You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Azure allows you to show the Policy Definitions on a subscription Policy Definitions
I would like to be able to interrogate these from InSpec
Context
To check that the Policy Definitions for both built in and custom ones are set up correctly.
This allows InSpec to check that the Policy Definitions are not drifting and report them for remediation if they do.
I would like to check if the Policy is set to deny for example.
I have two customers that would like to make use of this resource (one potential and another in flight).
Possible Implementation
inspec>` describe azure_built_in_policy_definition(name: 'rg-owner-tag', built_in: false) do
inspec> it {should exist}
inspec> end
add: true
Profile: inspec-shell
Version: (not specified)
Azure Built In Policy Definition - api_version: 2019-09-01 latest: /subscriptions/1e0b427a-d58b-494e-ae4f-ee558463ebbf/providers/Microsoft.Authorization/policyDefinitions/rg-owner-tag
✔ is expected to exist
Test Summary: 1 successful, 0 failures, 0 skipped
The text was updated successfully, but these errors were encountered:
Detailed Description
Azure allows you to show the Policy Definitions on a subscription
Policy Definitions
I would like to be able to interrogate these from InSpec
Context
To check that the Policy Definitions for both built in and custom ones are set up correctly.
This allows InSpec to check that the Policy Definitions are not drifting and report them for remediation if they do.
I would like to check if the Policy is set to
deny
for example.I have two customers that would like to make use of this resource (one potential and another in flight).
Possible Implementation
The text was updated successfully, but these errors were encountered: