Policy: Azure > Network > Network Security Group > Ingress Rules > Approved > Service Tags
A YAML list of service tags that are allowed for egress in custom security groups. If this list is empty, no service tags are permitted.
Applies to non-Guardrails managed Security Groups.
Examples: - VirtualNetwork - Storage
Targets
This policy targets the following resource types:
Primary Policy
This policy is used with the following primary policy:
Policy Specification
Schema Type |
|
---|---|
Default |
|
Category
In Your Workspace
Developers
- tmod:@turbot/turbot#/control/categories/resourceApproved
- tmod:@turbot/azure-network#/policy/types/networkSecurityGroupIngressRulesApprovedServiceTags
- turbot graphql policy-type --id "tmod:@turbot/azure-network#/policy/types/networkSecurityGroupIngressRulesApprovedServiceTags"
- turbot graphql policy-settings --filter "policyTypeId:tmod:@turbot/azure-network#/policy/types/networkSecurityGroupIngressRulesApprovedServiceTags"
Get Policy TypeGet Policy Settings
Category URI
Policy Type URI
GraphQL
CLI