azure-policy
azure-policy copied to clipboard
Azure Kubernetes Clusters should enable Key Management Service (KMS): evaluates incorrectly for clusters with system-assigned managed identity
Details of the scenario you tried and the problem that is occurring
The policy categorizes AKS clusters with system-assigned managed identity as compliant, even when KMS is not enabled.
Verbose logs showing the problem
N/A
Suggested solution to the issue
Remove the following condition from the policy rule:
{
"field": "identity.type",
"notEquals": "SystemAssigned"
}
If policy is Guest Configuration - details about target node
N/A