Skip to content

Commit acfe8bb

Browse files
authored
Renamed Cognitive Services to Azure AI (Azure#2780)
* Renamed Cognitive Services to Azure AI * Bump change log
1 parent 3e665e5 commit acfe8bb

11 files changed

+103
-86
lines changed

data/policy-ignore.json

+2-2
Original file line numberDiff line numberDiff line change
@@ -105,14 +105,14 @@
105105
"/providers/Microsoft.Authorization/policyDefinitions/14de9e63-1b31-492e-a5a3-c3f7fd57f555"
106106
],
107107
"reason": "Duplicate",
108-
"value": "Azure.Cognitive.DisableLocalAuth"
108+
"value": "Azure.AI.DisableLocalAuth"
109109
},
110110
{
111111
"policyDefinitionIds": [
112112
"/providers/Microsoft.Authorization/policyDefinitions/fe3fd216-4f83-4fc1-8984-2bbec80a3418"
113113
],
114114
"reason": "Duplicate",
115-
"value": "Azure.Cognitive.ManagedIdentity"
115+
"value": "Azure.AI.ManagedIdentity"
116116
},
117117
{
118118
"policyDefinitionIds": [

docs/CHANGELOG-v1.md

+8
Original file line numberDiff line numberDiff line change
@@ -32,6 +32,14 @@ See [upgrade notes][1] for helpful information when upgrading from previous vers
3232

3333
## Unreleased
3434

35+
What's changed since pre-release v1.35.0-B0084:
36+
37+
- General improvements:
38+
- Renamed Cognitive Services rules to Azure AI by @BernieWhite.
39+
[#2776](https://github.com/Azure/PSRule.Rules.Azure/issues/2776)
40+
- Rules that were previously named `Azure.Cognitive.*` have been renamed to `Azure.AI.*`.
41+
- For each rule that has been renamed, an alias has been added to reference the old name.
42+
3543
## v1.35.0-B0084 (pre-release)
3644

3745
What's changed since pre-release v1.35.0-B0055:

docs/en/rules/Azure.Cognitive.DisableLocalAuth.md docs/en/rules/Azure.AI.DisableLocalAuth.md

+19-18
Original file line numberDiff line numberDiff line change
@@ -1,32 +1,33 @@
11
---
2-
reviewed: 2023-10-01
2+
reviewed: 2024-03-26
33
severity: Important
44
pillar: Security
5-
category: Authentication
6-
resource: Cognitive Services
7-
online version: https://azure.github.io/PSRule.Rules.Azure/en/rules/Azure.Cognitive.DisableLocalAuth/
5+
category: SE:05 Identity and access management
6+
resource: Azure AI
7+
online version: https://azure.github.io/PSRule.Rules.Azure/en/rules/Azure.AI.DisableLocalAuth/
88
---
99

10-
# Use identity-based authentication for Cognitive Services accounts
10+
# Use identity-based authentication for Azure AI accounts
1111

1212
## SYNOPSIS
1313

14-
Authenticate requests to Cognitive Services with Azure AD identities.
14+
Authenticate requests to Azure AI services with Entra ID identities.
1515

1616
## DESCRIPTION
1717

18-
To send requests to Cognitive Services endpoints, each request must include an authentication header.
19-
Cognitive Services endpoints supports authentication with keys or tokens.
20-
Using an Azure AD token instead of a cryptographic key has some additional security benefits.
18+
To send requests to Azure AI service endpoints (previously known as Cognitive Services),
19+
each request must include an authentication header.
20+
Azure AI service endpoints supports authentication with keys or access tokens.
21+
Using an Entra ID access token instead of a cryptographic key has some additional security benefits.
2122

22-
With Azure AD authentication, the identity is validated against Azure AD identity provider.
23-
Using Azure AD identities centralizes identity management and auditing.
23+
With Entra ID authentication, an authorized identity is issued an OAuth2 access token issued by Entra ID.
24+
Using Entra ID as the identity provider centralizes identity management and auditing.
2425

