Skip to content

Commit f1160cd

Browse files
committed
Address grammer and errors
1 parent d750b77 commit f1160cd

File tree

2 files changed

+11
-11
lines changed

2 files changed

+11
-11
lines changed

articles/governance/policy/how-to/policy-safe-deployment-practices.md

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -11,15 +11,15 @@ ms.author: timwarner
1111
As your environment expands, so does the demand for a controlled continuous deployment (CD)
1212
pipeline with progressive exposure control. Accordingly, Microsoft recommends DevOps teams follow
1313
the safe deployment practices (SDP) framework. The
14-
safe deployment of Azure Policy definitions and assignments assists in limiting the impact of
14+
safe deployment of Azure Policy definitions and assignments helps limiting the impact of
1515
unintended behaviors of policy resources.
1616

1717
The high-level approach of implementing SDP with Azure Policy is to roll out policy assignments
1818
by rings to detect policy changes that affect the environment in early stages before it
1919
affects the critical cloud infrastructure.
2020

2121
Deployment rings can be organized in diverse ways. In this how-to tutorial, rings are divided by
22-
different Azure regions with _Ring 0_ representing critical, low traffic locations
22+
different Azure regions with _Ring 0_ representing non-critical, low traffic locations
2323
and _Ring 5_ denoting the most critical, highest traffic locations.
2424

2525
## Steps for safe deployment of Azure Policy assignments with deny or append effects
@@ -35,7 +35,7 @@ Policy assignments that use the `deny` or `append` policy effects.
3535
We recommend storing Azure Policy definitions at the management group scope for maximum flexibility.
3636

3737
2. Once you've created your policy definition, assign the policy at the highest-level scope inclusive
38-
of all deployment rings. Leverage _resource selectors_ to narrow the applicability to the least
38+
of all deployment rings. Apply _resource selectors_ to narrow the applicability to the least
3939
critical ring by using the `"kind": "resource location"` property. Configure the `audit` effect type
4040
by using _assignment overrides_. Sample selector with eastUS location and effect as audit
4141

@@ -61,13 +61,13 @@ encompass the following logic:
6161

6262
- Gather compliance results
6363
- If compliance results are as expected, the pipeline should continue
64-
- If compliance results are not as expected, the pipeline should fail and you should start debugging
64+
- If compliance results aren't as expected, the pipeline should fail and you should start debugging
6565

6666
For example, you can configure the compliance check by using other tools within
6767
your particular continuous integration/continuous deployment (CI/CD) pipeline.
6868

6969
At each rollout stage, the application health checks should confirm the stability of the service
70-
and impact of the policy. If the results are not as expected due to application configuration,
70+
and impact of the policy. If the results aren't as expected due to application configuration,
7171
refactor the application as appropriate.
7272

7373
4. Repeat by expanding the resource selector property values to include the next rings’
@@ -83,7 +83,7 @@ locations and validating the expected compliance results and application health.
8383
}]
8484
```
8585

86-
5. Once you've successfully assigned the policy to all rings using `audit` mode,
86+
5. Once you have successfully assigned the policy to all rings using `audit` mode,
8787
the pipeline should trigger a task that changes the policy effect to `deny` and reset
8888
the resource selectors to the location associated with _Ring 0_. Example selector with one region and effect set to deny:
8989

@@ -101,7 +101,7 @@ the resource selectors to the location associated with _Ring 0_. Example selecto
101101
}]
102102
```
103103

104-
6. After changing the effect, automated tests should check whether enforcement is taking place as
104+
6. Once the effect is changed, automated tests should check whether enforcement is taking place as
105105
expected.
106106

107107
7. Repeat by including more rings in your resource selector configuration.
@@ -110,10 +110,10 @@ expected.
110110

111111
## Steps for safe deployment of Azure Policy assignments with modify or deployIfNotExists effects
112112

113-
Steps 1-4 for policies using the `modify` or `deployIfNotExists` effects are the same as above.
114-
Study the following flowchart and then review modified steps 5-9:
113+
Steps 1-4 for policies using the `modify` or `deployIfNotExists` effects are the same as steps previously explained.
114+
Review the following flowchart with modified steps 5-9:
115115

116-
:::image type="content" source="safe-deployment-practices-flowchart2.png" alt-text="Flowchart showing steps five through nine in the Azure Policy safe deployment practices workflow." border="true":::
116+
:::image type="content" source="safe-deployment-practices-flowchart2.png" alt-text="Flowchart showing steps 5 through 9 in the Azure Policy safe deployment practices workflow." border="true":::
117117

118118
5. Once you've assigned the policy to all rings using `audit` mode, the pipeline should trigger
119119
a task that changes the policy effect to `modify` or `deployIfNotExists` and resets

articles/governance/policy/toc.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -236,7 +236,7 @@
236236
href: /security/benchmark/azure/baselines/azure-policy-security-baseline?toc=/azure/governance/policy/toc.json&bc=/azure/governance/policy/breadcrumb/toc.json
237237
- name: How-to guides
238238
items:
239-
- name: Safe deployment of Azure Policy assignments
239+
- name: Safe deployment of Azure Policy assignments
240240
displayName: policy, assignments, sdp
241241
href: ./how-to/policy-safe-deployment-practices.md
242242
- name: Azure Policy extension for VS Code

0 commit comments

Comments
 (0)