Skip to content

Commit

Permalink
Merge pull request #12 from jomolesk/nist-bp
Browse files Browse the repository at this point in the history
Update NIST blueprint sample
  • Loading branch information
georgewallace authored Jul 8, 2019
2 parents c51eaef + d4dbc26 commit f242c71
Show file tree
Hide file tree
Showing 3 changed files with 11 additions and 11 deletions.
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
---
title: Sample - NIST SP 800-53 R4 blueprint - Control mapping
description: Control mapping of the NIST SP 800-53 R4 blueprint sample to Azure Policy and RBAC.
description: Control mapping of the NIST SP 800-53 R4 blueprint sample to Azure Policy.
author: DCtheGeek
ms.author: dacoulte
ms.date: 06/24/2019
Expand Down Expand Up @@ -445,7 +445,7 @@ exfiltration of information.
## Next steps

Now that you've reviewed the control mapping of the NIST SP 800-53 R4 blueprint, visit the following
articles to learn about the architecture and how to deploy this sample:
articles to learn about the blueprint and how to deploy this sample:

> [!div class="nextstepaction"]
> [NIST SP 800-53 R4 blueprint - Overview](./index.md)
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -131,13 +131,13 @@ The following table provides a list of the blueprint artifact parameters:
|\[Preview\]: Audit NIST SP 800-53 R4 controls and deploy specific VM Extensions to support audit requirements|Policy assignment|List of users that should be excluded from Windows VM Administrators group|A semicolon-separated list of members that should be excluded in the Administrators local group. Ex: Administrator; myUser1; myUser2|
|\[Preview\]: Audit NIST SP 800-53 R4 controls and deploy specific VM Extensions to support audit requirements|Policy assignment|List of users that should be included in Windows VM Administrators group|A semicolon-separated list of members that should be included in the Administrators local group. Ex: Administrator; myUser1; myUser2|
|\[Preview\]: Deploy Log Analytics Agent for Linux VM Scale Sets (VMSS)|Policy assignment|Log Analytics workspace for Linux VM Scale Sets (VMSS)|If this workspace is outside of the scope of the assignment you must manually grant 'Log Analytics Contributor' permissions (or similar) to the policy assignment's principal ID.|
|\[Preview\]: Deploy Log Analytics Agent for Linux VM Scale Sets (VMSS)|Policy assignment|Optional: List of VM images that have supported Linux OS to add to scope|Example value: '/subscriptions/<subscriptionId>/resourceGroups/YourResourceGroup/providers/Microsoft.Compute/images/ContosoStdImage'|
|\[Preview\]: Deploy Log Analytics Agent for Linux VM Scale Sets (VMSS)|Policy assignment|Optional: List of VM images that have supported Linux OS to add to scope|An empty array may be used to indicate no optional parameters: \[\]|
|\[Preview\]: Deploy Log Analytics Agent for Linux VMs|Policy assignment|Log Analytics workspace for Linux VMs|If this workspace is outside of the scope of the assignment you must manually grant 'Log Analytics Contributor' permissions (or similar) to the policy assignment's principal ID.|
|\[Preview\]: Deploy Log Analytics Agent for Linux VMs|Policy assignment|Optional: List of VM images that have supported Linux OS to add to scope|Example value: '/subscriptions/<subscriptionId>/resourceGroups/YourResourceGroup/providers/Microsoft.Compute/images/ContosoStdImage'|
|\[Preview\]: Deploy Log Analytics Agent for Linux VMs|Policy assignment|Optional: List of VM images that have supported Linux OS to add to scope|An empty array may be used to indicate no optional parameters: \[\]|
|\[Preview\]: Deploy Log Analytics Agent for Windows VM Scale Sets (VMSS)|Policy assignment|Log Analytics workspace for Windows VM Scale Sets (VMSS)|If this workspace is outside of the scope of the assignment you must manually grant 'Log Analytics Contributor' permissions (or similar) to the policy assignment's principal ID.|
|\[Preview\]: Deploy Log Analytics Agent for Windows VM Scale Sets (VMSS)|Policy assignment|Optional: List of VM images that have supported Windows OS to add to scope|Example value: '/subscriptions/<subscriptionId>/resourceGroups/YourResourceGroup/providers/Microsoft.Compute/images/ContosoStdImage'|
|\[Preview\]: Deploy Log Analytics Agent for Windows VM Scale Sets (VMSS)|Policy assignment|Optional: List of VM images that have supported Windows OS to add to scope|An empty array may be used to indicate no optional parameters: \[\]|
|\[Preview\]: Deploy Log Analytics Agent for Windows VMs|Policy assignment|Log Analytics workspace for Windows VMs|If this workspace is outside of the scope of the assignment you must manually grant 'Log Analytics Contributor' permissions (or similar) to the policy assignment's principal ID.|
|\[Preview\]: Deploy Log Analytics Agent for Windows VMs|Policy assignment|Optional: List of VM images that have supported Windows OS to add to scope|Example value: '/subscriptions/<subscriptionId>/resourceGroups/YourResourceGroup/providers/Microsoft.Compute/images/ContosoStdImage'|
|\[Preview\]: Deploy Log Analytics Agent for Windows VMs|Policy assignment|Optional: List of VM images that have supported Windows OS to add to scope|An empty array may be used to indicate no optional parameters: \[\]|
|Deploy Advanced Threat Protection on Storage Accounts|Policy assignment|Effect|Information about policy effects can be found at [Understand Azure Policy Effects](../../../policy/concepts/effects.md)|
|Deploy Auditing on SQL servers|Policy assignment|The value in days of the retention period (0 indicates unlimited retention)|Retention days (optional, 180 days if unspecified)|
|Deploy Auditing on SQL servers|Policy assignment|Resource group name for storage account for SQL server auditing|Auditing writes database events to an audit log in your Azure Storage account (a storage account will be created in each region where a SQL Server is created that will be shared by all servers in that region). Important - for proper operation of Auditing do not delete or rename the resource group or the storage accounts.|
Expand All @@ -147,7 +147,7 @@ The following table provides a list of the blueprint artifact parameters:
## Next steps

