Azure Policy policy definitions for Azure Private 5G Core
This page lists the Azure Policy policy definitions for Azure Private 5G Core. For the full list of Azure Policy definitions across Azure services, see Azure Policy built-in definitions.
The name of each policy definition links to the policy definition in the Azure portal. Use the link in the Version column to view the source on the Azure Policy GitHub repo.
To assign a policy to your Azure Private 5G Core deployment, see Create and manage policies to enforce compliance.
Name (Azure portal) |
Description | Effect(s) | Version (GitHub) |
---|---|---|---|
Configure Packet Core Control Plane diagnostic access to use authentication type Microsoft EntraID | Authenticaton type must be Microsoft EntraID for packet core diagnostic access over local APIs | Modify, Disabled | 1.0.0 |
Packet Core Control Plane diagnostic access should only use Microsoft EntraID authentication type | Authenticaton type must be Microsoft EntraID for packet core diagnostic access over local APIs | Audit, Deny, Disabled | 1.0.0 |
SIM Group should use customer-managed keys to encrypt data at rest | Use customer-managed keys to manage the encryption at rest of SIM secrets in a SIM Group. Customer-managed keys are commonly required to meet regulatory compliance standards and they enable the data to be encrypted with an Azure Key Vault key created and owned by you. You have full control and responsibility for the key lifecycle, including rotation and management. | Audit, Deny, Disabled | 1.0.0 |
Next steps
Phản hồi
https://aka.ms/ContentUserFeedback.
Sắp ra mắt: Trong năm 2024, chúng tôi sẽ dần gỡ bỏ Sự cố với GitHub dưới dạng cơ chế phản hồi cho nội dung và thay thế bằng hệ thống phản hồi mới. Để biết thêm thông tin, hãy xem:Gửi và xem ý kiến phản hồi dành cho