25-
Once you decide to use Azure AD authentication, you can disable authentication using keys.
26+
Once you decide to use Entra ID authentication, you can disable authentication using keys.
2627

2728
## RECOMMENDATION
2829

29-
Consider only using Azure AD identities to authenticate requests to Cognitive Services accounts.
30+
Consider only using Entra ID identities to authenticate requests to Azure AI service accounts.
3031
Once configured, disable authentication based on access keys.
3132

3233
## EXAMPLES
@@ -95,15 +96,15 @@ resource account 'Microsoft.CognitiveServices/accounts@2023-05-01' = {
9596

9697
To address this issue at runtime use the following policies:
9798

98-
- [Azure AI Services resources should have key access disabled (disable local authentication)](https://github.com/Azure/azure-policy/blob/master/built-in-policies/policyDefinitions/Azure%20Ai%20Services/CognitiveServices_DisableLocalAuth_Audit.json)
99+
- [Azure AI Services resources should have key access disabled (disable local authentication)](https://github.com/Azure/azure-policy/blob/master/built-in-policies/policyDefinitions/Azure%20Ai%20Services/DisableLocalAuth_Audit.json)
99100
`/providers/Microsoft.Authorization/policyDefinitions/71ef260a-8f18-47b7-abcb-62d0673d94dc`
100-
- [Configure Cognitive Services accounts to disable local authentication methods](https://github.com/Azure/azure-policy/blob/master/built-in-policies/policyDefinitions/Cognitive%20Services/CognitiveServices_DisableLocalAuth_Modify.json)
101+
- [Configure Cognitive Services accounts to disable local authentication methods](https://github.com/Azure/azure-policy/blob/master/built-in-policies/policyDefinitions/Cognitive%20Services/DisableLocalAuth_Modify.json)
101102
`/providers/Microsoft.Authorization/policyDefinitions/14de9e63-1b31-492e-a5a3-c3f7fd57f555`
102103

103104
## LINKS
104105

105-
- [Use identity-based authentication](https://learn.microsoft.com/azure/well-architected/security/design-identity-authentication#use-identity-based-authentication)
106-
- [Authenticate with Azure Active Directory](https://learn.microsoft.com/azure/ai-services/authentication#authenticate-with-azure-active-directory)
107-
- [Azure Policy built-in policy definitions for Azure AI services](https://learn.microsoft.com/azure/ai-services/policy-reference)
106+
- [SE:05 Identity and access management](https://learn.microsoft.com/azure/well-architected/security/identity-access)
108107
- [IM-1: Use centralized identity and authentication system](https://learn.microsoft.com/security/benchmark/azure/baselines/cognitive-services-security-baseline#im-1-use-centralized-identity-and-authentication-system)
108+
- [Authenticate with Microsoft Entra ID](https://learn.microsoft.com/azure/ai-services/authentication#authenticate-with-microsoft-entra-id)
109+
- [Azure Policy built-in policy definitions for Azure AI services](https://learn.microsoft.com/azure/ai-services/policy-reference)
109110
- [Azure deployment reference](https://learn.microsoft.com/azure/templates/microsoft.cognitiveservices/accounts)

docs/en/rules/Azure.Cognitive.ManagedIdentity.md docs/en/rules/Azure.AI.ManagedIdentity.md

+10-10
Original file line numberDiff line numberDiff line change
@@ -1,22 +1,22 @@
11
---
2-
reviewed: 2024-01-03
2+
reviewed: 2024-03-26
33
severity: Important
44
pillar: Security
55
category: SE:05 Identity and access management
6-
resource: Cognitive Services
7-
online version: https://azure.github.io/PSRule.Rules.Azure/en/rules/Azure.Cognitive.ManagedIdentity/
6+
resource: Azure AI
7+
online version: https://azure.github.io/PSRule.Rules.Azure/en/rules/Azure.AI.ManagedIdentity/
88
---
99

