Skip to content

Commit 90f52a7

Browse files
Fix titles for Azure Policy packs (#821)
1 parent 76d4dbd commit 90f52a7

File tree

35 files changed

+36
-36
lines changed

35 files changed

+36
-36
lines changed

policy_packs/azure/aks/enforce_enable_rbac_for_managed_clusters/README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ primary_category: "security"
44
type: "featured"
55
---
66

7-
# Enforce Enable RBAC for Azure AKS Managed Clusters
7+
# Enforce RBAC for Azure AKS Managed Clusters
88

99
Enforcing Role-Based Access Control (RBAC) for Azure AKS managed clusters is crucial as it ensures that only authorized users and applications can perform actions within clusters. This granular control enhances security by preventing unauthorized access and modifications, thereby protecting the integrity and availability of the applications and services running in the Kubernetes environment.
1010

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
resource "turbot_policy_pack" "main" {
2-
title = "Enforce Enable RBAC for Azure AKS Managed Clusters"
2+
title = "Enforce RBAC for Azure AKS Managed Clusters"
33
description = "Ensure that only authorized users and applications can perform actions within clusters."
44
akas = ["azure_aks_enforce_enable_rbac_for_managed_clusters"]
55
}

policy_packs/azure/appservice/enforce_webapps_to_use_managed_service_identity/README.md renamed to policy_packs/azure/appservice/enforce_managed_service_identity_for_web_apps/README.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ categories: ["security"]
33
primary_category: "security"
44
---
55

6-
# Enforce Azure App Service Web Apps to Use Managed Service Identity
6+
# Enforce Managed Service Identity for Azure App Service Web Apps
77

88
Enforcing Azure App Service Web Apps to use Managed Service Identity (MSI) is essential for enhancing security and simplifying access management. This measure allows web apps to securely access Azure resources without the need for hard-coded credentials, reducing the risk of credential exposure and ensuring compliance with security best practices and regulatory requirements.
99

@@ -13,7 +13,7 @@ This [policy pack](https://turbot.com/guardrails/docs/concepts/policy-packs) can
1313

1414
## Documentation
1515

16-
- **[Review policy settings →](https://hub.guardrails.turbot.com/policy-packs/azure_appservice_enforce_webapps_to_use_managed_service_identity/settings)**
16+
- **[Review policy settings →](https://hub.guardrails.turbot.com/policy-packs/azure_appservice_enforce_managed_service_identity_for_web_apps/settings)**
1717

1818
## Getting Started
1919

Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
resource "turbot_policy_pack" "main" {
2-
title = "Enforce Azure App Service Web Apps to Use Managed Service Identity"
2+
title = "Enforce Managed Service Identity for Azure App Service Web Apps"
33
description = "Ensure web apps securely access Azure resources without the need for hard-coded credentials, reducing the risk of credential exposure and ensuring compliance."
4-
akas = ["azure_appservice_enforce_webapps_to_use_managed_service_identity"]
4+
akas = ["azure_appservice_enforce_managed_service_identity_for_web_apps"]
55
}

policy_packs/azure/appservice/enforce_webapps_to_not_use_outdated_java_php_python/README.md renamed to policy_packs/azure/appservice/enforce_webapps_to_use_supported_java_php_python_versions/README.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ categories: ["security"]
33
primary_category: "security"
44
---
55

6-
# Enforce Azure App Service Web Apps to Not Use Outdated Java/PHP/Python Versions
6+
# Enforce Azure App Service Web Apps to Use Supported Java, PHP, and Python Versions
77

88
Enforcing Azure App Service Web Apps to not use outdated Java, PHP, or Python versions is crucial to maintain security and performance. This ensures that applications run on supported, secure versions of these languages, reducing the risk of vulnerabilities, enhancing stability, and ensuring compliance with best practices and regulatory requirements.
99

@@ -13,7 +13,7 @@ This [policy pack](https://turbot.com/guardrails/docs/concepts/policy-packs) can
1313

1414
## Documentation
1515

16-
- **[Review policy settings →](https://hub.guardrails.turbot.com/policy-packs/azure_appservice_enforce_webapps_to_not_use_outdated_java_php_python/settings)**
16+
- **[Review policy settings →](https://hub.guardrails.turbot.com/policy-packs/azure_appservice_enforce_webapps_to_use_supported_java_php_python_versions/settings)**
1717

