Skip to content
This repository was archived by the owner on Jan 30, 2025. It is now read-only.

Commit 2e5a56b

Browse files
Fix formatting (Azure#218)
1 parent bf5e94b commit 2e5a56b

File tree

1 file changed

+43
-40
lines changed

1 file changed

+43
-40
lines changed

docs/onboarding/azure-devops-pipelines.md

Lines changed: 43 additions & 40 deletions
Original file line numberDiff line numberDiff line change
@@ -463,7 +463,7 @@ In order to configure audit stream for Azure Monitor, identify the following inf
463463

464464
## Step 6 - Configure Azure Policies
465465

466-
1. Pipeline definition for Azure Policies. Overview of Azure Policy and definitions deployed refer to [readme.md under `/docs/policy`](../../docs/policy/readme.md)
466+
1. Pipeline definition for Azure Policies.
467467

468468
*Note: Pipelines are stored as YAML definitions in Git and imported into Azure DevOps Pipelines. This approach allows for portability and change tracking.*
469469

@@ -476,47 +476,50 @@ In order to configure audit stream for Azure Monitor, identify the following inf
476476
7. Save the pipeline (don't run it yet)
477477
8. Rename the pipeline to `policy-ci`
478478

479-
2. By default, the pipeline will configure built-in policy assignments (i.e. PBMM, NIST 800-53 Rev 4, NIST 800-53 Rev 5, HIPAA, etc.) and custom policy assignments (i.e. Log Analytics, Defender for Cloud, Networking, Tag Governance, etc.). The assignments are scoped to the top management group (i.e. `pubsec`). These policy sets are documented in [Azure Policy for Guardrails](../policy) and you may choose to customize them for your Azure environment. To customize:
479+
2. By default, the pipeline will configure built-in policy assignments (i.e. `PBMM`, `NIST 800-53 Rev 4`, `NIST 800-53 Rev 5`, `HIPAA`, etc.) and custom policy assignments (i.e. `Log Analytics`, `Defender for Cloud`, `Networking`, `Tag Governance`, etc.). The assignments are scoped to the top management group (i.e. `pubsec`). These policy sets are documented in [Azure Policy for Guardrails](../policy) and you may choose to customize them for your Azure environment. To customize:
480480

481481
1. Edit [/.pipelines/policy.yml](../../.pipelines/policy.yml)
482-
2. Navigate to the `CustomPolicyJob` Job definition
483-
3. Navigate to the `Define Policy Set` Step definition and remove the policy definition name from the `deployTemplates` array parameter
484-
485-
```yaml
486-
- template: templates/steps/define-policyset.yml
487-
parameters:
488-
description: 'Define Policy Set'
489-
deployTemplates: [AKS, DefenderForCloud, LogAnalytics, Network, DNSPrivateEndpoints, Tags]
490-
deployOperation: ${{ variables['deployOperation'] }}
491-
workingDir: $(System.DefaultWorkingDirectory)/policy/custom/definitions/policyset
492-
493-
```
494-
495-
4. Navigate to the `Assign Policy Set` Step definition and remove the policy assignment name from the `deployTemplates` array parameter
496-
497-
```yaml
498-
- template: templates/steps/assign-policy.yml
499-
parameters:
500-
description: 'Assign Policy Set'
501-
deployTemplates: [AKS, DefenderForCloud, LogAnalytics, Network, Tags]
502-
deployOperation: ${{ variables['deployOperation'] }}
503-
policyAssignmentManagementGroupScope: $(var-topLevelManagementGroupName)
504-
workingDir: $(System.DefaultWorkingDirectory)/policy/custom/assignments
505-
```
506-
507-
5. Navigate to the `BuiltInPolicyJob` Job definition
508-
6. Navigate to the `Assign Policy Set` Step definition
509-
7. Remove the policy set assignment from the `deployTemplates` array parameter
510-
511-
```yaml
512-
- template: templates/steps/assign-policy.yml
513-
parameters:
514-
description: 'Assign Policy Set'
515-
deployTemplates: [asb, cis-msft-130, location, nist80053r4, nist80053r5, pbmm, hitrust-hipaa, fedramp-moderate]
516-
deployOperation: ${{ variables['deployOperation'] }}
517-
policyAssignmentManagementGroupScope: $(var-topLevelManagementGroupName)
518-
workingDir: $(System.DefaultWorkingDirectory)/policy/builtin/assignments
519-
```
482+
2. Update custom policy definitions & assignments
483+
1. Navigate to the `CustomPolicyJob` Job definition
484+
2. Navigate to the `Define Policy Set` Step definition and remove the policy definition name from the `deployTemplates` array parameter
485+
486+
```yaml
487+
- template: templates/steps/define-policyset.yml
488+
parameters:
489+
description: 'Define Policy Set'
490+
deployTemplates: [AKS, DefenderForCloud, LogAnalytics, Network, DNSPrivateEndpoints, Tags]
491+
deployOperation: ${{ variables['deployOperation'] }}
492+
workingDir: $(System.DefaultWorkingDirectory)/policy/custom/definitions/policyset
493+
494+
```
495+
496+
3. Navigate to the `Assign Policy Set` Step definition and remove the policy assignment name from the `deployTemplates` array parameter
497+
498+
```yaml
499+
- template: templates/steps/assign-policy.yml
500+
parameters:
501+
description: 'Assign Policy Set'
502+
deployTemplates: [AKS, DefenderForCloud, LogAnalytics, Network, Tags]
503+
deployOperation: ${{ variables['deployOperation'] }}
504+
policyAssignmentManagementGroupScope: $(var-topLevelManagementGroupName)
505+
workingDir: $(System.DefaultWorkingDirectory)/policy/custom/assignments
506+
```
507+
508+
3. Update built-in policy assignments
509+
510+
1. Navigate to the `BuiltInPolicyJob` Job definition
511+
2. Navigate to the `Assign Policy Set` Step definition
512+
3. Remove the policy set assignment from the `deployTemplates` array parameter
513+
514+
```yaml
515+
- template: templates/steps/assign-policy.yml
516+
parameters:
517+
description: 'Assign Policy Set'
518+
deployTemplates: [asb, cis-msft-130, location, nist80053r4, nist80053r5, pbmm, hitrust-hipaa, fedramp-moderate]
519+
deployOperation: ${{ variables['deployOperation'] }}
520+
policyAssignmentManagementGroupScope: $(var-topLevelManagementGroupName)
521+
workingDir: $(System.DefaultWorkingDirectory)/policy/builtin/assignments
522+
```
520523

521524
3. Commit the changes to git repository.
522525

0 commit comments

Comments
 (0)