Skip to content

Commit 649e3e2

Browse files
Update mx-azure-security-and-compliance.md
1 parent cdb9521 commit 649e3e2

File tree

1 file changed

+11
-12
lines changed

1 file changed

+11
-12
lines changed
Lines changed: 11 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -1,34 +1,33 @@
11
---
2-
title: "Security & Compliance for Mendix on Azure"
2+
title: "Security and Compliance for Mendix on Azure"
33
url: /developerportal/deploy/mendix-on-azure/security-and-compliance/
44
weight: 20
55
description: "Describes the security & compliance considerations for apps running on Mendix on Azure."
66
---
77

8-
## Security & Compliance
8+
## Security and Compliance
99

10-
### Compliance frameworks
10+
### Compliance Frameworks
1111

1212
Every release of Mendix on Azure is automatically assessed against selected compliance frameworks using Azure Policy. Currently this asssessment is limited to SOC2, but this will be extended in future versions based on customer demand.
1313

1414
#### SOC 2 Type 2 Compliance {#soc2}
1515

1616
The automatic SOC2 assessment currently has identified the following compliance deviations which are accepted:
1717

18-
| Policy | Acceptance Rationale |
19-
|----------------------------------------------------------------------------------------------|------------------------------------------------------------------|
18+
| Policy | Acceptance Rationale |
19+
| --- | --- |
2020
| Azure Container Registry: [Container registries should be encrypted with a customer-managed key](https://www.azadvertizer.net/azpolicyadvertizer/5b9159ae-1701-4a6f-9a7a-aa9c8ddd0580.html) | The standard Microsoft key is used instead to ease adoption of the product. |
2121
| AKS - cluster resource: [Azure Policy Add-on for Kubernetes service (AKS) should be installed and enabled on your clusters](https://www.azadvertizer.net/azpolicyadvertizer/0a15ec92-a229-4763-bb14-0ea34a568f8d.html) | The cluster is deployed and managed by Mendix, so this policy is not needed. |
22-
| AKS - cluster resource: [Azure Kubernetes Service clusters should have Defender profile enabled](https://www.azadvertizer.net/azpolicyadvertizer/a1840de2-8088-4ea8-b153-b4c723e9cb01.html) | This is not automated for cost-saving reasons. |
22+
| AKS - cluster resource: [Azure Kubernetes Service clusters should have Defender profile enabled](https://www.azadvertizer.net/azpolicyadvertizer/a1840de2-8088-4ea8-b153-b4c723e9cb01.html) | This is not automated for cost-saving reasons. |
2323
| AKS - cluster VNET: [All Internet traffic should be routed via your deployed Azure Firewall](https://www.azadvertizer.net/azpolicyadvertizer/fc5e4038-4584-4632-8c85-c0448d374b2c.html) | This is not automated, but customers can deploy their own Firewall if required. |
2424
| Storage Account: [Storage accounts should use customer-managed key for encryption](https://www.azadvertizer.net/azpolicyadvertizer/6fac406b-40ca-413b-bf8e-0bf964659c25.html) | The cluster is deployed and managed by Mendix, so this is not needed. |
2525

2626

27-
### Access to customer environments by Mendix
27+
### Access to Customer Environments by Mendix
2828

29-
Mendix accesses customer environments securely by leveraging native Azure capabilities and adhering to Microsoft’s best practices:
30-
31-
- Access is provided through [cross-tenant access](https://learn.microsoft.com/en-us/entra/external-id/cross-tenant-access-overview), a secure Azure-native mechanism.
32-
- The majority of access operations are automated and performed programmatically at scale using infrastructure as code, limiting manual human intervention to exceptional cases.
33-
- All network connectivity between Mendix and customer environments utilizes private links, ensuring communication is not exposed to the public internet.
29+
Mendix accesses customer environments securely by leveraging native Azure capabilities and adhering to Microsoft's best practices:
3430

31+
* Access is provided through [cross-tenant access](https://learn.microsoft.com/en-us/entra/external-id/cross-tenant-access-overview), a secure Azure-native mechanism.
32+
* The majority of access operations are automated and performed programmatically at scale using infrastructure as code, limiting manual human intervention to exceptional cases.
33+
* All network connectivity between Mendix and customer environments utilizes private links, ensuring communication is not exposed to the public internet.

0 commit comments

Comments
 (0)