Use Azure Policy to secure your Nexus resources
In this article, you'll learn how to use Azure Policy to secure and validate the compliance status of your Nexus resources.
Before you begin
If you're new to Azure Policy, here are some helpful resources that you can use to become more familiar with Azure Policy.
- Azure Policy documentation
- Interactive Learning Modules: Azure Policy training on Microsoft Learn
Understanding Policy Definitions and Assignments
- Policy Definitions: These are the rules that your resources need to comply with. They can be built-in or custom.
- Assignments: The process of applying a policy definition to your resources.
Steps for security enforcement
- Explore built-in policies: Review built-in policies relevant to Nexus Bare Metal Machine (BMM) resources.
- Customize policies: Customize policies to address specific needs of your resources.
- Policy assignment: Assign policies through the Azure portal, ensuring correct scope.
- Monitoring and compliance: Regularly monitor policy compliance using Azure tools.
- Troubleshooting: Address common issues that arise during policy assignment.
Visual Guides and Examples
- Step-by-Step Policy Assignment: Assigning policies in Azure portal
- Troubleshooting Guide: Common policy assignment issues
Prerequisites
One or more on-premises Nexus resources that are Arc-connected to Azure.
Note
Operator Nexus does not require you to install the Azure Policy add-on for the Undercloud Kubernetes connected cluster or BMM connected machine resources since the extensions are automatically installed during cluster deployment.
A user account in your subscription with the appropriate role:
- A Resource Policy Contributor or Owner can view, create, assign, and disable policies.
- A Contributor or Reader can view policies and policy assignments.
Preparation Checklist:
- Familiarize with Azure CLI or PowerShell for policy management.
- Review your organization's security and compliance requirements.
- Identify specific Azure Policy features relevant to your needs.
Use Azure Policy to secure your Nexus BMM resources
The Operator Nexus service offers a built-in policy definition that is recommended to be assigned to your Nexus BMM resources. This policy definition is called [Preview]: Nexus compute machines should meet security baseline. This policy definition is used to ensure that your Nexus BMM resources are configured with industry best practice security settings.
Use Azure Policy to secure your Nexus Kubernetes cluster
Operator Nexus Arc-connected Nexus Kubernetes do not yet have built-in policy definitions available. However, you can create custom policy definitions to meet your organization's security and compliance requirements or utilize built-in policy definitions for AKS clusters.
Customizing Policies for Nexus Kubernetes cluster
- Customize policies considering the unique aspects of Nexus Kubernetes clusters, such as network configurations and container security.
- Refer to Custom policy definitions for guidance.
Apply and validate Policies for Nexus resources
Whether you are securing Nexus BMM resources or Nexus Kubernetes clusters, the process of applying and validating policies is similar. Here's a generalized approach:
Identify Suitable Policies:
- For Nexus Bare Metal Machine resources, consider the recommended [Preview]: Nexus compute machines should meet security baseline policy.
- For Nexus Kubernetes clusters, explore built-in AKS policies or create custom policy definitions to meet specific security and compliance needs.
- Review Azure Policy Built-in definitions and Azure Policy for Kubernetes clusters for more insights.
Assign Policies:
- Utilize the Azure portal to assign these policies to your Nexus resources.
- Ensure the correct scope of assignment, which could be at the subscription, resource group, or individual resource level.
- For custom policies, follow the guidelines in Creating custom policy definitions.
Validate Policy Application:
- Post assignment, validate that the policies are correctly applied and are effectively monitoring compliance.
- Utilize Azure compliance tools and dashboards for ongoing monitoring and reporting.
- For detailed steps on validation, refer to Validating Azure Policy.
This approach ensures that all your Operator Nexus resources, regardless of their type, are secured and compliant with your organizational policies, utilizing the powerful capabilities of Azure Policy.
Feedback
https://aka.ms/ContentUserFeedback.
Coming soon: Throughout 2024 we will be phasing out GitHub Issues as the feedback mechanism for content and replacing it with a new feedback system. For more information see:Submit and view feedback for