Skip to content

hashicorp/policy-library-azure-networking-terraform

Azure Networking Sentinel Policies for Terraform

This library, provides prescriptive Terraform policies that can be used to establish secure Terraform configuration for Microsoft Azure. The policies that are contained in this library are based on the CIS Microsoft Azure Foundations Security Benchmark. Terraform Cloud/Enterprise users can use the policies in this library to establish a foundational level of security for the services that they are adopting in Microsoft Azure.

NOTE:

This Policy Library is not an exhaustive list of all of possible security configurations and architecture that is available in Microsoft Azure. If you have questions, comments, or have identified ways for us to improve this library, please create a new GitHub issue.

Alternatively, We welcome any contributions that improve the quality of this library! To learn more about contributing and suggesting changes to this library, refer to the contributing guide.


Policies included

  • Ensure that RDP access is restricted from the internet (docs | code)
  • Ensure that Network Security Group Flow Log retention period is 'greater than 90 days' (docs | code)
  • Ensure that SSH access is restricted from the internet (docs | code)
  • Ensure no SQL Databases allow ingress 0.0.0.0/0 (ANY IP) (docs | code)

About

Prescriptive Sentinel policies that can be used to establish secure Terraform configuration for Microsoft Azure networking infrastructure.

Resources

License

Code of conduct

Security policy

Stars

Watchers

Forks

Packages

No packages published