10-
# Use Managed Identity for Cognitive Services accounts
10+
# Use Managed Identity for Azure AI services accounts
1111

1212
## SYNOPSIS
1313

1414
Configure managed identities to access Azure resources.
1515

1616
## DESCRIPTION
1717

18-
Cognitive Services must authenticate to Azure resources such storage accounts.
19-
To authenticate to Azure resources, Cognitive Services can use managed identities.
18+
Azure AI services (previously known as Cognitive Services) must authenticate to Azure resources such storage accounts.
19+
To authenticate to Azure resources, Azure AI can use managed identities.
2020

2121
Using Azure managed identities have the following benefits:
2222

@@ -27,7 +27,7 @@ Using Azure managed identities have the following benefits:
2727

2828
## RECOMMENDATION
2929

30-
Consider configuring a managed identity for each Cognitive Services account.
30+
Consider configuring a managed identity for each Azure AI services account.
3131

3232
## EXAMPLES
3333

@@ -97,13 +97,13 @@ resource language 'Microsoft.CognitiveServices/accounts@2023-05-01' = {
9797

9898
To address this issue at runtime use the following policies:
9999

100-
- [Cognitive Services accounts should use a managed identity](https://github.com/Azure/azure-policy/blob/master/built-in-policies/policyDefinitions/Cognitive%20Services/CognitiveServices_ManagedIdentity_Audit.json)
100+
- [Cognitive Services accounts should use a managed identity](https://github.com/Azure/azure-policy/blob/master/built-in-policies/policyDefinitions/Cognitive%20Services/ManagedIdentity_Audit.json)
101101
`/providers/Microsoft.Authorization/policyDefinitions/fe3fd216-4f83-4fc1-8984-2bbec80a3418`.
102102

103103
## NOTES
104104

105-
Configuration of additional Azure resources is not required for all Cognitive Services.
106-
This rule will run for the following Cognitive Services:
105+
Configuration of additional Azure resources is not required for all Azure AI services.
106+
This rule will run for the following Azure AI services:
107107

108108
- `TextAnalytics` - Language service.
109109

docs/en/rules/Azure.Cognitive.PrivateEndpoints.md docs/en/rules/Azure.AI.PrivateEndpoints.md

+13-13
Original file line numberDiff line numberDiff line change
@@ -1,32 +1,32 @@
11
---
2-
reviewed: 2022-07-26
2+
reviewed: 2024-03-26
33
severity: Important
44
pillar: Security
5-
category: Data flow
6-
resource: Cognitive Services
7-
online version: https://azure.github.io/PSRule.Rules.Azure/en/rules/Azure.Cognitive.PrivateEndpoints/
5+
category: SE:06 Network controls
6+
resource: Azure AI
7+
online version: https://azure.github.io/PSRule.Rules.Azure/en/rules/Azure.AI.PrivateEndpoints/
88
---
99

10-
# Use Cognitive Service Private Endpoints
10+
# Use Azure AI services Private Endpoints
1111

1212
## SYNOPSIS
1313

14-
Use Private Endpoints to access Cognitive Services accounts.
14+
Use Private Endpoints to access Azure AI services accounts.
1515

1616
## DESCRIPTION
1717

18-
By default, a public endpoint is enabled for Cognitive Services accounts.
18+
By default, a public endpoint is enabled for Azure AI services accounts (previously known as Cognitive Services).
1919
The public endpoint is used for all access except for requests that use a Private Endpoint.
2020
Access through the public endpoint can be disabled or restricted to authorized virtual networks.
2121

2222
Data exfiltration is an attack where an malicious actor does an unauthorized data transfer.
2323
Private Endpoints help prevent data exfiltration by an internal or external malicious actor.
2424
They do this by providing clear separation between public and private endpoints.
25-
As a result, broad access to public endpoints which could be operated by a malicious actor are not required.
25+
As a result, broad access to public endpoints which could be operated by a malicious actor is not required.
2626

