Skip to content

Commit

Permalink
Merge branch 'main' into update-schema
Browse files Browse the repository at this point in the history
  • Loading branch information
oZakari authored Nov 26, 2024
2 parents b3889d9 + 00725bc commit cbdbac8
Show file tree
Hide file tree
Showing 29 changed files with 96 additions and 121 deletions.
2 changes: 1 addition & 1 deletion .github/workflows/ado-sync-workitems.yml
Original file line number Diff line number Diff line change
Expand Up @@ -17,7 +17,7 @@ jobs:

steps:
- name: Harden Runner
uses: step-security/harden-runner@91182cccc01eb5e619899d80e4e971d6181294a7 # v2.10.1
uses: step-security/harden-runner@0080882f6c36860b6ba35c610c98ce87d4e2f26f # v2.10.2
with:
egress-policy: audit

Expand Down
2 changes: 1 addition & 1 deletion .github/workflows/build-recommendation-object.yml
Original file line number Diff line number Diff line change
Expand Up @@ -34,7 +34,7 @@ jobs:
runs-on: ubuntu-latest
steps:
- name: Harden Runner
uses: step-security/harden-runner@91182cccc01eb5e619899d80e4e971d6181294a7 # v2.10.1
uses: step-security/harden-runner@0080882f6c36860b6ba35c610c98ce87d4e2f26f # v2.10.2
with:
egress-policy: audit

Expand Down
4 changes: 2 additions & 2 deletions .github/workflows/code-review.yml
Original file line number Diff line number Diff line change
Expand Up @@ -20,7 +20,7 @@ jobs:
runs-on: ubuntu-latest
steps:
- name: Harden Runner
uses: step-security/harden-runner@91182cccc01eb5e619899d80e4e971d6181294a7 # v2.10.1
uses: step-security/harden-runner@0080882f6c36860b6ba35c610c98ce87d4e2f26f # v2.10.2
with:
egress-policy: audit

Expand Down Expand Up @@ -52,7 +52,7 @@ jobs:
runs-on: ubuntu-latest
steps:
- name: Harden Runner
uses: step-security/harden-runner@91182cccc01eb5e619899d80e4e971d6181294a7 # v2.10.1
uses: step-security/harden-runner@0080882f6c36860b6ba35c610c98ce87d4e2f26f # v2.10.2
with:
egress-policy: audit

Expand Down
4 changes: 2 additions & 2 deletions .github/workflows/dependency-review.yml
Original file line number Diff line number Diff line change
Expand Up @@ -17,12 +17,12 @@ jobs:
runs-on: ubuntu-latest
steps:
- name: Harden Runner
uses: step-security/harden-runner@91182cccc01eb5e619899d80e4e971d6181294a7 # v2.10.1
uses: step-security/harden-runner@0080882f6c36860b6ba35c610c98ce87d4e2f26f # v2.10.2
with:
egress-policy: audit

- name: 'Checkout Repository'
uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2

- name: 'Dependency Review'
uses: actions/dependency-review-action@4081bf99e2866ebe428fc0477b69eb4fcda7220a # v4.4.0
uses: actions/dependency-review-action@3b139cfc5fae8b618d3eae3675e383bb1769c019 # v4.5.0
2 changes: 1 addition & 1 deletion .github/workflows/hugo-build-pr-check.yml
Original file line number Diff line number Diff line change
Expand Up @@ -32,7 +32,7 @@ jobs:
HUGO_VERSION: 0.124.1
steps:
- name: Harden Runner
uses: step-security/harden-runner@91182cccc01eb5e619899d80e4e971d6181294a7 # v2.10.1
uses: step-security/harden-runner@0080882f6c36860b6ba35c610c98ce87d4e2f26f # v2.10.2
with:
egress-policy: audit

Expand Down
4 changes: 2 additions & 2 deletions .github/workflows/hugo-site-build.yml
Original file line number Diff line number Diff line change
Expand Up @@ -41,7 +41,7 @@ jobs:
HUGO_VERSION: 0.124.1
steps:
- name: Harden Runner
uses: step-security/harden-runner@91182cccc01eb5e619899d80e4e971d6181294a7 # v2.10.1
uses: step-security/harden-runner@0080882f6c36860b6ba35c610c98ce87d4e2f26f # v2.10.2
with:
egress-policy: audit

