用于检查应用程序服务的iPaddresses的Azure策略
我正在尝试在Azure中创建一个策略,该策略是否在App Services包含的情况下审核允许从某个IP地址访问。
部署没有问题,但目前说我所有的资源都不合规,我不明白为什么,我确定有些人是投诉。
我正在尝试检查IP 12.23.456.789/32是否访问 这就是我尝试的(我正在使用二头肌作为IAC:
resource ApimPRDPolicyDefinition 'Microsoft.Authorization/policyDefinitions@2020-09-01' = {
name: 'allow-apim'
properties: {
displayName: 'Check if api allow apim'
policyType: 'Custom'
policyRule: {
if: {
allOf: [
{
field: 'type'
equals: 'Microsoft.Web/sites'
}
{
field: 'name'
contains: 'api'
}
{
field: 'name'
contains: 'prd'
}
]
}
then: {
effect: 'auditIfNotExists'
details: {
type: 'Microsoft.Web/sites/config'
existenceCondition: {
field: 'Microsoft.Web/sites/config/web.ipSecurityRestrictions[*].ipAddress'
equals: '12.23.456.789/32'
}
}
}
}
}
}
这是我查看Azure Portal
{
"properties": {
"displayName": "Check if api allow apim",
"policyType": "Custom",
"mode": "Indexed",
"metadata": {
},
"policyRule": {
"if": {
"allOf": [
{
"field": "type",
"equals": "Microsoft.Web/sites"
},
{
"field": "name",
"contains": "api"
},
{
"field": "name",
"contains": "prd"
}
]
},
"then": {
"effect": "auditIfNotExists",
"details": {
"type": "Microsoft.Web/sites/config",
"existenceCondition": {
"field": "Microsoft.Web/sites/config/web.ipSecurityRestrictions[*].ipAddress",
"equals": "12.23.456.789/32"
}
}
}
}
},
"id": "",
"type": "Microsoft.Authorization/policyDefinitions",
"name": "allow-apim",
"systemData": {
}
}
类型的定义时的代码
I am trying to create a policy in azure which audits if app services contain allow access from a certain ip address.
Deploying is no problem but currently it says that all my resources are not compliant and I do not understand why, I know for sure that some are complaint.
I am trying to check if access from ip 12.23.456.789/32 is allowed
This is what i tried (I am using bicep for my IaC:
resource ApimPRDPolicyDefinition 'Microsoft.Authorization/policyDefinitions@2020-09-01' = {
name: 'allow-apim'
properties: {
displayName: 'Check if api allow apim'
policyType: 'Custom'
policyRule: {
if: {
allOf: [
{
field: 'type'
equals: 'Microsoft.Web/sites'
}
{
field: 'name'
contains: 'api'
}
{
field: 'name'
contains: 'prd'
}
]
}
then: {
effect: 'auditIfNotExists'
details: {
type: 'Microsoft.Web/sites/config'
existenceCondition: {
field: 'Microsoft.Web/sites/config/web.ipSecurityRestrictions[*].ipAddress'
equals: '12.23.456.789/32'
}
}
}
}
}
}
This is the code when I check out the definition in the azure portal
{
"properties": {
"displayName": "Check if api allow apim",
"policyType": "Custom",
"mode": "Indexed",
"metadata": {
},
"policyRule": {
"if": {
"allOf": [
{
"field": "type",
"equals": "Microsoft.Web/sites"
},
{
"field": "name",
"contains": "api"
},
{
"field": "name",
"contains": "prd"
}
]
},
"then": {
"effect": "auditIfNotExists",
"details": {
"type": "Microsoft.Web/sites/config",
"existenceCondition": {
"field": "Microsoft.Web/sites/config/web.ipSecurityRestrictions[*].ipAddress",
"equals": "12.23.456.789/32"
}
}
}
}
},
"id": "",
"type": "Microsoft.Authorization/policyDefinitions",
"name": "allow-apim",
"systemData": {
}
}
Kind regards
如果你对这篇内容有疑问,欢迎到本站社区发帖提问 参与讨论,获取更多帮助,或者扫码二维码加入 Web 技术交流群。

绑定邮箱获取回复消息
由于您还没有绑定你的真实邮箱,如果其他用户或者作者回复了您的评论,将不能在第一时间通知您!
发布评论
评论(1)
我创建并测试了此策略,并且按照预期的方式工作:
有用的文档:
https:https:https:// learch。 microsoft.com/en-us/azure/governance/policy/how-to/author-policies-for-arrays
I created and tested this policy, and it works as intended:
Useful documentation:
https://learn.microsoft.com/en-us/azure/governance/policy/how-to/author-policies-for-arrays