Skip to content
This repository was archived by the owner on Jan 30, 2025. It is now read-only.

Commit 0fa01e8

Browse files
authored
Updated documents, from docs.microsoft.com - to Learn. (Azure#350)
Updated documents, from docs.microsoft.com - to Learn.
1 parent e44c7ea commit 0fa01e8

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

56 files changed

+398
-398
lines changed

README.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -2,14 +2,14 @@
22

33
## Introduction
44

5-
The purpose of the reference implementation is to guide Canadian Public Sector customers on building Landing Zones in their Azure environment. The reference implementation is based on [Cloud Adoption Framework for Azure](https://docs.microsoft.com/azure/cloud-adoption-framework/ready/landing-zone/) and provides an opinionated implementation that enables ITSG-33 regulatory compliance by using [NIST SP 800-53 Rev. 4](https://docs.microsoft.com/azure/governance/policy/samples/nist-sp-800-53-r4) and [Canada Federal PBMM](https://docs.microsoft.com/azure/governance/policy/samples/canada-federal-pbmm) Regulatory Compliance Policy Sets.
5+
The purpose of the reference implementation is to guide Canadian Public Sector customers on building Landing Zones in their Azure environment. The reference implementation is based on [Cloud Adoption Framework for Azure](https://learn.microsoft.com/azure/cloud-adoption-framework/ready/landing-zone/) and provides an opinionated implementation that enables ITSG-33 regulatory compliance by using [NIST SP 800-53 Rev. 4](https://learn.microsoft.com/azure/governance/policy/samples/nist-sp-800-53-r4) and [Canada Federal PBMM](https://learn.microsoft.com/azure/governance/policy/samples/canada-federal-pbmm) Regulatory Compliance Policy Sets.
66

77
Architecture supported up to Treasury Board of Canada Secretariat (TBS) Cloud Profile 3 - Cloud Only Applications. This profile is applicable to Infrastructure as a Service (IaaS) and Platform as a Service (PaaS) with [characteristics](https://github.com/canada-ca/cloud-guardrails/blob/master/EN/00_Applicable-Scope.md):
88

99
* Cloud-based services hosting sensitive (up to Protected B) information
1010
* No direct system to system network interconnections required with GC data centers
1111

12-
> This implementation is specific to **Canadian Public Sector departments**. Please see [Implement Cloud Adoption Framework enterprise-scale landing zones in Azure](https://docs.microsoft.com/azure/cloud-adoption-framework/ready/enterprise-scale/implementation) if you are looking for implementation for other industries or customers.
12+
> This implementation is specific to **Canadian Public Sector departments**. Please see [Implement Cloud Adoption Framework enterprise-scale landing zones in Azure](https://learn.microsoft.com/azure/cloud-adoption-framework/ready/enterprise-scale/implementation) if you are looking for implementation for other industries or customers.
1313
1414
## Architecture
1515

@@ -54,7 +54,7 @@ multiple types of workloads including App Dev and Data & AI.
5454

5555
* Automatic approval for Canada Federal PBMM nor Authority to Operate (ATO). Customers must collect evidence, customize to meet their departmental requirements and submit for Authority to Operate based on their risk profile, requirements and process.
5656

57-
* Compliant on all Azure Policies when the reference implementation is deployed. This is due to the shared responsibility of cloud and customers can choose the Azure Policies to exclude. For example, using Azure Firewall is an Azure Policy that will be non-compliant since majority of the Public Sector customers use Network Virtual Appliances such as Fortinet. Customers must review [Microsoft Defender for Cloud Regulatory Compliance dashboard](https://docs.microsoft.com/azure/defender-for-cloud/update-regulatory-compliance-packages) and apply appropriate exemptions.
57+
* Compliant on all Azure Policies when the reference implementation is deployed. This is due to the shared responsibility of cloud and customers can choose the Azure Policies to exclude. For example, using Azure Firewall is an Azure Policy that will be non-compliant since majority of the Public Sector customers use Network Virtual Appliances such as Fortinet. Customers must review [Microsoft Defender for Cloud Regulatory Compliance dashboard](https://learn.microsoft.com/azure/defender-for-cloud/update-regulatory-compliance-packages) and apply appropriate exemptions.
5858

5959
## Contributing
6060

@@ -64,7 +64,7 @@ See [Contributing Reference Implementation](CONTRIBUTING.md) for information on
6464

6565
**November 11, 2021 onward**
6666

67-
> Microsoft can identify the deployments of the Azure Resource Manager and Bicep templates with the deployed Azure resources. Microsoft can correlate these resources used to support the deployments. Microsoft collects this information to provide the best experiences with their products and to operate their business. The telemetry is collected through [customer usage attribution](https://docs.microsoft.com/azure/marketplace/azure-partner-customer-usage-attribution). The data is collected and governed by Microsoft's privacy policies, located at [https://www.microsoft.com/trustcenter](https://www.microsoft.com/trustcenter).
67+
> Microsoft can identify the deployments of the Azure Resource Manager and Bicep templates with the deployed Azure resources. Microsoft can correlate these resources used to support the deployments. Microsoft collects this information to provide the best experiences with their products and to operate their business. The telemetry is collected through [customer usage attribution](https://learn.microsoft.com/azure/marketplace/azure-partner-customer-usage-attribution). The data is collected and governed by Microsoft's privacy policies, located at [https://www.microsoft.com/trustcenter](https://www.microsoft.com/trustcenter).
6868
>
6969
> If you don't wish to send usage data to Microsoft, you can set the `customerUsageAttribution.enabled` setting to `false` in `config/telemetry.json`. Learn more in our [Azure DevOps Pipelines](docs/onboarding/azure-devops-pipelines.md#telemetry) onboarding guide.
7070
>