Expand Down Expand Up @@ -101,7 +101,7 @@ jobs:
if: github.ref == 'refs/heads/main'
steps:
- name: Harden Runner
uses: step-security/harden-runner@91182cccc01eb5e619899d80e4e971d6181294a7 # v2.10.1
uses: step-security/harden-runner@0080882f6c36860b6ba35c610c98ce87d4e2f26f # v2.10.2
with:
egress-policy: audit

Expand Down
2 changes: 1 addition & 1 deletion .github/workflows/pr-title-check.yml
Original file line number Diff line number Diff line change
Expand Up @@ -19,7 +19,7 @@ jobs:
runs-on: ubuntu-latest
steps:
- name: Harden Runner
uses: step-security/harden-runner@91182cccc01eb5e619899d80e4e971d6181294a7 # v2.10.1
uses: step-security/harden-runner@0080882f6c36860b6ba35c610c98ce87d4e2f26f # v2.10.2
with:
egress-policy: audit

Expand Down
4 changes: 2 additions & 2 deletions .github/workflows/scorecard.yml
Original file line number Diff line number Diff line change
Expand Up @@ -21,7 +21,7 @@ jobs:
id-token: write
steps:
- name: Harden Runner
uses: step-security/harden-runner@91182cccc01eb5e619899d80e4e971d6181294a7 # v2.10.1
uses: step-security/harden-runner@0080882f6c36860b6ba35c610c98ce87d4e2f26f # v2.10.2
with:
egress-policy: audit

Expand Down Expand Up @@ -55,6 +55,6 @@ jobs:
# Upload the results to GitHub's code scanning dashboard (optional).
# Commenting out will disable upload of results to your repo's Code Scanning dashboard
- name: "Upload to code-scanning"
uses: github/codeql-action/upload-sarif@ea9e4e37992a54ee68a9622e985e60c8e8f12d9f # v3.27.4
uses: github/codeql-action/upload-sarif@f09c1c0a94de965c15400f5634aa42fac8fb8f88 # v3.27.5
with:
sarif_file: results.sarif
2 changes: 1 addition & 1 deletion .github/workflows/validate-queries.yml
Original file line number Diff line number Diff line change
Expand Up @@ -25,7 +25,7 @@ jobs:
runs-on: ubuntu-latest
steps:
- name: Harden Runner
uses: step-security/harden-runner@91182cccc01eb5e619899d80e4e971d6181294a7 # v2.10.1
uses: step-security/harden-runner@0080882f6c36860b6ba35c610c98ce87d4e2f26f # v2.10.2
with:
egress-policy: audit

Expand Down
2 changes: 1 addition & 1 deletion .github/workflows/validate-recommendations.yml
Original file line number Diff line number Diff line change
Expand Up @@ -17,7 +17,7 @@ jobs:
runs-on: ubuntu-latest
steps:
- name: Harden Runner
uses: step-security/harden-runner@91182cccc01eb5e619899d80e4e971d6181294a7 # v2.10.1
uses: step-security/harden-runner@0080882f6c36860b6ba35c610c98ce87d4e2f26f # v2.10.2
with:
egress-policy: audit

