This implementation automates reporting to verify compliance with GC Cloud Guardrails. SSC and TBS review the results. Cette mise en œuvre automatise la production de rapports afin de vérifier la conformité aux mesures de sécurité infonuagique du GC. SPC et SCT examinent les résultats.
Other
11
stars
5
forks
source link
[New Control] GR9 | Validation 3 | Tools In Use For Limiting Access To Authorized Source IP Addresses (M) #265
This Pull Request introduces a new control to check for tools that limit access to authorized source IP addresses, focusing on firewalls and application gateways.
This PR fixes/adds/changes/removes
closes #218
Added a check for the existence of a firewall (Fortigate or Azure Native Firewall) or application gateway per subscription.
Ensured compliance validation based on the presence of a Web Application Firewall (WAF) configuration on the application gateway.
Enhanced reporting to include detailed comments on firewall type or application gateway status per subscription.
Breaking Changes
None anticipated.
Testing Evidence
Please provide any testing evidence to show that this Pull Request works/fixes as described (include screenshots, if appropriate).
Overview/Summary
This Pull Request introduces a new control to check for tools that limit access to authorized source IP addresses, focusing on firewalls and application gateways.
This PR fixes/adds/changes/removes
closes #218
Breaking Changes
None anticipated.
Testing Evidence
Please provide any testing evidence to show that this Pull Request works/fixes as described (include screenshots, if appropriate).
As part of this Pull Request I have
main
branch./tools/Update-ModuleVersions.ps1
script).Compliance Status Example (for documentation)
Comments for Compliance Check: