-
Notifications
You must be signed in to change notification settings - Fork 581
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Added a new section to the deployments docs #1462
base: main
Are you sure you want to change the base?
Added a new section to the deployments docs #1462
Conversation
…ymize data when using OpenAI
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
checkov found more than 20 potential problems in the proposed changes. Check the Files changed tab for more details.
@@ -0,0 +1,57 @@ | |||
targetScope = 'resourceGroup' |
Check failure
Code scanning / templateanalyzer
Cleanup Redis cache firewall rules. Error documentation
If no firewall rules are set and public access is not disabled, then all IP addresses are allowed to access the cache. By default, the cache is configured to allow access from all IP addresses.
Consider using private endpoints to limit access to the cache. If this is not possible, use firewall rules to limit access to the cache. However, avoid using overly permissive firewall rules that are: Not needed. Too broad. Too many.
@@ -0,0 +1,57 @@ | |||
targetScope = 'resourceGroup' |
Check failure
Code scanning / templateanalyzer
Limit Redis cache number of IP addresses. Error documentation
If no firewall rules are set and public access is not disabled, then all IP addresses are allowed to access the cache. By default, the cache is configured to allow access from all IP addresses.
Consider using private endpoints to limit access to the cache. If this is not possible, use firewall rules to limit access to the cache. However, avoid using overly permissive firewall rules that are: Not needed. Too broad. Too many.
identity: { | ||
type: 'SystemAssigned' | ||
} | ||
properties: { |
Check failure
Code scanning / templateanalyzer
Authorized IP ranges should be defined on Kubernetes Services. Error documentation
identity: { | ||
type: 'SystemAssigned' | ||
} | ||
properties: { |
Check failure
Code scanning / templateanalyzer
RBAC should be used on Kubernetes Services. Error documentation
identity: { | ||
type: 'SystemAssigned' | ||
} | ||
properties: { |
Check failure
Code scanning / templateanalyzer
Kubernetes Services should be upgraded to a non-vulnerable Kubernetes version. Error documentation
identity: { | ||
type: 'SystemAssigned' | ||
} | ||
properties: { |
Check failure
Code scanning / templateanalyzer
Enable Defender profile. Error documentation
These components are installed when the Defender profile is enabled on the cluster.
The Defender profile deployed to each node provides the runtime protections and collects signals from nodes.
resource redisCache 'Microsoft.Cache/Redis@2023-08-01' = { | ||
name: redisCacheName | ||
location: location | ||
properties: { |
Check failure
Code scanning / templateanalyzer
Redis Cache minimum TLS version. Error documentation
Azure lets you disable outdated protocols and require connections to use a minimum of TLS 1.2. By default, TLS 1.0, TLS 1.1, and TLS 1.2 is accepted.
resource redisCache 'Microsoft.Cache/Redis@2023-08-01' = { | ||
name: redisCacheName | ||
location: location | ||
properties: { |
Check failure
Code scanning / templateanalyzer
Use private endpoints with Azure Cache for Redis. Error documentation
To limit network access to the cache you can use firewall rules or private endpoints. Using private endpoints with Azure Cache for Redis is the recommend approach for most scenarios.
Use private endpoints to improve the security posture of your Redis cache and reduce the risk of data breaches.
A private endpoint provides secure and private connectivity to Redis instances by: Using a private IP address from your VNET. Blocking all traffic from public networks. If you are using VNET injection, it is recommended to migrate to private endpoints.
resource redisCache 'Microsoft.Cache/Redis@2023-08-01' = { | ||
name: redisCacheName | ||
location: location | ||
properties: { |
Check failure
Code scanning / templateanalyzer
Redis Cache minimum TLS version. Error documentation
Azure lets you disable outdated protocols and require connections to use a minimum of TLS 1.2. By default, TLS 1.0, TLS 1.1, and TLS 1.2 is accepted.
resource redisCache 'Microsoft.Cache/Redis@2023-08-01' = { | ||
name: redisCacheName | ||
location: location | ||
properties: { |
Check failure
Code scanning / templateanalyzer
Use private endpoints with Azure Cache for Redis. Error documentation
To limit network access to the cache you can use firewall rules or private endpoints. Using private endpoints with Azure Cache for Redis is the recommend approach for most scenarios.
Use private endpoints to improve the security posture of your Redis cache and reduce the risk of data breaches.
A private endpoint provides secure and private connectivity to Redis instances by: Using a private IP address from your VNET. Blocking all traffic from public networks. If you are using VNET injection, it is recommended to migrate to private endpoints.
/azp run |
Azure Pipelines successfully started running 1 pipeline(s). |
And best practices to de-anonymize data when using OpenAI
Created a new README
And few subfolders with code samples of how to implement the solution.