App Service apps should have Client Certificates (Incoming client certificates) enabled |
Client certificates allow for the app to request a certificate for incoming requests. Only clients that have a valid certificate will be able to reach the app. This policy applies to apps with Http version set to 1.1. |
AuditIfNotExists, Disabled |
1.0.0 |
App Service apps should have remote debugging turned off |
Remote debugging requires inbound ports to be opened on an App Service app. Remote debugging should be turned off. |
AuditIfNotExists, Disabled |
2.0.0 |
App Service apps should not have CORS configured to allow every resource to access your apps |
Cross-Origin Resource Sharing (CORS) should not allow all domains to access your app. Allow only required domains to interact with your app. |
AuditIfNotExists, Disabled |
2.0.0 |
Azure Machine Learning compute instances should be recreated to get the latest software updates |
Ensure Azure Machine Learning compute instances run on the latest available operating system. Security is improved and vulnerabilities reduced by running with the latest security patches. For more information, visit https://aka.ms/azureml-ci-updates/. |
[parameters('effects')] |
1.0.3 |
Azure Policy Add-on for Kubernetes service (AKS) should be installed and enabled on your clusters |
Azure Policy Add-on for Kubernetes service (AKS) extends Gatekeeper v3, an admission controller webhook for Open Policy Agent (OPA), to apply at-scale enforcements and safeguards on your clusters in a centralized, consistent manner. |
Audit, Disabled |
1.0.2 |
Function apps should have Client Certificates (Incoming client certificates) enabled |
Client certificates allow for the app to request a certificate for incoming requests. Only clients that have a valid certificate will be able to reach the app. This policy applies to apps with Http version set to 1.1. |
AuditIfNotExists, Disabled |
1.0.0 |
Function apps should have remote debugging turned off |
Remote debugging requires inbound ports to be opened on Function apps. Remote debugging should be turned off. |
AuditIfNotExists, Disabled |
2.0.0 |
Function apps should not have CORS configured to allow every resource to access your apps |
Cross-Origin Resource Sharing (CORS) should not allow all domains to access your Function app. Allow only required domains to interact with your Function app. |
AuditIfNotExists, Disabled |
2.0.0 |
Kubernetes cluster containers CPU and memory resource limits should not exceed the specified limits |
Enforce container CPU and memory resource limits to prevent resource exhaustion attacks in a Kubernetes cluster. This policy is generally available for Kubernetes Service (AKS), and preview for Azure Arc enabled Kubernetes. For more information, see https://aka.ms/kubepolicydoc. |
audit, Audit, deny, Deny, disabled, Disabled |
10.2.0 |
Kubernetes cluster containers should not share host process ID or host IPC namespace |
Block pod containers from sharing the host process ID namespace and host IPC namespace in a Kubernetes cluster. This recommendation is part of CIS 5.2.2 and CIS 5.2.3 which are intended to improve the security of your Kubernetes environments. This policy is generally available for Kubernetes Service (AKS), and preview for Azure Arc enabled Kubernetes. For more information, see https://aka.ms/kubepolicydoc. |
audit, Audit, deny, Deny, disabled, Disabled |
6.1.0 |
Kubernetes cluster containers should only use allowed AppArmor profiles |
Containers should only use allowed AppArmor profiles in a Kubernetes cluster. This policy is generally available for Kubernetes Service (AKS), and preview for Azure Arc enabled Kubernetes. For more information, see https://aka.ms/kubepolicydoc. |
audit, Audit, deny, Deny, disabled, Disabled |
7.1.1 |
Kubernetes cluster containers should only use allowed capabilities |
Restrict the capabilities to reduce the attack surface of containers in a Kubernetes cluster. This recommendation is part of CIS 5.2.8 and CIS 5.2.9 which are intended to improve the security of your Kubernetes environments. This policy is generally available for Kubernetes Service (AKS), and preview for Azure Arc enabled Kubernetes. For more information, see https://aka.ms/kubepolicydoc. |
audit, Audit, deny, Deny, disabled, Disabled |
7.1.0 |
Kubernetes cluster containers should only use allowed images |
