azure policy 漏洞列表
共找到 3 个与 azure policy 相关的漏洞
📅 加载漏洞趋势中...
-
azure-policy-assignment-create-alert-missing: Azure Policy Assignment Create Alert Not Configured POC
Ensure that an Azure activity log alert is used to detect "Create Policy Assignment" events within your Microsoft Azure cloud account. Activity log alerts get activated when a new activity log event that matches the condition specified in the alert occurs. In this case, the condition used is 'Whenever the Policy Activity Log "Create policy assignment (policyAssignments)" has "any" level, with "any" status and event is initiated by "any"'. -
azure-policy-assignment-delete-unalerted: Azure Policy Assignment Delete Alert Not Configured POC
Ensure that an Azure activity log alert is used to detect "Delete Policy Assignment" events within your Microsoft Azure cloud account. Activity log alerts get activated when a new activity log event that matches the condition specified in the alert occurs. In this case, the condition used is 'Whenever the Policy Activity Log "Delete policy assignment (policyAssignments)" has "any" level, with "any" status and event is initiated by "any"'. -
azure-policy-not-allowed-types-unassigned: Azure Policy - Not Allowed Resource Types Policy Assignment Not in Use POC
Ensure that a "Not Allowed Resource Types" policy is assigned to your Azure subscriptions in order to deny deploying restricted resources within your Azure cloud account for security and compliance purposes. Microsoft Azure Policy service allows you to enforce organizational standards and assess cloud compliance at-scale. The "Not Allowed Resource Types" policy assignment must use the built-in policy definition which enables you to specify the cloud resource types that your organization cannot deploy.