FpolicyDefinitions%2F71ef260a-8f18-47b7-abcb-62d0673d94dc) |Key access (local authentication) is recommended to be disabled for security. Azure OpenAI Studio, typically used in development/testing, requires key access and will not function if key access is disabled. After disabling, Microsoft Entra ID becomes the only access method, which allows maintaining minimum privilege principle and granular control. Learn more at: [https://aka.ms/AI/auth](https://aka.ms/AI/auth) |Audit, Deny, Disabled |[1.1.0](https://github.com/Azure/azure-policy/blob/master/built-in-policies/policyDefinitions/Azure%20Ai%20Services/DisableLocalAuth_Audit.json) |
1415
|[Azure AI Services resources should restrict network access](https://portal.azure.com/#blade/Microsoft_Azure_Policy/PolicyDetailBlade/definitionId/%2Fproviders%2FMicrosoft.Authorization%2FpolicyDefinitions%2F037eea7a-bd0a-46c5-9a66-03aea78705d3) |By restricting network access, you can ensure that only allowed networks can access the service. This can be achieved by configuring network rules so that only applications from allowed networks can access the Azure AI service. |Audit, Deny, Disabled |[3.2.0](https://github.com/Azure/azure-policy/blob/master/built-in-policies/policyDefinitions/Azure%20Ai%20Services/NetworkAcls_Audit.json) |

includes/policy/reference/byrp/microsoft.communication.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
ms.service: azure-policy
33
ms.topic: include
4-
ms.date: 07/08/2025
4+
ms.date: 07/23/2025
55
ms.author: jasongroce
66
author: jasongroce
77
ms.custom: generated

0 commit comments

Comments
 (0)