2727
## RECOMMENDATION
2828

29-
Consider accessing Cognitive Services accounts by Private Endpoints and disabling public endpoints.
29+
Consider accessing Azure AI services accounts by Private Endpoints and disabling public endpoints.
3030

3131
## EXAMPLES
3232

@@ -92,7 +92,7 @@ resource account 'Microsoft.CognitiveServices/accounts@2023-05-01' = {
9292

9393
## LINKS
9494

95-
- [Traffic flow security in Azure](https://learn.microsoft.com/azure/architecture/framework/security/design-network-flow#data-exfiltration)
96-
- [Configure Azure Cognitive Services virtual networks](https://docs.microsoft.com/azure/cognitive-services/cognitive-services-virtual-networks)
97-
- [Azure Policy built-in policy definitions for Azure Cognitive Services](https://docs.microsoft.com/azure/cognitive-services/policy-reference)
98-
- [Azure deployment reference](https://docs.microsoft.com/azure/templates/microsoft.cognitiveservices/accounts)
95+
- [SE:06 Network controls](https://learn.microsoft.com/azure/well-architected/security/networking)
96+
- [Configure Azure AI services virtual networks](https://learn.microsoft.com/azure/ai-services/cognitive-services-virtual-networks)
97+
- [Azure Policy built-in policy definitions for Azure AI services](https://learn.microsoft.com/azure/ai-services/policy-reference)
98+
- [Azure deployment reference](https://learn.microsoft.com/azure/templates/microsoft.cognitiveservices/accounts)

docs/en/rules/Azure.Cognitive.PublicAccess.md docs/en/rules/Azure.AI.PublicAccess.md

+12-12
Original file line numberDiff line numberDiff line change
@@ -1,29 +1,29 @@
11
---
2-
reviewed: 2022-07-26
2+
reviewed: 2024-03-26
33
severity: Important
44
pillar: Security
5-
category: Application endpoints
6-
resource: Cognitive Services
7-
online version: https://azure.github.io/PSRule.Rules.Azure/en/rules/Azure.Cognitive.PublicAccess/
5+
category: SE:06 Network controls
6+
resource: Azure AI
7+
online version: https://azure.github.io/PSRule.Rules.Azure/en/rules/Azure.AI.PublicAccess/
88
---
99

10-
# Restrict Cognitive Service endpoints
10+
# Restrict Azure AI service endpoints
1111

1212
## SYNOPSIS
1313

14-
Restrict access of Cognitive Services accounts to authorized virtual networks.
14+
Restrict access of Azure AI services to authorized virtual networks.
1515

1616
## DESCRIPTION
1717

18-
By default, public network access is enabled for a Cognitive Service account.
18+
By default, public network access is enabled for a Azure AI service accounts (previously known as Cognitive Services).
1919
Service Endpoints and Private Link can be leveraged to restrict access to PaaS endpoints.
2020
When access is restricted, access by malicious actor is from an unauthorized virtual network is mitigated.
2121

2222
Configure service endpoints and private links where appropriate.
2323

2424
## RECOMMENDATION
2525

26-
Consider configuring network access restrictions for Cognitive Services accounts.
26+
Consider configuring network access restrictions for Azure AI service accounts.
2727
Limit access to accounts so that access is permitted from authorized virtual networks only.
2828

2929
## EXAMPLES
@@ -92,7 +92,7 @@ resource account 'Microsoft.CognitiveServices/accounts@2023-05-01' = {
9292

