Azure Policy built-in definitions for Azure Logic Apps
The name of each built-in policy definition links to the policy definition in the Azure portal. Use the link in the Version column to view the source on the Azure Policy GitHub repo.
Azure Logic Apps
|Deploy Diagnostic Settings for Logic Apps to Event Hub||Deploys the diagnostic settings for Logic Apps to stream to a regional Event Hub when any Logic Apps which is missing this diagnostic settings is created or updated.||DeployIfNotExists, Disabled||2.0.0|
|Deploy Diagnostic Settings for Logic Apps to Log Analytics workspace||Deploys the diagnostic settings for Logic Apps to stream to a regional Log Analytics workspace when any Logic Apps which is missing this diagnostic settings is created or updated.||DeployIfNotExists, Disabled||1.0.0|
|Logic Apps Integration Service Environment should be encrypted with customer-managed keys||Deploy into Integration Service Environment to manage encryption at rest of Logic Apps data using customer-managed keys. By default, customer data is encrypted with service-managed keys, but customer-managed keys are commonly required to meet regulatory compliance standards. Customer-managed keys enable the data to be encrypted with an Azure Key Vault key created and owned by you. You have full control and responsibility for the key lifecycle, including rotation and management.||Audit, Deny, Disabled||1.0.0|
|Logic Apps should be deployed into Integration Service Environment||Deploying Logic Apps into Integration Service Environment in a virtual network unlocks advanced Logic Apps networking and security features and provides you with greater control over your network configuration. Learn more at: https://aka.ms/integration-service-environment. Deploying into Integration Service Environment also allows encryption with customer-managed keys which provides enhanced data protection by allowing you to manage your encryption keys. This is often to meet compliance requirements.||Audit, Deny, Disabled||1.0.0|
|Resource logs in Logic Apps should be enabled||Audit enabling of resource logs. This enables you to recreate activity trails to use for investigation purposes; when a security incident occurs or when your network is compromised||AuditIfNotExists, Disabled||5.1.0|