Tutorial: Implement Azure Policy as Code with GitHub
An Azure Policy as Code workflow makes it possible to manage your policy definitions and assignments as code, control the lifecycle of updating those definitions, and automate the validating of compliance results. In this tutorial, you learn to use Azure Policy features with GitHub to build a lifecycle process. These tasks include:
- Export policy definitions and assignments to GitHub
- Push policy objects updated in GitHub to Azure
- Trigger a compliance scan from the GitHub Actions
If you would like to assign a policy to identify the current compliance state of your existing resources, the quickstart articles explain how to do so.
Prerequisites
- If you don't have an Azure subscription, create a free account before you begin.
- Review Design an Azure Policy as Code workflow to have an understanding of the design patterns used in this tutorial.
- Your account must be assigned the Owner role at the management group or subscription scope. For more information on Azure RBAC permissions in Azure Policy, see Overview of Azure Policy.
Export Azure Policy objects from the Azure portal
Note
Owner permissions are required at the scope of the policy objects being exported to GitHub.
To export a policy definition from Azure portal, follow these steps:
Launch the Azure Policy service in the Azure portal by clicking All services, then searching for and selecting Policy.
Select Definitions on the left side of the Azure Policy page.
Use the Export definitions button or select the ellipsis on the row of a policy definition and then select Export definition.
Select the Sign in with GitHub button. If you haven't yet authenticated with GitHub to authorize Azure Policy to export the resource, review the access the GitHub Actions needs in the new window that opens and select Authorize AzureGitHubActions to continue with the export process. Once complete, the new window self-closes.
On the Basics tab, set the following options, then select the Policies tab or Next : Policies button at the bottom of the page.
- Repository filter: Set to My repositories to see only repositories you own or All repositories to see all you granted the GitHub Actions access to.
- Repository: Set to the repository that you want to export the Azure Policy resources to.
- Branch: Set the branch in the repository. Using a branch other than the default is a good way to validate your updates before merging further into your source code.
- Directory: The root level folder to export the Azure Policy resources to. Subfolders under this directory are created based on what resources are exported.
On the Policies tab, set the scope to search by selecting the ellipsis and picking a combination of management groups, subscriptions, or resource groups.
Use the Add policy definition(s) button to search the scope for which objects to export. In the side window that opens, select each object to export. Filter the selection by the search box or the type. Once you've selected all objects to export, use the Add button at the bottom of the page.
For each selected object, select the desired export options such as Only Definition or Definition and Assignment(s) for a policy definition. Then select the Review + Export tab or Next : Review + Export button at the bottom of the page.
Note
If option Definition and Assignment(s) is chosen, only policy assignments within the scope set by the filter when the policy definition is added are exported.
On the Review + Export tab, check the details match and then use the Export button at the bottom of the page.
Check your GitHub repo, branch, and root level folder to see that the selected resources are now exported to your source control.
The Azure Policy resources are exported into the following structure within the selected GitHub repository and root level folder:
|
|- <root level folder>/ ________________ # Root level folder set by Directory property
| |- policies/ ________________________ # Subfolder for policy objects
| |- <displayName>_<name>____________ # Subfolder based on policy displayName and name properties
| |- policy.json _________________ # Policy definition
| |- assign.<displayName>_<name>__ # Each assignment (if selected) based on displayName and name properties
|
Push policy objects updated in GitHub to Azure
When policy objects are exported, a GitHub workflow file named
.github/workflows/manage-azure-policy-<randomLetters>.yml
is also created to get you started.Note
The GitHub workflow file is created each time export is used. Each instance of the file is specific to the options during that export action.
This workflow file uses the Manage Azure Policy action to push changes made to the exported policy objects in the GitHub repository back to Azure Policy. By default, the action considers and syncs only those files that are different from the ones existing in Azure. You can also use the
assignments
parameter in the action to only sync changes done to specific assignment files. This parameter can be used to apply policy assignments only for a specific environment. For more information, see the Manage Azure Policy repository readme.By default, the workflow must be triggered manually. To do so, use the Actions in GitHub, select the
manage-azure-policy-<randomLetters>
workflow, select Run workflow, and then Run workflow again.Note
The workflow file must be in the default branch to be detected and manually run.
The workflow syncs the changes done to policy objects with Azure and gives you the status in the logs.
The workflow also adds details in Azure Policy objects
properties.metadata
for you to track.
Trigger compliance scans using GitHub Actions
Using the Azure Policy Compliance Scan action you can trigger an on-demand compliance evaluation scan from your GitHub workflow on one or multiple resources, resource groups, or subscriptions, and alter the workflow path based on the compliance state of those resources. You can also configure the workflow to run at a scheduled time to get the latest compliance status at a convenient time. Optionally, this GitHub Actions can also generate a report on the compliance state of scanned resources for further analysis or for archiving.
The following example runs a compliance scan for a subscription.
on:
schedule:
- cron: '0 8 * * *' # runs every morning 8am
jobs:
assess-policy-compliance:
runs-on: ubuntu-latest
steps:
- name: Login to Azure
uses: azure/login@v1
with:
creds: ${{secrets.AZURE_CREDENTIALS}}
- name: Check for resource compliance
uses: azure/policy-compliance-scan@v0
with:
scopes: |
/subscriptions/xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx
Review
In this tutorial, you successfully accomplished the following tasks:
- Exported policy definitions and assignments to GitHub
- Pushed policy objects updated in GitHub to Azure
- Triggered a compliance scan from the GitHub Actions
Next steps
To learn more about the structures of policy definitions, look at this article:
Feedback
Submit and view feedback for