9393
## LINKS
9494

95-
- [Best practices for endpoint security on Azure](https://learn.microsoft.com/azure/architecture/framework/security/design-network-endpoints#public-endpoints)
96-
- [Configure Azure Cognitive Services virtual networks](https://docs.microsoft.com/azure/cognitive-services/cognitive-services-virtual-networks)
97-
- [Azure Policy built-in policy definitions for Azure Cognitive Services](https://docs.microsoft.com/azure/cognitive-services/policy-reference)
98-
- [Azure deployment reference](https://docs.microsoft.com/azure/templates/microsoft.cognitiveservices/accounts)
95+
- [SE:06 Network controls](https://learn.microsoft.com/azure/well-architected/security/networking)
96+
- [Configure Azure AI services virtual networks](https://learn.microsoft.com/azure/ai-services/cognitive-services-virtual-networks)
97+
- [Azure Policy built-in policy definitions for Azure AI services](https://learn.microsoft.com/azure/ai-services/policy-reference)
98+
- [Azure deployment reference](https://learn.microsoft.com/azure/templates/microsoft.cognitiveservices/accounts)

src/PSRule.Rules.Azure/rules/Azure.Cognitive.Rule.yaml src/PSRule.Rules.Azure/rules/Azure.AI.Rule.yaml

+17-9
Original file line numberDiff line numberDiff line change
@@ -8,18 +8,20 @@
88
#region Rules
99

1010
---
11-
# Synopsis: Restrict access to Cognitive Services accounts to authorized virtual networks.
11+
# Synopsis: Restrict access of Azure AI services to authorized virtual networks.
1212
apiVersion: github.com/microsoft/PSRule/v1
1313
kind: Rule
1414
metadata:
15-
name: Azure.Cognitive.PublicAccess
15+
name: Azure.AI.PublicAccess
1616
ref: AZR-000280
17+
alias:
18+
- Azure.Cognitive.PublicAccess
1719
tags:
1820
release: GA
1921
ruleSet: 2022_09
20-
Azure.WAF/pillar: 'Security'
22+
Azure.WAF/pillar: Security
2123
labels:
22-
Azure.MCSB.v1/control: 'NS-2'
24+
Azure.MCSB.v1/control: NS-2
2325
spec:
2426
type:
2527
- Microsoft.CognitiveServices/accounts
@@ -35,8 +37,10 @@ spec:
3537
apiVersion: github.com/microsoft/PSRule/v1
3638
kind: Rule
3739
metadata:
38-
name: Azure.Cognitive.ManagedIdentity
40+
name: Azure.AI.ManagedIdentity
3941
ref: AZR-000281
42+
alias:
43+
- Azure.Cognitive.ManagedIdentity
4044
tags:
4145
release: GA
4246
ruleSet: 2022_09
@@ -60,12 +64,14 @@ spec:
6064
- SystemAssigned, UserAssigned
6165

6266
---
63-
# Synopsis: Authenticate requests to Cognitive Services with Azure AD identities.
67+
# Synopsis: Authenticate requests to Azure AI services with Entra ID identities.
6468
apiVersion: github.com/microsoft/PSRule/v1
6569
kind: Rule
6670
metadata:
67-
name: Azure.Cognitive.DisableLocalAuth
71+
name: Azure.AI.DisableLocalAuth
6872
ref: AZR-000282
73+
alias:
74+
- Azure.Cognitive.DisableLocalAuth
6975
tags:
7076
release: GA
7177
ruleSet: 2022_09
@@ -83,12 +89,14 @@ spec:
8389
equals: true
8490

8591
---
86-
# Synopsis: Use Private Endpoints to access Cognitive Services accounts.
92+
# Synopsis: Use Private Endpoints to access Azure AI services accounts.
8793
apiVersion: github.com/microsoft/PSRule/v1
8894
kind: Rule
8995
metadata:
90-
name: Azure.Cognitive.PrivateEndpoints
96+
name: Azure.AI.PrivateEndpoints
9197
ref: AZR-000283
98+
alias:
99+
- Azure.Cognitive.PrivateEndpoints
92100
tags:
93101
release: GA
94102
ruleSet: 2022_09

0 commit comments

Comments
 (0)