1818
## Getting Started
1919

Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
resource "turbot_policy_pack" "main" {
2-
title = "Enforce Azure App Service Web Apps to Not Use Outdated Java/PHP/Python Versions"
2+
title = "Enforce Azure App Service Web Apps to Use Supported Java, PHP, and Python Versions"
33
description = "Ensure that applications run on supported, secure versions of these languages, reducing the risk of vulnerabilities, enhancing stability, and ensuring compliance."
4-
akas = ["azure_appservice_enforce_webapps_to_not_use_outdated_java_php_python"]
4+
akas = ["azure_appservice_enforce_webapps_to_use_supported_java_php_python_versions"]
55
}

policy_packs/azure/compute/enforce_disks_to_be_attached_to_vms/README.md renamed to policy_packs/azure/compute/enforce_disks_are_attached_to_vms/README.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ categories: ["cost controls", "compute", "security", "storage"]
33
primary_category: "cost controls"
44
---
55

6-
# Enforce Azure Compute Disks to Be Attached to Virtual Machines
6+
# Enforce Azure Compute Disks Are Attached to Virtual Machines
77

88
Enforcing Azure Compute disks to be attached to virtual machines is important for optimizing resource utilization and cost management. This control ensures that all allocated storage is actively used and monitored, reducing the risk of unnecessary expenses and potential security vulnerabilities associated with unattached disks.
99

@@ -13,7 +13,7 @@ This [policy pack](https://turbot.com/guardrails/docs/concepts/policy-packs) can
1313

1414
## Documentation
1515

16-
- **[Review Policy settings →](https://hub.guardrails.turbot.com/policy-packs/enforce_disks_to_be_attached_to_vms/settings)**
16+
- **[Review Policy settings →](https://hub.guardrails.turbot.com/policy-packs/azure_compute_enforce_disks_are_attached_to_vms/settings)**
1717

1818
## Getting Started
1919

Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
resource "turbot_policy_pack" "main" {
2-
title = "Enforce Azure Compute Disks to Be Attached to Virtual Machines"
2+
title = "Enforce Azure Compute Disks Are Attached to Virtual Machines"
33
description = "Ensure that all allocated storage is actively used and monitored, reducing the risk of unnecessary expenses and potential security vulnerabilities associated with unattached disks."
4-
akas = ["azure_compute_enforce_disks_to_be_attached_to_vms"]
4+
akas = ["azure_compute_enforce_disks_are_attached_to_vms"]
55
}
Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
resource "turbot_policy_pack" "main" {
2-
title = "Enforce Encryption at Rest is Enabled for Azure Compute Disks"
2+
title = "Enforce Encryption at Rest Is Enabled for Azure Compute Disks"
33
description = "Ensures that data remains confidential and secure, even if the physical storage media is compromised."
44
akas = ["azure_compute_enforce_encryption_at_rest_is_enabled_for_disks"]
55
}

policy_packs/azure/compute/enforce_approved_images_from_trusted_publishers_for_vms/README.md renamed to policy_packs/azure/compute/enforce_vms_use_approved_amis_from_trusted_publishers/README.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ primary_category: "security"
44
type: "featured"
55
---
66

7-
# Enforce Azure Compute Virtual Machines to Use Approved AMIs from Trusted Publishers
7+
# Enforce Azure Compute Virtual Machines Use Approved AMIs From Trusted Publishers
88

99
Enforcing Azure compute instances to use approved AMIs from trusted publishers is vital for maintaining a secure and standardized environment. This practice ensures that only trusted, validated images are used, reducing the risk of security vulnerabilities and ensuring compliance with organizational policies and security standards.
1010

@@ -15,7 +15,7 @@ This [policy pack](https://turbot.com/guardrails/docs/concepts/policy-packs) can
1515

1616
## Documentation
1717

18-
- **[Review policy settings →](https://hub.guardrails.turbot.com/policy-packs/azure_compute_enforce_approved_images_from_trusted_publishers_for_vms/settings)**
18+
- **[Review policy settings →](https://hub.guardrails.turbot.com/policy-packs/azure_compute_enforce_vms_use_approved_amis_from_trusted_publishers/settings)**
1919

