Policy: Azure > CIS v5.0 > 6 - Management and Governance Services > 6.02 - Ensure that Resource Locks are set for Mission-Critical Azure Resources
Configures auditing against a CIS Benchmark item.
Level: 2
Ensure that resource locks are configured on mission-critical Azure resources to prevent accidental deletion or modification.
Resource locks provide an additional layer of protection against accidental deletion or modification of critical Azure resources. Even users with administrative privileges cannot delete or modify a resource that has a lock applied. Two types of locks are available: CanNotDelete (Delete lock) which allows read and modification but prevents deletion, and ReadOnly (Read-only lock) which allows only read operations.
Targets
This policy targets the following resource types:
Primary Policy
This policy is used with the following primary policy:
Related Policies
Controls
Setting this policy configures this control:
Policy Specification
Schema Type | |
|---|---|
Default | |
Valid Values [YAML] |
|
Category
In Your Workspace
Developers
- tmod:@turbot/cis#/control/categories/cis
- tmod:@turbot/azure-cisv5-0#/policy/types/r0602
- turbot graphql policy-type --id "tmod:@turbot/azure-cisv5-0#/policy/types/r0602"
- turbot graphql policy-settings --filter "policyTypeId:tmod:@turbot/azure-cisv5-0#/policy/types/r0602"
Get Policy TypeGet Policy Settings
Category URI
Policy Type URI
GraphQL
CLI