Skip to content

Commit f35040a

Browse files
committed
writing
1 parent db13010 commit f35040a

File tree

1 file changed

+44
-31
lines changed

1 file changed

+44
-31
lines changed

articles/machine-learning/how-to-integrate-azure-policy.md

Lines changed: 44 additions & 31 deletions
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@ As a platform administrator, you can use policies to lay out guardrails for team
2424

2525
Azure Machine Learning provides a set of policies that you can use for common scenarios with Azure Machine Learning. You can assign these policy definitions to your existing subscription or use them as the basis to create your own custom definitions.
2626

27-
The table below lists the built-in policies you can assign with Azure Machine Learning. For a complete list of the built-in policies for Azure services, see [Built-in policies](../governance/policy/samples/built-in-policies.md).
27+
The table below lists the built-in policies you can assign with Azure Machine Learning. For a list of all Azure built-in policies, see [Built-in policies](../governance/policy/samples/built-in-policies.md).
2828

2929
[!INCLUDE [azure-policy-reference-policies-machine-learning](../../includes/policy/reference/bycat/policies-machine-learning.md)]
3030

@@ -70,36 +70,55 @@ Azure Machine Learning integrates with [data landing zones](https://github.com/A
7070

7171
## Configure built-in policies
7272

73+
### Compute instances should have idle shutdown
74+
75+
TBD
76+
77+
### Compute instances should be recreated to get software updates
78+
79+
TBD
80+
81+
### Compute cluster and instance should be in a virtual network
82+
83+
Controls auditing of compute cluster and instance resources behind a virtual network.
84+
85+
To configure this policy, set the effect parameter to __audit__ or __disabled__. If set to __audit__, you can create a compute that is not configured behind a virtual network and a warning event is created in the activity log.
86+
87+
### Computes should have local authentication methods disabled.
88+
89+
Controls whether an Azure Machine Learning compute cluster or instance should disable local authentication (SSH).
7390

91+
To configure this policy, set the effect parameter to __audit__, __deny__, or __disabled__. If set to __audit__, you can create a compute with SSH enabled and a warning event is created in the activity log.
7492

93+
If the policy is set to __deny__, then you cannot create a compute unless SSH is disabled. Attempting to create a compute with SSH enabled results in an error. The error is also logged in the activity log. The policy identifier is returned as part of this error.
7594

76-
### Workspace encryption with customer-managed key
95+
### Workspaces should be encrypted with customer-managed key
7796

7897
Controls whether a workspace should be encrypted with a customer-managed key, or using a Microsoft-managed key to encrypt metrics and metadata. For more information on using customer-managed key, see the [Azure Cosmos DB](concept-data-encryption.md#azure-cosmos-db) section of the data encryption article.
7998

8099
To configure this policy, set the effect parameter to __audit__ or __deny__. If set to __audit__, you can create a workspace without a customer-managed key and a warning event is created in the activity log.
81100

82101
If the policy is set to __deny__, then you cannot create a workspace unless it specifies a customer-managed key. Attempting to create a workspace without a customer-managed key results in an error similar to `Resource 'clustername' was disallowed by policy` and creates an error in the activity log. The policy identifier is also returned as part of this error.
83102

84-
### Workspace should use private link
103+
### Workspaces should disable public network access
85104

86-
Controls whether a workspace should use Azure Private Link to communicate with Azure Virtual Network. For more information on using private link, see [Configure private link for a workspace](how-to-configure-private-link.md).
105+
Controls whether a workspace should disable network access from the public internet.
87106

88-
To configure this policy, set the effect parameter to __audit__ or __deny__. If set to __audit__, you can create a workspace without using private link and a warning event is created in the activity log.
107+
To configure this policy, set the effect parameter to __audit__, __deny__, or __disabled__. If set to __audit__, you can create a workspace with public access and a warning event is created in the activity log.
89108

90-
If the policy is set to __deny__, then you cannot create a workspace unless it uses a private link. Attempting to create a workspace without a private link results in an error. The error is also logged in the activity log. The policy identifier is returned as part of this error.
109+
If the policy is set to __deny__, then you cannot create a workspace that allows network access from the public internet.
91110

92-
### Workspace should use private endpoint
111+
### Workspaces should enable V1LegacyMode to support network isolation backward compatibility
93112

94-
Configures a workspace to create a private endpoint within the specified subnet of an Azure Virtual Network.
113+
TBD
95114

96-
To configure this policy, set the effect parameter to __DeployIfNotExists__. Set the __privateEndpointSubnetID__ to the Azure Resource Manager ID of the subnet.
115+
### Workspace should use private link
97116