SECURITY.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@
44

55
Microsoft takes the security of our software products and services seriously, which includes all source code repositories managed through our GitHub organizations, which include [Microsoft](https://github.com/Microsoft), [Azure](https://github.com/Azure), [DotNet](https://github.com/dotnet), [AspNet](https://github.com/aspnet), [Xamarin](https://github.com/xamarin), and [our GitHub organizations](https://opensource.microsoft.com/).
66

7-
If you believe you have found a security vulnerability in any Microsoft-owned repository that meets [Microsoft's definition of a security vulnerability](https://docs.microsoft.com/en-us/previous-versions/tn-archive/cc751383(v=technet.10)), please report it to us as described below.
7+
If you believe you have found a security vulnerability in any Microsoft-owned repository that meets [Microsoft's definition of a security vulnerability](https://learn.microsoft.com/en-us/previous-versions/tn-archive/cc751383(v=technet.10)), please report it to us as described below.
88

99
## Reporting Security Issues
1010

azresources/compute/web/appservice-linux-container.bicep

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -56,7 +56,7 @@ resource app 'Microsoft.Web/sites@2021-02-01' = {
5656
clientAffinityEnabled: true
5757
siteConfig: {
5858
// for Linux Apps Azure DNS private zones only works if Route All is enabled.
59-
// https://docs.microsoft.com/azure/app-service/web-sites-integrate-with-vnet#azure-dns-private-zones
59+
// https://learn.microsoft.com/azure/app-service/web-sites-integrate-with-vnet#azure-dns-private-zones
6060
linuxFxVersion: 'DOCKER|mcr.microsoft.com/appsvc/staticsite:latest'
6161
vnetRouteAllEnabled: true
6262
use32BitWorkerProcess: false

azresources/compute/web/appservice-linux.bicep

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -58,7 +58,7 @@ resource app 'Microsoft.Web/sites@2020-06-01' = {
5858
clientAffinityEnabled: true
5959
siteConfig: {
6060
// for Linux Apps Azure DNS private zones only works if Route All is enabled.
61-
// https://docs.microsoft.com/azure/app-service/web-sites-integrate-with-vnet#azure-dns-private-zones
61+
// https://learn.microsoft.com/azure/app-service/web-sites-integrate-with-vnet#azure-dns-private-zones
6262
vnetRouteAllEnabled: true
6363

6464
linuxFxVersion: stack

azresources/containers/acr/acr-with-cmk.bicep

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -66,7 +66,7 @@ param tempKeyVaultName string = 'tmpkv${uniqueString(utcNow())}'
6666

6767
/*
6868
Create a temporary key vault and key to setup CMK. These will be deleted at the end of deployment using deployment script.
69-
See: https://docs.microsoft.com/en-us/azure/container-registry/container-registry-customer-managed-keys#advanced-scenario-key-vault-firewall
69+
See: https://learn.microsoft.com/en-us/azure/container-registry/container-registry-customer-managed-keys#advanced-scenario-key-vault-firewall
7070
*/
7171
module tempAkv '../../security/key-vault.bicep' = {
7272
name: 'deploy-keyvault-temp'

azresources/containers/aks/main.bicep

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -118,7 +118,7 @@ module identity '../../iam/user-assigned-identity.bicep' = {
118118
}
119119
}
120120

121-
// assign permissions to identity per https://docs.microsoft.com/en-us/azure/aks/private-clusters#configure-private-dns-zone
121+
// assign permissions to identity per https://learn.microsoft.com/en-us/azure/aks/private-clusters#configure-private-dns-zone
122122
module rbacPrivateDnsZoneContributor '../../iam/resource/private-dns-zone-role-assignment-to-sp.bicep' = {
123123
name: 'rbac-private-dns-zone-contributor-${name}'
124124
scope: resourceGroup(privateDnsZoneSubscriptionId, privateZoneDnsResourceGroupName)

azresources/telemetry/customer-usage-attribution-management-group.bicep

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,4 +9,4 @@
99
targetScope = 'managementGroup'
1010

1111
// This is an empty deployment by design
12-
// Reference: https://docs.microsoft.com/azure/marketplace/azure-partner-customer-usage-attribution
12+
// Reference: https://learn.microsoft.com/azure/marketplace/azure-partner-customer-usage-attribution

azresources/telemetry/customer-usage-attribution-resource-group.bicep

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,4 +9,4 @@
99
targetScope = 'resourceGroup'
1010

1111
// This is an empty deployment by design
12-
// Reference: https://docs.microsoft.com/azure/marketplace/azure-partner-customer-usage-attribution
12+
// Reference: https://learn.microsoft.com/azure/marketplace/azure-partner-customer-usage-attribution

azresources/telemetry/customer-usage-attribution-subscription.bicep

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,4 +9,4 @@
99
targetScope = 'subscription'
1010

1111
// This is an empty deployment by design
12-
// Reference: https://docs.microsoft.com/azure/marketplace/azure-partner-customer-usage-attribution
12+
// Reference: https://learn.microsoft.com/azure/marketplace/azure-partner-customer-usage-attribution

azresources/telemetry/customer-usage-attribution-tenant.bicep

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,4 +9,4 @@
99
targetScope = 'tenant'
1010

1111
// This is an empty deployment by design
12-
// Reference: https://docs.microsoft.com/azure/marketplace/azure-partner-customer-usage-attribution
12+
// Reference: https://learn.microsoft.com/azure/marketplace/azure-partner-customer-usage-attribution

0 commit comments

Comments
 (0)