ssc-spc-ccoe-cei / azure-guardrails-solution-accelerator

This implementation automates reporting to verify compliance with GC Cloud Guardrails. SSC and TBS review the results. Cette mise en œuvre automatise la production de rapports afin de vérifier la conformité aux mesures de sécurité infonuagique du GC. SPC et SCT examinent les résultats.
Other
11 stars 4 forks source link

GR6: Add additional policy checks to existing control #101

Closed MathesonSho closed 5 months ago

MathesonSho commented 9 months ago

Is your feature request related to a problem? Please describe. PROTECTION OF DATA-AT-REST (M) needs more checks surrounding the Storage Accounts.

This module will detect the PBMM and look for specific policies not to be exempted. The compliance will fail right away if the PBMM policy is not applied. If applied, the following policies will be checked for exemptions:

Describe the solution you'd like Could the following policy checks be added to the above list?

Q: What would we need to do to look at the policy results and determine if there are any failing resources?

MathesonSho commented 5 months ago

PBMM Policies to check instead:

SC-28 https://learn.microsoft.com/en-us/azure/governance/policy/samples/canada-federal-pbmm#protection-of-information-at-rest

Additional checks to consider (IA-7,SC12, SC13, SC28, SC28(1)) if added to the Canada Federal PBMM initiative we could update to add the policy checks.

dutt0 commented 5 months ago

"Transparent Data Encryption on SQL databases should be enabled" is already in the required policy. Other two additional checks will be added replacing the deprecated.