Policy: Azure > CIS v1.2 > 8 - Other Security Considerations > 8.03 - Ensure that Resource Locks are set for mission critical Azure resources (Not Scored) > Attestation
By setting this policy, you attest that you have manually verified that it complies with the relevant section of the CIS Benchmark.
Azure Console
- Navigate to the specific Azure Resource or Resource Group
- Click on Locks
- Ensure the lock is defined with name and description, type as CanNotDelete or ReadOnly as appropriate.
Azure Command Line Interface 2.0 Review the list of all locks set currently: az lock list --resource-group --resource-name --namespace --resource-type --parent ""
Once verified, enter the date that this attestation expires. Note that the date can not be further in the future than is specified in Azure > CIS v1.2 > Maximum Attestation Duration. Set to a blank value to clear the attestation.
Resource Types
This policy targets the following resource types:
Primary Policy
This policy is used with the following primary policy:
Controls
- Azure > CIS v1.2
- Azure > CIS v1.2 > 8 - Other Security Considerations > 8.03 - Ensure that Resource Locks are set for mission critical Azure resources (Not Scored)
- Azure > CIS v1.2 > 8 - Other Security Considerations
Policy Specification
Schema Type |
|
---|
Category
In Your Workspace
Developers
- tmod:@turbot/cis#/control/categories/v0714
- tmod:@turbot/azure-cisv1-2#/policy/types/r0803Attestation
- turbot graphql policy-type --id "tmod:@turbot/azure-cisv1-2#/policy/types/r0803Attestation"
- turbot graphql policy-settings --filter "policyTypeId:tmod:@turbot/azure-cisv1-2#/policy/types/r0803Attestation"
Get Policy TypeGet Policy Settings
Category URI
Policy Type URI
GraphQL
CLI