Community-Policy
azure-policy
Our great sponsors
Community-Policy | azure-policy | |
---|---|---|
5 | 9 | |
559 | 1,430 | |
1.8% | 2.0% | |
8.6 | 8.1 | |
7 days ago | 6 days ago | |
Open Policy Agent | Open Policy Agent | |
MIT License | MIT License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
Community-Policy
- Initiative - Audit usage of custom RBAC roles? Policy in place but unsure how to remediate
-
Deploy NSG Subnet - Deployifnotexist
There might be something here that is close to what you need https://github.com/Azure/Community-Policy/tree/master/Policies
- Public assets
- Resource Group tag policy
- TF Destroy Anything Not In State File
azure-policy
- VMSS Azure Policy Compliance
-
Automation as key to cloud adoption success
Reference: https://github.com/Azure/azure-policy
-
Favorite cloud provider governance tips and tricks?
I just came across this post over in the Azure subreddit and it gave me a good idea on one way to deal with rogue Azure subscriptions - just have them default into a Management Group where a policy is in-place that basically denies use of any and all services.
-
How can we stop random users in our on-prem AD from creating new Azure subscriptions?
Oooo, that's a nice trick for the use of the root management group which usually has best practice to leave empty. I like that a lot! Could maybe pair that with the "deny all resource types" policy sample, and then even if someone does create a new subscription it's pretty much 100% neutered until someone pulls it out of the root management group and places it somewhere else.
-
Architecture on Decommission huge list of old Azure servers
Found a 2018 Github article - https://github.com/Azure/azure-policy/issues/102
-
Public assets
MS Repo https://github.com/Azure/azure-policy/tree/master/built-in-policies/policyDefinitions
-
How can I resolve this Security center recommendation: "Replace a process level token"
I can see here that is expecting azure-policy/AzureWindowsBaseline.mof at master · Azure/azure-policy · GitHub: "LOCAL SERVICE, NETWORK SERVICE". However, that would exclude the web app pools.
-
Iron Dome = 'Security Policies' at scale for your Multi-Cloud accounts
Azure shared with us a GitHub repository contains built-in samples of Azure Policies that can be used as reference for creating and assigning policies to your subscriptions and resource groups.
-
Compliance with policy or blueprints?
The only real way you'll be able to do this is via an Azure Policy, alongside a deny effect - where your policy would restrict based on the type field, with the values passed in via an array parameter (example)
What are some alternatives?
OPA (Open Policy Agent) - Open Policy Agent (OPA) is an open source, general-purpose policy engine.
balanced-employee-ip-agreement - GitHub's employee intellectual property agreement, open sourced and reusable
shellharden - The corrective bash syntax highlighter
opal - Fork of https://github.com/permitio/opal
Certified-Kubernetes-Security-Specialist - Curated resources help you prepare for the CNCF/Linux Foundation CKS 2021 "Kubernetes Certified Security Specialist" Certification exam. Please provide feedback or requests by raising issues, or making a pull request. All feedback for improvements are welcome. thank you.
AKS - Azure Kubernetes Service
gatekeeper-library - 📚 The OPA Gatekeeper policy library
aws-cdk-examples - Example projects using the AWS CDK
cloud-build-samples - Code snippets used in Cloud Build documentation
azure-quickstart-templates - Azure Quickstart Templates
azure-pipelines-yaml - Azure Pipelines YAML examples, templates, and community interaction