Policy: Azure > CIS v5.0 > 8 - Security Services > 8.03 - Key Vault
This section covers security recommendations for Azure Key Vault.
Azure Key Vault helps safeguard cryptographic keys, secrets, and certificates used by cloud applications and services.
Primary Policy
This policy is used with the following primary policy:
Related Policies
- 8.03.01 - Ensure that the Expiration Date is set for all Keys in RBAC Key Vaults
- 8.03.02 - Ensure that the Expiration Date is set for all Keys in Non-RBAC Key Vaults
- 8.03.03 - Ensure that the Expiration Date is set for all Secrets in RBAC Key Vaults
- 8.03.04 - Ensure that the Expiration Date is set for all Secrets in Non-RBAC Key Vaults
- 8.03.05 - Ensure 'Purge protection' is set to 'Enabled'
- 8.03.06 - Ensure that Role Based Access Control for Azure Key Vault is enabled
- 8.03.07 - Ensure Public Network Access is Disabled
- 8.03.08 - Ensure Private Endpoints are used to access Azure Key Vault
- 8.03.09 - Ensure automatic key rotation is enabled within Azure Key Vault
- 8.03.10 - Ensure that Azure Key Vault Managed HSM is used when required
- 8.03.11 - Ensure certificate 'Validity Period (in months)' is less than or equal to '12'
Policy Specification
Schema Type | |
|---|---|
Default | |
Valid Values [YAML] |
|
Examples [YAML] |
|
Category
In Your Workspace
Developers
- tmod:@turbot/cis#/control/categories/cis
- tmod:@turbot/azure-cisv5-0#/policy/types/s0803
- turbot graphql policy-type --id "tmod:@turbot/azure-cisv5-0#/policy/types/s0803"
- turbot graphql policy-settings --filter "policyTypeId:tmod:@turbot/azure-cisv5-0#/policy/types/s0803"
Get Policy TypeGet Policy Settings
Category URI
Policy Type URI
GraphQL
CLI