Skip to content

Commit f9c66a1

Browse files
authored
Quality updates to rule docs (Azure#2848)
1 parent d960b50 commit f9c66a1

5 files changed

+17
-11
lines changed

docs/en/rules/Azure.ACR.ContentTrust.md

+2-2
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
severity: Important
33
pillar: Security
4-
category: Data protection
4+
category: SE:02 Secured development lifecycle
55
resource: Container Registry
66
online version: https://azure.github.io/PSRule.Rules.Azure/en/rules/Azure.ACR.ContentTrust/
77
---
@@ -104,7 +104,7 @@ resource registry 'Microsoft.ContainerRegistry/registries@2023-08-01-preview' =
104104

105105
## LINKS
106106

107-
- [Follow best practices for container security](https://learn.microsoft.com/azure/architecture/framework/security/applications-services#follow-best-practices-for-container-security)
107+
- [SE:02 Secured development lifecycle](https://learn.microsoft.com/azure/well-architected/security/secure-development-lifecycle)
108108
- [Content trust in Azure Container Registry](https://learn.microsoft.com/azure/container-registry/container-registry-content-trust)
109109
- [Content trust in Docker](https://docs.docker.com/engine/security/trust/content_trust/)
110110
- [Overview of customer-managed keys](https://learn.microsoft.com/azure/container-registry/tutorial-customer-managed-keys#before-you-enable-a-customer-managed-key)

docs/en/rules/Azure.ACR.Firewall.md

+2
Original file line numberDiff line numberDiff line change
@@ -94,6 +94,8 @@ resource acr 'Microsoft.ContainerRegistry/registries@2023-01-01-preview' = {
9494
}
9595
```
9696

97+
<!-- external:avm avm/res/container-registry/registry publicNetworkAccess -->
98+
9799
## NOTES
98100

99101
Configuring firewall rules or using private endpoints is only available for the Premium SKU.

docs/en/rules/Azure.ACR.MinSku.md

+2
Original file line numberDiff line numberDiff line change
@@ -121,6 +121,8 @@ resource acr 'Microsoft.ContainerRegistry/registries@2023-01-01-preview' = {
121121
}
122122
```
123123

124+
<!-- external:avm avm/res/container-registry/registry acrSku -->
125+
124126
## LINKS
125127

126128
- [Target and non-functional requirements](https://learn.microsoft.com/azure/architecture/framework/resiliency/design-requirements)

docs/en/rules/Azure.Firewall.Mode.md

+4-4
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
severity: Critical
33
pillar: Security
4-
category: Network security and containment
4+
category: SE:10 Monitoring and threat detection
55
resource: Firewall
66
online version: https://azure.github.io/PSRule.Rules.Azure/en/rules/Azure.Firewall.Mode/
77
---
@@ -35,7 +35,7 @@ Alternatively, consider using firewall policies to manage Azure Firewalls at sca
3535

3636
To deploy Azure Firewalls that pass this rule:
3737

38-
- Set the `properties.threatIntelMode` to `Deny`.
38+
- Set the `properties.threatIntelMode` property to `Deny`.
3939

4040
For example:
4141

@@ -58,7 +58,7 @@ For example:
5858

5959
To deploy Azure Firewalls that pass this rule:
6060

61-
- Set the `properties.threatIntelMode` to `Deny`.
61+
- Set the `properties.threatIntelMode` property to `Deny`.
6262

6363
For example:
6464

@@ -77,7 +77,7 @@ resource firewall_classic 'Microsoft.Network/azureFirewalls@2021-05-01' = {
7777

7878
## LINKS
7979

80-
- [Implement network segmentation patterns on Azure](https://learn.microsoft.com/azure/architecture/framework/security/design-network-segmentation)
80+
- [SE:10 Monitoring and threat detection](https://learn.microsoft.com/azure/well-architected/security/monitor-threats)
8181
- [Azure Firewall threat intelligence-based filtering](https://learn.microsoft.com/azure/firewall/threat-intel)
8282
- [Azure network security overview](https://learn.microsoft.com/azure/security/fundamentals/network-overview#azure-firewall)
8383
- [Azure deployment reference](https://learn.microsoft.com/azure/templates/microsoft.network/azurefirewalls)

docs/en/rules/Azure.Firewall.PolicyMode.md

+7-5
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
severity: Critical
33
pillar: Security
4-
category: Network security and containment
4+
category: SE:10 Monitoring and threat detection
55
resource: Firewall
66
online version: https://azure.github.io/PSRule.Rules.Azure/en/rules/Azure.Firewall.PolicyMode/
77
---
@@ -30,7 +30,7 @@ Consider configuring Azure Firewall to alert and deny IP addresses, domains and
3030

3131
To deploy Azure Firewall polices that pass this rule:
3232

33-
- Set the `properties.threatIntelMode` to `Deny`.
33+
- Set the `properties.threatIntelMode` property to `Deny`.
3434

3535
For example:
3636

@@ -53,7 +53,7 @@ For example:
5353

5454
To deploy Azure Firewall polices that pass this rule:
5555

56-
- Set the `properties.threatIntelMode` to `Deny`.
56+
- Set the `properties.threatIntelMode` property to `Deny`.
5757

5858
For example:
5959

@@ -70,6 +70,8 @@ resource firewallPolicy 'Microsoft.Network/firewallPolicies@2023-04-01' = {
7070
}
7171
```
7272

73+
<!-- external:avm avm/res/network/firewall-policy threatIntelMode -->
74+
7375
### NOTES
7476

7577
Azure Firewall Premium SKU is required for associating standalone resource firewall policies.
@@ -79,10 +81,10 @@ In order to take advantage of URL filtering with `HTTPS` traffic included in thr
7981

8082
## LINKS
8183

82-
- [Implement network segmentation patterns on Azure](https://learn.microsoft.com/azure/architecture/framework/security/design-network-segmentation)
84+
- [SE:10 Monitoring and threat detection](https://learn.microsoft.com/azure/well-architected/security/monitor-threats)
85+
- [NS-1: Establish network segmentation boundaries](https://learn.microsoft.com/security/benchmark/azure/baselines/azure-firewall-security-baseline#ns-1-establish-network-segmentation-boundaries)
8386
- [Azure Firewall threat intelligence-based filtering](https://learn.microsoft.com/azure/firewall/threat-intel)
8487
- [Rule processing logic](https://learn.microsoft.com/azure/firewall/rule-processing#threat-intelligence)
8588
- [Azure security baseline for Azure Firewall](https://learn.microsoft.com/security/benchmark/azure/baselines/azure-firewall-security-baseline)
86-
- [NS-1: Establish network segmentation boundaries](https://learn.microsoft.com/security/benchmark/azure/baselines/azure-firewall-security-baseline#ns-1-establish-network-segmentation-boundaries)
8789
- [Azure network security overview](https://learn.microsoft.com/azure/security/fundamentals/network-overview#azure-firewall)
8890
- [Azure deployment reference](https://learn.microsoft.com/azure/templates/microsoft.network/firewallpolicies#firewallpolicypropertiesformat)

0 commit comments

Comments
 (0)