-
Notifications
You must be signed in to change notification settings - Fork 1.1k
/
ADX_CMK.json
66 lines (66 loc) · 1.99 KB
/
ADX_CMK.json
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
{
"properties": {
"policyType": "BuiltIn",
"displayName": "Azure Data Explorer encryption at rest should use a customer-managed key",
"description": "Enabling encryption at rest using a customer-managed key on your Azure Data Explorer cluster provides additional control over the key being used by the encryption at rest. This feature is oftentimes applicable to customers with special compliance requirements and requires a Key Vault to managing the keys.",
"metadata": {
"version": "1.0.0",
"category": "Azure Data Explorer"
},
"version": "1.0.0",
"mode": "Indexed",
"parameters": {
"effect": {
"type": "string",
"defaultValue": "Audit",
"allowedValues": [
"Audit",
"Deny",
"Disabled"
],
"metadata": {
"displayName": "Effect",
"description": "Enable or disable the execution of the policy"
}
}
},
"policyRule": {
"if": {
"allOf": [
{
"field": "type",
"equals": "Microsoft.Kusto/Clusters"
},
{
"anyOf": [
{
"field": "Microsoft.Kusto/clusters/keyVaultProperties",
"exists": false
},
{
"field": "Microsoft.Kusto/clusters/keyVaultProperties.keyName",
"exists": false
},
{
"field": "Microsoft.Kusto/clusters/keyVaultProperties.keyVersion",
"exists": false
},
{
"field": "Microsoft.Kusto/clusters/keyVaultProperties.keyVaultUri",
"exists": false
}
]
}
]
},
"then": {
"effect": "[parameters('effect')]"
}
},
"versions": [
"1.0.0"
]
},
"id": "/providers/Microsoft.Authorization/policyDefinitions/81e74cea-30fd-40d5-802f-d72103c2aaaa",
"name": "81e74cea-30fd-40d5-802f-d72103c2aaaa"
}