Control: Azure > CIS v2.0 > 08 - Key Vault
Covers security recommendations to follow for the configuration and use of Azure Key Vault.
Primary Policies
The following policies can be used to configure this control:
- 08 - Key Vault > 8.01 - Ensure that the Expiration Date is set for all Keys in RBAC Key Vaults
- 08 - Key Vault > 8.02 - Ensure that the Expiration Date is set for all Keys in Non-RBAC Key Vaults
- 08 - Key Vault > 8.03 - Ensure that the Expiration Date is set for all Secrets in RBAC Key Vaults
- 08 - Key Vault > 8.04 - Ensure that the Expiration Date is set for all Secrets in Non-RBAC Key Vaults
- 08 - Key Vault > 8.05 - Ensure the key vault is recoverable
- 08 - Key Vault > 8.06 - Ensure Role Based Access Control for Azure Key Vault
- 08 - Key Vault > 8.07 - Ensure that Private Endpoints are Used for Azure Key Vault
- 08 - Key Vault > 8.08 - Ensure Automatic Key Rotation is Enabled Within Azure Key Vault for the Supported Services
- 08 - Key Vault > 8.08 - Ensure Automatic Key Rotation is Enabled Within Azure Key Vault for the Supported Services > Attestation
- 08 - Key Vault
- 08 - Key Vault > Maximum Attestation Duration
Category
In Your Workspace
Developers
- tmod:@turbot/azure-cisv2-0#/control/types/s08
- tmod:@turbot/cis#/control/categories/cis
- turbot graphql controls --filter "controlTypeId:tmod:@turbot/azure-cisv2-0#/control/types/s08"
Get Controls
Control Type URI
Category URI
GraphQL
CLI