PSRule.Rules.Azure icon indicating copy to clipboard operation
PSRule.Rules.Azure copied to clipboard

Rules to validate Azure resources and infrastructure as code (IaC) using PSRule.

Results 236 PSRule.Rules.Azure issues
Sort by recently updated
recently updated
newest added

# Rule request ## Suggested rule change By default when a Redis Cache is not VNET integrated access from an IP address is permitted. Network access to the cache should...

help wanted
good first issue
rule: redis

# Rule request ## Suggested rule change Policy assignments can configure a non-compliance message. The default non-compliance message should be set to provide a human readable reason for any denies...

help wanted
good first issue
rule: policy
pillar: operational-execellence

# Rule request ## Suggested rule change Deployments using an outer scope should not use any `secureObject` or `secureString` parameters. ## Applies to the following The rule applies to the...

help wanted
rule: deployment
integration: template-analyzer

# Rule request ## Suggested rule change Ensures that all properties within a template named adminUsername are expressions, not literal strings ## Applies to the following The rule applies to...

help wanted
rule: deployment
integration: template-analyzer

# Rule request ## Suggested rule change Check for custom script cases that might expose a secret. Ensures that all `commandsToExecute` are within `protectedSettings` if the command contains a secure...

help wanted
rule: deployment
integration: template-analyzer

# Rule request ## Suggested rule change Check for outputs that are likely to contain secure values such as `accountPassword`. ## Applies to the following The rule applies to the...

rule: deployment
integration: defender-for-devops
pillar: security

# Rule request ## Suggested rule change Check that parameters that are likely to contain secure values use `secureString` or `secureObject`. For example parameters called `adminPassword` or `accountKey`. ## Applies...

rule: deployment
integration: template-analyzer
pillar: security

Experimental support for strong typing of modules supports a `resourceType` metadata property on parameters and outputs. We currently provide similar support via `strongType` metadata but `resourceType` should be added. ##...

enhancement
feature: bicep-language

# Rule request ## Suggested rule change Azure Front Door, Application Gateway and Azure CDN support linking of WAF policies. We should ensure any WAF policy rules are added for...

rule: network
ms-hack-2022

In Azure Policy, we can have field expressions like `field('type')`. We should be able to expand these expressions when emitting JSON rules. Related to #181

bug
.NET
feature: policy-as-rules
long-term