Use images from trusted registries to reduce the Kubernetes cluster's exposure risk to unknown vulnerabilities, security issues and malicious images. For more information, see https://aka.ms/kubepolicydoc. |
audit, Audit, deny, Deny, disabled, Disabled |
10.2.0 |
Kubernetes cluster containers should run with a read only root file system |
Run containers with a read only root file system to protect from changes at run-time with malicious binaries being added to PATH in a Kubernetes cluster. This policy is generally available for Kubernetes Service (AKS), and preview for Azure Arc enabled Kubernetes. For more information, see https://aka.ms/kubepolicydoc. |
audit, Audit, deny, Deny, disabled, Disabled |
7.1.0 |
Kubernetes cluster pod hostPath volumes should only use allowed host paths |
Limit pod HostPath volume mounts to the allowed host paths in a Kubernetes Cluster. This policy is generally available for Kubernetes Service (AKS), and Azure Arc enabled Kubernetes. For more information, see https://aka.ms/kubepolicydoc. |
audit, Audit, deny, Deny, disabled, Disabled |
7.1.1 |
Kubernetes cluster pods and containers should only run with approved user and group IDs |
Control the user, primary group, supplemental group and file system group IDs that pods and containers can use to run in a Kubernetes Cluster. This policy is generally available for Kubernetes Service (AKS), and preview for Azure Arc enabled Kubernetes. For more information, see https://aka.ms/kubepolicydoc. |
audit, Audit, deny, Deny, disabled, Disabled |
7.1.1 |
Kubernetes cluster pods should only use approved host network and port range |
Restrict pod access to the host network and the allowable host port range in a Kubernetes cluster. This recommendation is part of CIS 5.2.4 which is intended to improve the security of your Kubernetes environments. This policy is generally available for Kubernetes Service (AKS), and preview for Azure Arc enabled Kubernetes. For more information, see https://aka.ms/kubepolicydoc. |
audit, Audit, deny, Deny, disabled, Disabled |
7.1.0 |
Kubernetes cluster services should listen only on allowed ports |
Restrict services to listen only on allowed ports to secure access to the Kubernetes cluster. This policy is generally available for Kubernetes Service (AKS), and preview for Azure Arc enabled Kubernetes. For more information, see https://aka.ms/kubepolicydoc. |
audit, Audit, deny, Deny, disabled, Disabled |
9.1.0 |
Kubernetes cluster should not allow privileged containers |
Do not allow privileged containers creation in a Kubernetes cluster. This recommendation is part of CIS 5.2.1 which is intended to improve the security of your Kubernetes environments. This policy is generally available for Kubernetes Service (AKS), and preview for Azure Arc enabled Kubernetes. For more information, see https://aka.ms/kubepolicydoc. |
audit, Audit, deny, Deny, disabled, Disabled |
10.1.0 |
Kubernetes clusters should disable automounting API credentials |
Disable automounting API credentials to prevent a potentially compromised Pod resource to run API commands against Kubernetes clusters. For more information, see https://aka.ms/kubepolicydoc. |
audit, Audit, deny, Deny, disabled, Disabled |
5.1.0 |
Kubernetes clusters should not allow container privilege escalation |
Do not allow containers to run with privilege escalation to root in a Kubernetes cluster. This recommendation is part of CIS 5.2.5 which is intended to improve the security of your Kubernetes environments. This policy is generally available for Kubernetes Service (AKS), and preview for Azure Arc enabled Kubernetes. For more information, see https://aka.ms/kubepolicydoc. |
audit, Audit, deny, Deny, disabled, Disabled |
8.1.0 |
Kubernetes clusters should not grant CAP_SYS_ADMIN security capabilities |
To reduce the attack surface of your containers, restrict CAP_SYS_ADMIN Linux capabilities. For more information, see https://aka.ms/kubepolicydoc. |
audit, Audit, deny, Deny, disabled, Disabled |
6.1.0 |
Kubernetes clusters should not use the default namespace |
Prevent usage of the default namespace in Kubernetes clusters to protect against unauthorized access for ConfigMap, Pod, Secret, Service, and ServiceAccount resource types. For more information, see https://aka.ms/kubepolicydoc. |
audit, Audit, deny, Deny, disabled, Disabled |
5.1.0 |