Expand Down
16 changes: 8 additions & 8 deletions azure-resources/Cdn/profiles/recommendations.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -63,7 +63,7 @@
recommendationControl: Security
recommendationImpact: High
recommendationResourceType: Microsoft.Cdn/profiles
recommendationMetadataState: Active
recommendationMetadataState: Disabled
longDescription: |
Front Door terminates TCP and TLS connections from clients and establishes new connections from each PoP to the origin. Securing these connections with TLS, even for Azure-hosted origins, ensures data is always encrypted during transit.
potentialBenefits: Ensures data encryption in transit
Expand All @@ -80,7 +80,7 @@
recommendationControl: Security
recommendationImpact: High
recommendationResourceType: Microsoft.Cdn/profiles
recommendationMetadataState: Active
recommendationMetadataState: Disabled
longDescription: |
Using HTTPS is ideal for secure connections. However, for compatibility with older clients, HTTP requests may be necessary. Azure Front Door enables auto redirection of HTTP to HTTPS, enhancing security without sacrificing accessibility.
potentialBenefits: Enhances security and compliance
Expand All @@ -97,7 +97,7 @@
recommendationControl: Security
recommendationImpact: High
recommendationResourceType: Microsoft.Cdn/profiles
recommendationMetadataState: Active
recommendationMetadataState: Disabled
longDescription: |
When Front Door manages your TLS certificates, it reduces your operational costs and helps you to avoid costly outages caused by forgetting to renew a certificate. Front Door automatically issues and rotates the managed TLS certificates.
potentialBenefits: Lowers costs, avoids outages
Expand All @@ -114,7 +114,7 @@
recommendationControl: HighAvailability
recommendationImpact: Medium
recommendationResourceType: Microsoft.Cdn/profiles
recommendationMetadataState: Active
recommendationMetadataState: Disabled
longDescription: |
If you use your own TLS certificates, set the Key Vault certificate version to 'Latest' to avoid reconfiguring Azure Front Door for new certificate versions and waiting for deployment across Front Door's environments.
potentialBenefits: Saves time and automates TLS updates
Expand All @@ -131,7 +131,7 @@
recommendationControl: Governance
recommendationImpact: Medium
recommendationResourceType: Microsoft.Cdn/profiles
recommendationMetadataState: Active
recommendationMetadataState: Disabled
longDescription: |
Front Door can rewrite Host headers for custom domain names routing to a single origin, useful for avoiding custom domain configuration at both Front Door and the origin.
potentialBenefits: Improves session/auth handling
Expand All @@ -148,7 +148,7 @@
recommendationControl: Security
recommendationImpact: Medium
recommendationResourceType: Microsoft.Cdn/profiles
recommendationMetadataState: Active
recommendationMetadataState: Disabled
longDescription: |
For internet-facing applications, enabling the Front Door web application firewall (WAF) and configuring it to use managed rules is recommended for protection against a wide range of attacks using Microsoft-managed rules.
potentialBenefits: Enhances web app security
Expand Down Expand Up @@ -216,7 +216,7 @@
recommendationControl: Security
recommendationImpact: Medium
recommendationResourceType: Microsoft.Cdn/profiles
recommendationMetadataState: Active
recommendationMetadataState: Disabled
longDescription: |
Azure Front Door's geo-filtering through WAF enables defining custom access rules by country/region to restrict or allow web app access.
potentialBenefits: Enhanced regional access control
Expand All @@ -233,7 +233,7 @@
recommendationControl: Security
recommendationImpact: Medium
recommendationResourceType: Microsoft.Cdn/profiles
recommendationMetadataState: Active
recommendationMetadataState: Disabled
longDescription: |
Azure Private Link enables secure access to Azure PaaS and services over a private endpoint in your virtual network, ensuring traffic goes over the Microsoft backbone network, not the public internet.
potentialBenefits: Enhanced security and private connectivity
Expand Down
2 changes: 1 addition & 1 deletion azure-resources/Compute/galleries/recommendations.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -40,7 +40,7 @@
recommendationControl: HighAvailability
recommendationImpact: Low
recommendationResourceType: Microsoft.Compute/galleries
recommendationMetadataState: Active
recommendationMetadataState: Disabled
longDescription: |
We recommend creating Trusted Launch Supported Images for benefits like Secure Boot, vTPM, trusted launch VMs, large boot volume. These are Gen 2 Images by default and you cannot change a VM's generation after creation, so review the considerations first.
potentialBenefits: Enhances VM security and features
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -129,7 +129,7 @@
recommendationControl: OtherBestPractices
recommendationImpact: Low
recommendationResourceType: Microsoft.Compute/virtualMachineScaleSets
recommendationMetadataState: Active
recommendationMetadataState: Disabled
longDescription: |
Enabling automatic VM guest patching eases update management by safely, automatically patching virtual machines to maintain security compliance, while limiting blast radius of VMs. Note, the KQL will not return sets using Uniform orchestration.