Now that you've reviewed the steps to deploy the NIST SP 800-53 R4 blueprint sample, visit
the following articles to learn about the architecture and control mapping:
the following articles to learn about the blueprint and control mapping:

> [!div class="nextstepaction"]
> [NIST SP 800-53 R4 blueprint - Overview](./index.md)
Expand Down
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
---
title: Samples - NIST SP 800-53 R4 blueprint - Overview
description: Overview and architecture of the NIST SP 800-53 R4 blueprint sample.
description: Overview of the NIST SP 800-53 R4 blueprint sample.
author: DCtheGeek
ms.author: dacoulte
ms.date: 06/24/2019
Expand All @@ -24,8 +24,8 @@ information, see [Azure Policy](../../../policy/overview.md).

## Next steps

You've reviewed the overview and architecture of the NIST SP 800-53 R4 blueprint sample. Next, visit
the following articles to learn about the control mapping and how to deploy this sample:
You've reviewed the overview and of the NIST SP 800-53 R4 blueprint sample. Next, visit the
following articles to learn about the control mapping and how to deploy this sample:

> [!div class="nextstepaction"]
> [NIST SP 800-53 R4 blueprint - Control mapping](./control-mapping.md)
Expand All @@ -37,4 +37,4 @@ Addition articles about blueprints and how to use them:
- Understand how to use [static and dynamic parameters](../../concepts/parameters.md).
- Learn to customize the [blueprint sequencing order](../../concepts/sequencing-order.md).
- Find out how to make use of [blueprint resource locking](../../concepts/resource-locking.md).
- Learn how to [update existing assignments](../../how-to/update-existing-assignments.md).
- Learn how to [update existing assignments](../../how-to/update-existing-assignments.md).

0 comments on commit f242c71

Please sign in to comment.