infosatheesh2020 / AzurePolicy

Azure Policy collection

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

AzurePolicy

Azure Policy collection

01.App_Service_HttpsOnly_Remediate

Remediates the webapp by adding httpsOnly falg to true if not enabled already

  • "displayName": "deployIfNotExists - Web Application should only be accessible over HTTPS",
  • "description": "Use of HTTPS ensures server/service authentication and protects data in transit from network layer eavesdropping attacks.",

02.Windows_VM_Diagnostics_Remediate

Remediates the VM by adding diagnostics setting to the storage account if not already

  • "displayName": "deployIfNotExists - Enable Diagnostics setting for Windows VM",
  • "description": "Enabling the disgnostic setting for the Windows VM and send those logs to the storage account.",

03.App_Service_DiagnosticsSetting_Remediate

Remediates the App Service by enabling diagnostics settings and send to the specified existing Log Analytics Workspace

  • "displayName": "deployIfNotExists - Enable diagnostic settings for App Service",
  • "description": "Enable diagnostic settings for App Service and send to existing Log Analytics workspace",

04.VM_Boot_Diagnostics_Remediate

Remediates the Windows & Linux VM by enabling boot diagnostics settings and send to the specified storage account

  • "displayName": "deployIfNotExists - Enable Boot diagnostic settings for VM",
  • "description": "Enable diagnostic settings for Windows & Linux VM and send to existing storage account",

05.AppGateway_WAF_Diagnostics_Remediate

Remediates the AppGateway with WAF by enabling boot diagnostics settings and send AppGW & WAF logs along with metrics to Log Analytics workspace

  • "displayName": "deployIfNotExists - AppGW and WAF diagnostics",
  • "description": "Enable diagnostic settings for AppGW and send AppGW/WAF logs & Metrics to existing Log Analytics workspace",

06.NSG_FlowLogs_Enable_Remediate

Remediates the NSG by enabling NSG flow logs if not already enabled, and send the logs to the configured storage account. It looks for flowlogs within the networkWatcherRG resource group. It also checks that the name of the flowlog matches the format that the portal uses by default. This is because we need to pass the name of the flowlog for policy to be able to get the results. It also enables flow log analytics by sending logs to Log Analytics.

  • "displayName": "deployIfNotExists - NSG Flow Logs Enable",
  • "description": "Enable NSG Flow logs and sends the log data to Azure Storage account and Log Analytics configured during policy assignment",

About

Azure Policy collection

License:MIT License