potentialBenefits: Eases patch management, enhances security
Expand Down
18 changes: 9 additions & 9 deletions azure-resources/Compute/virtualMachines/recommendations.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -97,7 +97,7 @@
recommendationControl: Scalability
recommendationImpact: Low
recommendationResourceType: Microsoft.Compute/virtualMachines
recommendationMetadataState: Active
recommendationMetadataState: Disabled
longDescription: |
A data disk is a managed disk attached to a virtual machine for storing database or other essential data. These disks are SCSI drives labeled as per choice.
potentialBenefits: Enhances performance, recovery, migration flexibility
Expand Down Expand Up @@ -133,7 +133,7 @@
recommendationControl: Governance
recommendationImpact: Low
recommendationResourceType: Microsoft.Compute/virtualMachines
recommendationMetadataState: Active
recommendationMetadataState: Disabled
longDescription: |
Azure Virtual Machines (VM) instances have various states, like provisioning and power states. A non-running VM may indicate issues or it being unnecessary, suggesting removal could help cut costs.
potentialBenefits: Reduce costs by removing unused VMs
Expand Down Expand Up @@ -184,7 +184,7 @@
recommendationControl: Security
recommendationImpact: Medium
recommendationResourceType: Microsoft.Compute/virtualMachines
recommendationMetadataState: Active
recommendationMetadataState: Disabled
longDescription: |
For outbound internet connectivity of Virtual Machines, using NAT Gateway or Azure Firewall is recommended to enhance security and service resilience, thanks to their higher availability and SNAT ports.
potentialBenefits: Enhanced security and service resiliency
Expand All @@ -201,7 +201,7 @@
recommendationControl: Security
recommendationImpact: Low
recommendationResourceType: Microsoft.Compute/virtualMachines
recommendationMetadataState: Active
recommendationMetadataState: Disabled
longDescription: |
Unless you have a specific reason, it's advised to associate a network security group to a subnet or a network interface, but not both, to avoid unexpected communication issues and troubleshooting due to potential rule conflicts between the two associations.
potentialBenefits: Reduces communication problems
Expand Down Expand Up @@ -235,7 +235,7 @@
recommendationControl: OtherBestPractices
recommendationImpact: Low
recommendationResourceType: Microsoft.Compute/virtualMachines
recommendationMetadataState: Active
recommendationMetadataState: Disabled
longDescription: |
Configure the DNS Server at the Virtual Network level to prevent any inconsistency across the environment.
potentialBenefits: Ensures DNS consistency
Expand All @@ -252,7 +252,7 @@
recommendationControl: Security
recommendationImpact: Low
recommendationResourceType: Microsoft.Compute/virtualMachines
recommendationMetadataState: Active
recommendationMetadataState: Disabled
longDescription: |
Recommended changing to "Disable public access and enable private access" and creating a Private Endpoint to improve security by restricting direct public access and ensuring connections are made privately, enhancing data protection and minimizing potential external threats.
potentialBenefits: Enhances VM security and privacy
Expand All @@ -269,7 +269,7 @@
recommendationControl: Governance
recommendationImpact: Low
recommendationResourceType: Microsoft.Compute/virtualMachines
recommendationMetadataState: Active
recommendationMetadataState: Disabled
longDescription: |
Keeping your virtual machine (VM) secure is crucial for the applications you run. This involves using various Azure services and features to ensure secure access to your VMs and the secure storage of your data, aiming for overall security of your VM and applications.
potentialBenefits: Secure VMs and applications
Expand All @@ -288,7 +288,7 @@
recommendationControl: Security
recommendationImpact: High
recommendationResourceType: Microsoft.Compute/virtualMachines
recommendationMetadataState: Active
recommendationMetadataState: Disabled
longDescription: |
Consider enabling Azure Disk Encryption (ADE) for encrypting Azure VM disks using DM-Crypt (Linux) or BitLocker (Windows). Additionally, consider Encryption at host and Confidential disk encryption for enhanced data security.
potentialBenefits: Enhances data security and integrity
Expand Down Expand Up @@ -449,7 +449,7 @@
recommendationControl: HighAvailability
recommendationImpact: Medium
recommendationResourceType: Microsoft.Compute/virtualMachines
recommendationMetadataState: Active
recommendationMetadataState: Disabled
longDescription: |
If you've installed the Azure Linux Agent or are using an endorsed distribution image, ensure your agent version is up-to-date. Some Linux distributions may disable auto-update or use older agent versions.
potentialBenefits: Reduces complications with VM provisioning
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -93,7 +93,7 @@
recommendationControl: Scalability
recommendationImpact: High
recommendationResourceType: Microsoft.DocumentDB/databaseAccounts
recommendationMetadataState: Active
recommendationMetadataState: Disabled
longDescription: |
Cosmos DB has a 4 MB response limit, leading to paginated results for large or partition-spanning queries. Each page shows availability and provides a continuation token for the next. A while loop in code is necessary to traverse all pages until completion.