2020
## Getting Started
2121

Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
resource "turbot_policy_pack" "main" {
2-
title = "Enforce Azure Compute Virtual Machines to Use Approved AMIs From Trusted Publishers"
2+
title = "Enforce Azure Compute Virtual Machines Use Approved AMIs From Trusted Publishers"
33
description = "Ensure that only trusted, validated images are used, reducing the risk of security vulnerabilities and ensuring compliance with organizational policies and security standards."
4-
akas = ["azure_compute_enforce_approved_images_from_trusted_publishers_for_vms"]
4+
akas = ["azure_compute_enforce_vms_use_approved_amis_from_trusted_publishers"]
55
}
Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ categories: ["networking", "security"]
33
primary_category: "security"
44
---
55

6-
# Enforce Azure Cosmos DB Database Accounts to be Accessible to Selected Networks
6+
# Enforce Azure Cosmos DB Database Accounts Are Accessible to Selected Networks
77

88
Enforcing Azure Cosmos DB database accounts to be accessible only to selected networks is crucial for enhancing security and controlling access to your data. This measure ensures that only trusted and authorized networks can access the database, reducing the risk of unauthorized access, data breaches, and ensuring compliance with security best practices and regulatory requirements.
99

@@ -14,7 +14,7 @@ This [policy pack](https://turbot.com/guardrails/docs/concepts/policy-packs) can
1414

1515
## Documentation
1616

17-
- **[Review policy settings →](https://hub.guardrails.turbot.com/policy-packs/azure_cosmosdb_enforce_database_accounts_to_be_accessible_to_selected_networks/settings)**
17+
- **[Review policy settings →](https://hub.guardrails.turbot.com/policy-packs/azure_cosmosdb_enforce_database_accounts_are_accessible_to_selected_networks/settings)**
1818

1919
## Getting Started
2020

Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
resource "turbot_policy_pack" "main" {
2-
title = "Enforce Azure Cosmos DB Database Accounts to be Accessible to Selected Networks"
2+
title = "Enforce Azure Cosmos DB Database Accounts Are Accessible to Selected Networks"
33
description = "Ensure that only trusted and authorized networks can access the database, reducing the risk of unauthorized access, data breaches, and ensuring compliance."
4-
akas = ["azure_cosmosdb_enforce_database_accounts_to_be_accessible_to_selected_networks"]
4+
akas = ["azure_cosmosdb_enforce_database_accounts_are_accessible_to_selected_networks"]
55
}

policy_packs/azure/guardrails/enable_event_poller/README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ categories: ["logging", "networking"]
33
primary_category: "logging"
44
---
55

6-
# Enable Event Poller for Azure Subscriptions in Guardrails
6+
# Enable Event Pollers for Azure Subscriptions
77

88
The Guardrails Event Poller are responsible polling Audit Logs (Azure Monitor) at intervals specified and retrieves the latest events (Succeeded) for processing.
99

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
resource "turbot_policy_pack" "main" {
2-
akas = ["azure_guardrails_enable_event_poller"]
3-
title = "Enable Event Pollers for Azure Subscriptions in Guardrails"
2+
title = "Enable Event Pollers for Azure Subscriptions"
43
description = "The Guardrails Event Poller are responsible polling Audit Logs (Azure Monitor) at intervals specified and retrieves the latest events (Succeeded) for processing."
4+
akas = ["azure_guardrails_enable_event_poller"]
55
}

policy_packs/azure/loadbalancer/enforce_load_balancers_to_not_use_unapproved_ports/README.md renamed to policy_packs/azure/loadbalancer/enforce_load_balancers_use_only_approved_ports/README.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ categories: ["networking", "security"]
33
primary_category: "networking"
44
---
55

6-
# Enforce Azure Load Balancer to Not Use Unapproved Ports
6+
# Enforce Azure Load Balancer to Use Only Approved Ports
77

88
Enforcing that Azure Load Balancers do not use unapproved ports is essential for maintaining a secure network environment. This measure ensures that only approved and necessary ports are used, reducing the risk of unauthorized access and potential attacks, and enhancing overall security and compliance with best practices and regulatory requirements.
99

@@ -14,7 +14,7 @@ This [policy pack](https://turbot.com/guardrails/docs/concepts/policy-packs) can
1414