98-
### Workspace should use private DNS zones
117+
Controls whether a workspace should use Azure Private Link to communicate with Azure Virtual Network. For more information on using private link, see [Configure private link for a workspace](how-to-configure-private-link.md).
99118

100-
Configures a workspace to use a private DNS zone, overriding the default DNS resolution for a private endpoint.
119+
To configure this policy, set the effect parameter to __audit__ or __deny__. If set to __audit__, you can create a workspace without using private link and a warning event is created in the activity log.
101120

102-
To configure this policy, set the effect parameter to __DeployIfNotExists__. Set the __privateDnsZoneId__ to the Azure Resource Manager ID of the private DNS zone to use.
121+
If the policy is set to __deny__, then you cannot create a workspace unless it uses a private link. Attempting to create a workspace without a private link results in an error. The error is also logged in the activity log. The policy identifier is returned as part of this error.
103122

104123
### Workspace should use user-assigned managed identity
105124

@@ -109,42 +128,36 @@ To configure this policy, set the effect parameter to __audit__, __deny__, or __
109128

110129
If the policy is set to __deny__, then you cannot create a workspace unless you provide a user-assigned identity during the creation process. Attempting to create a workspace without providing a user-assigned identity results in an error. The error is also logged to the activity log. The policy identifier is returned as part of this error.
111130

112-
### Workspace should disable public network access
131+
### Configure computes to Modify/disable local authentication
113132

114-
Controls whether a workspace should disable network access from the public internet.
133+
Modifies any Azure Machine Learning compute cluster or instance creation request to disable local authentication (SSH).
115134

116-
To configure this policy, set the effect parameter to __audit__, __deny__, or __disabled__. If set to __audit__, you can create a workspace with public access and a warning event is created in the activity log.
135+
To configure this policy, set the effect parameter to __Modify__ or __Disabled__. If set __Modify__, any creation of a compute cluster or instance within the scope where the policy applies will automatically have local authentication disabled.
117136

118-
If the policy is set to __deny__, then you cannot create a workspace that allows network access from the public internet.
137+
### Configure workspaces to use private DNS zones
119138

120-
### Computes should have local authentication methods disabled.
139+
Configures a workspace to use a private DNS zone, overriding the default DNS resolution for a private endpoint.
121140

122-
Controls whether an Azure Machine Learning compute cluster or instance should disable local authentication (SSH).
141+
To configure this policy, set the effect parameter to __DeployIfNotExists__. Set the __privateDnsZoneId__ to the Azure Resource Manager ID of the private DNS zone to use.
123142

124-
To configure this policy, set the effect parameter to __audit__, __deny__, or __disabled__. If set to __audit__, you can create a compute with SSH enabled and a warning event is created in the activity log.
143+
### Configure workspaces to disable public network access
125144

126-
If the policy is set to __deny__, then you cannot create a compute unless SSH is disabled. Attempting to create a compute with SSH enabled results in an error. The error is also logged in the activity log. The policy identifier is returned as part of this error.
145+
TBD
127146

128-
### Configure computes to Modify/disable local authentication
147+
### Configure workspaces with private endpoints
129148

130-
Modifies any Azure Machine Learning compute cluster or instance creation request to disable local authentication (SSH).
149+
Configures a workspace to create a private endpoint within the specified subnet of an Azure Virtual Network.
131150

132-
To configure this policy, set the effect parameter to __Modify__ or __Disabled__. If set __Modify__, any creation of a compute cluster or instance within the scope where the policy applies will automatically have local authentication disabled.
151+
To configure this policy, set the effect parameter to __DeployIfNotExists__. Set the __privateEndpointSubnetID__ to the Azure Resource Manager ID of the subnet.
133152

134-
### Compute instances should have idle shutdown
153+
### Configure diagnostic workspaces to send logs to log analytics workspaces
135154

136155
TBD
137156

138-
### Compute instances should be recreated to get software updates
157+
### Resource logs in workspaces should be enabled
139158

140159
TBD
141160

142-
### Compute cluster and instance is behind virtual network
143-
144-
Controls auditing of compute cluster and instance resources behind a virtual network.
145-
146-
To configure this policy, set the effect parameter to __audit__ or __disabled__. If set to __audit__, you can create a compute that is not configured behind a virtual network and a warning event is created in the activity log.
147-
148161
## Next steps
149162

150163
* [Azure Policy documentation](../governance/policy/overview.md)

0 commit comments

Comments
 (0)