This repository has been archived by the owner on Dec 1, 2022. It is now read-only.
-
Notifications
You must be signed in to change notification settings - Fork 7
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- Loading branch information
1 parent
bc491be
commit f4de35c
Showing
1 changed file
with
63 additions
and
0 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,63 @@ | ||
# Terraform AzureRM Policy Exemptions | ||
|
||
Leverges Terraform's [resource group template deployment](https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs/resources/resource_group_template_deployment) for managing [policy exemptions](https://docs.microsoft.com/en-us/azure/templates/microsoft.authorization/policyexemptions). | ||
|
||
Learn more about [Azure Policy Exemptions](https://docs.microsoft.com/en-us/azure/governance/policy/concepts/exemption-structure) | ||
|
||
# Example Usage | ||
|
||
* Create 3 policy exemptions with only 'exemption1' referencing select policies to be exempted (via policyDefinitionReferenceIds). | ||
|
||
```hcl | ||
module "policy_exemptions" { | ||
source = "../.." | ||
policyExemptions = { | ||
exemption1 = { | ||
deploymentMode = "Incremental" | ||
name = "exemption1" | ||
displayName = "exemption1 for Insert-Your-RG-Name1" | ||
description = "exemption1 waives compliance on an resource group" | ||
resourceGroupName = "Insert-Your-RG-Name1" | ||
policyAssignmentId = "/providers/Microsoft.Management/managementGroups/production/providers/Microsoft.Authorization/policyAssignments/2f97de7d41f348529e23d8ae" | ||
policyDefinitionReferenceIds = [ | ||
"installLogAnalyticsAgentOnVmMonitoring", | ||
"installLogAnalyticsAgentOnVmssMonitoring", | ||
"windowsDefenderExploitGuardMonitoring", | ||
"useRbacRulesMonitoring" | ||
] | ||
exemptionCategory = "Waiver" | ||
expiresOn = "2025-12-30" | ||
metadata = { | ||
"requestedBy" : "RG team", | ||
"approvedBy" : "DrGovernance", | ||
"approvedOn" : "2021-07-26", | ||
"ticketRef" : "123456" | ||
} | ||
}, | ||
exemption2 = { | ||
deploymentMode = "Incremental" | ||
name = "exemption2" | ||
displayName = "exemption2 for Insert-Your-RG-Name2" | ||
description = "exemption2 waives compliance on an resource group" | ||
resourceGroupName = "Insert-Your-RG-Name2" | ||
policyAssignmentId = "/providers/Microsoft.Management/managementGroups/production/providers/Microsoft.Authorization/policyAssignments/2f97de7d41f348529e23d8ae" | ||
policyDefinitionReferenceIds = [] | ||
exemptionCategory = "Mitigated" | ||
expiresOn = "2025-12-31" | ||
metadata = {} | ||
}, | ||
exemption3 = { | ||
deploymentMode = "Incremental" | ||
name = "exemption3" | ||
displayName = "exemption3 for Insert-Your-RG-Name3" | ||
description = "exemption3 waives compliance on an resource group" | ||
resourceGroupName = "Insert-Your-RG-Name3" | ||
policyAssignmentId = "/providers/Microsoft.Management/managementGroups/production/providers/Microsoft.Authorization/policyAssignments/2f97de7d41f348529e23d8ae" | ||
policyDefinitionReferenceIds = [] | ||
exemptionCategory = "Waiver" | ||
expiresOn = "2025-12-29" | ||
metadata = {} | ||
} | ||
} | ||
} | ||
``` |