|
1 | 1 | ---
|
2 | 2 | title: Evaluate the impact of a new Azure Policy definition
|
3 | 3 | description: Understand the process to follow when introducing a new policy definition into your Azure environment.
|
4 |
| -ms.date: 09/23/2019 |
| 4 | +ms.date: 05/20/2020 |
5 | 5 | ms.topic: conceptual
|
6 | 6 | ---
|
7 | 7 | # Evaluate the impact of a new Azure Policy definition
|
8 | 8 |
|
9 | 9 | Azure Policy is a powerful tool for managing your Azure resources to business standards and to meet
|
10 | 10 | compliance needs. When people, processes, or pipelines create or update resources, Azure Policy
|
11 |
| -reviews the request. When the policy definition effect is [Append](./effects.md#deny) or [DeployIfNotExists](./effects.md#deployifnotexists), |
12 |
| -Policy alters the request or adds to it. When the policy definition effect is [Audit](./effects.md#audit) |
13 |
| -or [AuditIfNotExists](./effects.md#auditifnotexists), Policy causes an Activity log entry to be |
| 11 | +reviews the request. When the policy definition effect is [Append](./effects.md#deny) or |
| 12 | +[DeployIfNotExists](./effects.md#deployifnotexists), Policy alters the request or adds to it. When |
| 13 | +the policy definition effect is [Audit](./effects.md#audit) or |
| 14 | +[AuditIfNotExists](./effects.md#auditifnotexists), Policy causes an Activity log entry to be |
14 | 15 | created. And when the policy definition effect is [Deny](./effects.md#deny), Policy stops the
|
15 | 16 | creation or alteration of the request.
|
16 | 17 |
|
@@ -45,9 +46,10 @@ and the properties you need to evaluate for compliance as possible.
|
45 | 46 | ## Audit existing resources
|
46 | 47 |
|
47 | 48 | Before looking to manage new or updated resources with your new policy definition, it's best to see
|
48 |
| -how it evaluates a limited subset of existing resources, such as a test resource group. Use the [enforcement mode](./assignment-structure.md#enforcement-mode) |
49 |
| -_Disabled_ (DoNotEnforce) on your policy assignment to prevent the [effect](./effects.md) from |
50 |
| -triggering or activity log entries from being created. |
| 49 | +how it evaluates a limited subset of existing resources, such as a test resource group. Use the |
| 50 | +[enforcement mode](./assignment-structure.md#enforcement-mode) _Disabled_ (DoNotEnforce) on your |
| 51 | +policy assignment to prevent the [effect](./effects.md) from triggering or activity log entries from |
| 52 | +being created. |
51 | 53 |
|
52 | 54 | This step gives you a chance to evaluate the compliance results of the new policy on existing
|
53 | 55 | resources without impacting work flow. Check that no compliant resources are marked as non-compliant
|
@@ -102,12 +104,14 @@ security and compliance organizations to ensure there are no gaps in coverage.
|
102 | 104 |
|
103 | 105 | ## Monitor your policy and compliance
|
104 | 106 |
|
105 |
| -Implementing and assigning your policy definition isn't the final step. Continuously monitor the [compliance](../how-to/get-compliance-data.md) |
106 |
| -level of resources to your new policy definition and setup appropriate [Azure Monitor alerts and notifications](../../../azure-monitor/platform/alerts-overview.md) |
107 |
| -for when non-compliant devices are identified. It's also recommended to evaluate the policy |
108 |
| -definition and related assignments on a scheduled basis to validate the policy definition is meeting |
109 |
| -business policy and compliance needs. Policies should be removed if no longer needed. Policies also |
110 |
| -need updating from time to time as the underlying Azure resources evolve and add new properties and |
| 107 | +Implementing and assigning your policy definition isn't the final step. Continuously monitor the |
| 108 | +[compliance](../how-to/get-compliance-data.md) level of resources to your new policy definition and |
| 109 | +setup appropriate |
| 110 | +[Azure Monitor alerts and notifications](../../../azure-monitor/platform/alerts-overview.md) for |
| 111 | +when non-compliant devices are identified. It's also recommended to evaluate the policy definition |
| 112 | +and related assignments on a scheduled basis to validate the policy definition is meeting business |
| 113 | +policy and compliance needs. Policies should be removed if no longer needed. Policies also need |
| 114 | +updating from time to time as the underlying Azure resources evolve and add new properties and |
111 | 115 | capabilities.
|
112 | 116 |
|
113 | 117 | ## Next steps
|
|
0 commit comments