Policy: Azure > CIS v4.0 > 06 - Identity Services > 06.24 - Ensure custom role is assigned permissions for administering resource locks > Attestation
By setting this policy, you attest that you have manually verified that it complies with the relevant section of the CIS Benchmark.
To verify a custom role exists for administering resource locks: 1. From Azure Home select the Portal Menu 2. Select Subscriptions 3. Select Access control (IAM) 4. Select Roles 5. Verify a custom role exists with permissions: - Microsoft.Authorization/locks/*
Once verified, enter the date that this attestation expires.
Targets
This policy targets the following resource types:
Primary Policy
This policy is used with the following primary policy:
Controls
Setting this policy configures this control:
Policy Specification
Schema Type | |
|---|
Category
In Your Workspace
Developers
- tmod:@turbot/cis#/control/categories/v071406
- tmod:@turbot/azure-cisv4-0#/policy/types/r0624Attestation
- turbot graphql policy-type --id "tmod:@turbot/azure-cisv4-0#/policy/types/r0624Attestation"
- turbot graphql policy-settings --filter "policyTypeId:tmod:@turbot/azure-cisv4-0#/policy/types/r0624Attestation"
Get Policy TypeGet Policy Settings
Category URI
Policy Type URI
GraphQL
CLI