This Policy Template will scan all resources in an Azure Resource Manager Subscription, and will raise an incident if any resources are not properly tagged with their corresponding Resource Group name. When an incident is raised, the Policy escalation will execute Cloud Workflow to tag the resources with the correct Resource Group name.
This policy has the following input parameters required when launching the policy.
- Tag Key - the tag key to scan on resources and to utilize when applying new/updated tags on resources
- Email addresses of the recipients you wish to notify - A list of email addresses to notify
- Azure Endpoint - Azure Endpoint to access resources
- Subscription Allowed List - Allowed Subscriptions, if empty, all subscriptions will be checked
- Automatic Actions - When this value is set, this policy will automatically take the selected action(s).
Please note that the "Automatic Actions" parameter contains a list of action(s) that can be performed on the resources. When it is selected, the policy will automatically execute the corresponding action on the data that failed the checks, post incident generation. Please leave it blank for manual action. For example if a user selects the "Tag Resources" action while applying the policy, all the resources will get tagged with their corresponding resource group name.
The following policy actions are taken on any resources found to be out of compliance.
- An email is sent to the Email lists provided of the resources out of compliance
- Tag resources with the name of their Resource Group
This policy uses credentials for connecting to the cloud -- in order to apply this policy you must have a credential registered in the system that is compatible with this policy. If there are no credentials listed when you apply the policy, please contact your cloud admin and ask them to register a credential that is compatible with this policy. The information below should be consulted when creating the credential.
For administrators creating and managing credentials to use with this policy, the following information is needed:
Provider tag value to match this policy: azure_rm
Required permissions in the provider:
- Microsoft.Resources/subscriptions/resources/read
- Microsoft.Resources/subscriptions/providers/read
- Azure Resource Manager
Note: Azure Classic (Azure Service Manager / ASM) resources are not supported by this Policy.
This Policy Template does not launch any instances, and so does not incur any cloud costs.