1515
## Documentation
1616

17-
- **[Review policy settings →](https://hub.guardrails.turbot.com/policy-packs/azure_loadbalancer_enforce_load_balancers_to_not_use_unapproved_ports/settings)**
17+
- **[Review policy settings →](https://hub.guardrails.turbot.com/policy-packs/azure_loadbalancer_enforce_load_balancers_use_only_approved_ports/settings)**
1818

1919
## Getting Started
2020

Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
resource "turbot_policy_pack" "main" {
2-
title = "Enforce Azure Load Balancer to Not Use Unapproved Ports"
2+
title = "Enforce Azure Load Balancer to Use Only Approved Ports"
33
description = "Ensure that only approved and necessary ports are used, reducing the risk of unauthorized access and potential attacks, and enhancing overall security."
4-
akas = ["azure_loadbalancer_enforce_load_balancers_to_not_use_unapproved_ports"]
4+
akas = ["azure_loadbalancer_enforce_load_balancers_use_only_approved_ports"]
55
}

policy_packs/azure/network/enforce_security_groups_to_reject_all_rdp_ssh_inbound_access/README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ primary_category: "networking"
44
type: "featured"
55
---
66

7-
# Enforce Azure Network Security Groups to Reject All Ingress, RDP and SSH Inbound Access
7+
# Enforce Azure Network Security Groups to Reject All Ingress, RDP, and SSH Inbound Access
88

99
Enforcing security groups to reject all ingress, RDP, and SSH inbound access is critical for minimizing the attack surface and protecting systems from unauthorized access. This measure ensures that remote administrative access is blocked unless explicitly allowed, reducing the risk of malicious attacks and enhancing overall security posture.
1010

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
resource "turbot_policy_pack" "main" {
2-
title = "Enforce Azure Network Security Groups to Reject All Ingress, RDP and SSH Inbound Access"
2+
title = "Enforce Azure Network Security Groups to Reject All Ingress, RDP, and SSH Inbound Access"
33
description = "Ensure remote administrative access is blocked unless explicitly allowed, reducing the risk of malicious attacks and enhancing overall security posture."
44
akas = ["azure_network_enforce_security_groups_to_reject_all_rdp_ssh_inbound_access"]
55
}

policy_packs/azure/storage/enforce_enable_cool_access_tier_for_storage_accounts/README.md renamed to policy_packs/azure/storage/enforce_cool_access_tier_for_storage_accounts/README.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,15 +3,15 @@ categories: ["cost controls", "storage"]
33
primary_category: "cost controls"
44
---
55

6-
# Enforce Enable Cool Access Tier for Azure Storage Accounts
6+
# Enforce Cool Access Tier for Azure Storage Accounts
77

88
Enforcing the use of the cool access tier for Azure Storage accounts is important for optimizing storage costs and efficiency. This measure ensures that infrequently accessed data is stored in a cost-effective manner, reducing overall storage expenses while maintaining accessibility, and aligning with best practices for data management and cost optimization.
99

1010
This [policy pack](https://turbot.com/guardrails/docs/concepts/resources/smart-folders) can help you configure the following settings for Storage accounts:
1111

1212
- Enable cool access tier
1313

14-
**[Review policy settings →](https://hub.guardrails.turbot.com/policy-packs/enforce_enable_cool_access_tier_for_storage_accounts/settings)**
14+
**[Review policy settings →](https://hub.guardrails.turbot.com/policy-packs/azure_storage_enforce_cool_access_tier_for_storage_accounts/settings)**
1515

1616
## Getting Started
1717

Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
resource "turbot_policy_pack" "main" {
2-
title = "Enforce Enable Cool Access Tier for Azure Storage Accounts"
2+
title = "Enforce Cool Access Tier for Azure Storage Accounts"
33
description = "Ensure that infrequently accessed data is stored in a cost-effective manner, reducing overall storage expenses while maintaining accessibility, and aligning with best practices for data management and cost optimization."
4-
akas = ["azure_storage_enforce_enable_cool_access_tier_for_storage_accounts"]
4+
akas = ["azure_storage_enforce_cool_access_tier_for_storage_accounts"]
55
}

0 commit comments

Comments
 (0)