|
1 | 1 | ---
|
2 |
| -reviewed: 2021/11/13 |
| 2 | +reviewed: 2021-11-13 |
3 | 3 | severity: Critical
|
4 | 4 | pillar: Security
|
5 |
| -category: Azure resources |
| 5 | +category: SE:10 Monitoring and threat detection |
6 | 6 | resource: Container Registry
|
7 | 7 | online version: https://azure.github.io/PSRule.Rules.Azure/en/rules/Azure.ACR.ContainerScan/
|
8 | 8 | ---
|
@@ -33,9 +33,9 @@ Container image vulnerability scanning with Microsoft Defender for container reg
|
33 | 33 |
|
34 | 34 | - Is currently only available for Linux-hosted ACR registries.
|
35 | 35 | - The container registry must be accessible by Microsoft Defender for Container registries.
|
36 |
| -Network access can not be restricted by firewall, Service Endpoints, or Private Endpoints. |
| 36 | + Network access can not be restricted by firewall, Service Endpoints, or Private Endpoints. |
37 | 37 | - Is supported in commercial clouds.
|
38 |
| -Is not currently supported in sovereign or national clouds (e.g. US Gov, China Gov, etc.). |
| 38 | + Is not currently supported in sovereign or national clouds (e.g. US Gov, China Gov, etc.). |
39 | 39 |
|
40 | 40 | ## RECOMMENDATION
|
41 | 41 |
|
@@ -97,7 +97,7 @@ This rule applies when analyzing resources deployed (in-flight) to Azure.
|
97 | 97 |
|
98 | 98 | ## LINKS
|
99 | 99 |
|
100 |
| -- [Monitor Azure resources in Microsoft Defender for Cloud](https://learn.microsoft.com/azure/architecture/framework/security/monitor-resources#containers) |
| 100 | +- [SE:10 Monitoring and threat detection](https://learn.microsoft.com/azure/well-architected/security/monitor-threats) |
101 | 101 | - [Introduction to Microsoft Defender for container registries](https://learn.microsoft.com/azure/defender-for-cloud/defender-for-container-registries-introduction)
|
102 | 102 | - [Container security in Microsoft Defender for Cloud](https://learn.microsoft.com/azure/defender-for-cloud/defender-for-containers-introduction)
|
103 | 103 | - [Secure the images and run time](https://learn.microsoft.com/azure/aks/operator-best-practices-container-image-management#secure-the-images-and-run-time)
|
0 commit comments