potentialBenefits: Maximizes data retrieval efficiency
Expand All @@ -110,7 +110,7 @@
recommendationControl: Scalability
recommendationImpact: Medium
recommendationResourceType: Microsoft.DocumentDB/databaseAccounts
recommendationMetadataState: Active
recommendationMetadataState: Disabled
longDescription: |
Using a single instance of the SDK client for each account and application is crucial as connections are tied to the client. Compute environments have a limit on open connections, affecting connectivity when exceeded.
potentialBenefits: Optimizes connections and efficiency
Expand All @@ -127,7 +127,7 @@
recommendationControl: HighAvailability
recommendationImpact: Medium
recommendationResourceType: Microsoft.DocumentDB/databaseAccounts
recommendationMetadataState: Active
recommendationMetadataState: Disabled
longDescription: |
Cosmos DB SDKs automatically manage many transient errors through retries. Despite this, it's crucial for applications to implement additional retry policies targeting specific cases that the SDKs can't generically address, ensuring more robust error handling.
potentialBenefits: Enhances error handling resilience
Expand Down
4 changes: 2 additions & 2 deletions azure-resources/KeyVault/vaults/recommendations.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -38,7 +38,7 @@
recommendationControl: Security
recommendationImpact: Medium
recommendationResourceType: Microsoft.KeyVault/vaults
recommendationMetadataState: Active
recommendationMetadataState: Disabled
longDescription: |
Azure Private Link Service lets you securely and privately connect to Azure Key Vault via a Private Endpoint in your VNet, using a private IP and eliminating public Internet exposure.
potentialBenefits: Secure Key Vault with Private Link
Expand All @@ -55,7 +55,7 @@
recommendationControl: Governance
recommendationImpact: High
recommendationResourceType: Microsoft.KeyVault/vaults
recommendationMetadataState: Active
recommendationMetadataState: Disabled
longDescription: |
Key vaults are security boundaries for secret storage. Grouping secrets together increases risk during a security event, as attacks could access multiple secrets.
potentialBenefits: Enhanced security, Reduced risk
Expand Down
6 changes: 3 additions & 3 deletions azure-resources/NetApp/netAppAccounts/recommendations.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@
recommendationControl: Scalability
recommendationImpact: Medium
recommendationResourceType: Microsoft.NetApp/netAppAccounts
recommendationMetadataState: Active
recommendationMetadataState: Disabled
longDescription: |
Service levels, part of capacity pool attributes, determine the maximum throughput per volume quota in Azure NetApp Files. It combines read and write speed, offering three levels: Standard (16 MiB/s per 1TiB), Premium (64 MiB/s per 1TiB), and Ultra (128 MiB/s per 1TiB) throughput.
potentialBenefits: Optimized performance and cost efficiency
Expand Down Expand Up @@ -157,7 +157,7 @@
recommendationControl: Governance
recommendationImpact: Medium
recommendationResourceType: Microsoft.NetApp/netAppAccounts
recommendationMetadataState: Active
recommendationMetadataState: Disabled
longDescription: |
Azure NetApp Files supports Azure policy integration using either built-in policy definitions or by creating custom ones to maintain organizational standards and compliance.
potentialBenefits: Enforce standards and assess compliance
Expand All @@ -176,7 +176,7 @@
recommendationControl: Security
recommendationImpact: Medium
recommendationResourceType: Microsoft.NetApp/netAppAccounts
recommendationMetadataState: Active
recommendationMetadataState: Disabled
longDescription: |
Access to the delegated subnet should be limited to specific Azure Virtual Networks. SMB-enabled volumes' share permissions should move away from 'Everyone/Full control'. NFS-enabled volumes' access needs to be controlled via export policies and/or NFSv4.1 ACLs.
potentialBenefits: Enhanced security, Reduced data breach risk
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -21,7 +21,7 @@
recommendationControl: Security
recommendationImpact: High
recommendationResourceType: Microsoft.Network/applicationGateways
recommendationMetadataState: Active
recommendationMetadataState: Disabled
longDescription: |
Secure all incoming connections using HTTPS for production services with end-to-end SSL/TLS or SSL/TLS termination at the Application Gateway to protect against attacks and ensure data remains private and encrypted between the web server and browsers.
potentialBenefits: Enhanced security and privacy
Expand All @@ -46,7 +46,7 @@
recommendationControl: Security
recommendationImpact: Low
recommendationResourceType: Microsoft.Network/applicationGateways
recommendationMetadataState: Active
recommendationMetadataState: Disabled
longDescription: |
Use Application Gateway with Web Application Firewall (WAF) in an application virtual network to safeguard inbound HTTP/S internet traffic. WAF offers centralized defense against potential exploits through OWASP core rule sets-based rules.
potentialBenefits: Enhanced security for HTTP/S traffic
Expand Down
Loading

0 comments on commit cbdbac8

Please sign in to comment.