No description
  • HCL 80.3%
  • Makefile 19.7%
Find a file
Vidit Saxena 1565c0a7b4
Merge pull request #11 from hashicorp/compliance/update-headers
[IND-4227] [COMPLIANCE] Update Copyright Headers
2026-01-13 08:35:50 +05:30
.github Merge pull request #10 from hashicorp/compliance-template 2025-08-13 13:51:46 +10:00
docs/policies Update policy descriptions 2023-06-06 15:56:55 +12:00
example [COMPLIANCE] Update Copyright and License Headers 2025-12-09 11:18:22 +00:00
policies [COMPLIANCE] Update Copyright and License Headers 2025-12-09 11:18:22 +00:00
.gitignore Update gitignore 2023-06-06 15:57:13 +12:00
CONTRIBUTING.md Adds standard CI & contributing content (#2) 2022-08-05 10:09:21 -07:00
LICENSE [COMPLIANCE] Update Copyright and License Headers 2025-12-09 11:18:22 +00:00
Makefile Update policy descriptions 2023-06-06 15:56:55 +12:00
readme.md Update readme.md 2022-08-11 11:52:41 -07:00
sentinel.hcl [COMPLIANCE] Update Copyright and License Headers 2025-12-09 11:18:22 +00:00

Azure Storage Sentinel Policies for Terraform

This library, provides prescriptive Terraform policies that can be used to establish secure Terraform configuration for Microsoft Azure. The policies that are contained in this library are based on the CIS Microsoft Azure Foundations Security Benchmark. Terraform Cloud/Enterprise users can use the policies in this library to establish a foundational level of security for the services that they are adopting in Microsoft Azure.

NOTE:

This Policy Library is not an exhaustive list of all of possible security configurations and architecture that is available in Microsoft Azure. If you have questions, comments, or have identified ways for us to improve this library, please create a new GitHub issue.

Alternatively, We welcome any contributions that improve the quality of this library! To learn more about contributing and suggesting changes to this library, refer to the contributing guide.

Policies included

  • Ensure that 'Secure transfer required' is set to 'Enabled' (docs | code)
  • Ensure default network access rule for Storage Accounts is set to deny (docs | code)
  • Ensure 'Trusted Microsoft Services' is enabled for Storage Account access (docs | code)
  • Ensure that 'Public access level' is set to Private for blob containers (docs | code)
  • Ensure Storage logging is enabled for Queue service for read, write, and delete requests (docs | code)