Policy: Azure > CIS v2.0 > 08 - Key Vault
Covers security recommendations to follow for the configuration and use of Azure Key Vault.
Resource Types
This policy targets the following resource types:
Primary Policy
This policy is used with the following primary policy:
Related Policies
- 8.01 - Ensure that the Expiration Date is set for all Keys in RBAC Key Vaults
- 8.02 - Ensure that the Expiration Date is set for all Keys in Non-RBAC Key Vaults
- 8.03 - Ensure that the Expiration Date is set for all Secrets in RBAC Key Vaults
- 8.04 - Ensure that the Expiration Date is set for all Secrets in Non-RBAC Key Vaults
- 8.05 - Ensure the key vault is recoverable
- 8.06 - Ensure Role Based Access Control for Azure Key Vault
- 8.07 - Ensure that Private Endpoints are Used for Azure Key Vault
- 8.08 - Ensure Automatic Key Rotation is Enabled Within Azure Key Vault for the Supported Services
- Maximum Attestation Duration
Controls
Policy Specification
Schema Type |
|
---|---|
Default |
|
Valid Values [YAML] |
|
Examples [YAML] |
|
Category
In Your Workspace
Developers
- tmod:@turbot/cis#/control/categories/cis
- tmod:@turbot/azure-cisv2-0#/policy/types/s08
- turbot graphql policy-type --id "tmod:@turbot/azure-cisv2-0#/policy/types/s08"
- turbot graphql policy-settings --filter "policyTypeId:tmod:@turbot/azure-cisv2-0#/policy/types/s08"
Get Policy TypeGet Policy Settings
Category URI
Policy Type URI
GraphQL
CLI