Update LAB_02b-Manage_Governance_via_Azure_Policy.md

This commit is contained in:
staleycyn 2024-05-10 07:26:33 -07:00 committed by GitHub
parent 355b80633e
commit 07d54f83b6
No known key found for this signature in database
GPG Key ID: B5690EEEBB952194

View File

@ -248,7 +248,7 @@ Copilot can assist you in learning how to use the Azure scripting tools. Copilot
## Learn more with self-paced training
+ [Design an enterprise governance strategy](https://learn.microsoft.com/training/modules/enterprise-governance/). Use RBAC and Azure Policy to limit access to your Azure solutions, and determine which method is right for your security goals.
## Key takeaways
Congratulations on completing the lab. Here are the main takeaways for this lab.
@ -257,4 +257,5 @@ Congratulations on completing the lab. Here are the main takeaways for this lab.
+ Azure Policy establishes conventions for resources. Policy definitions describe resource compliance conditions and the effect to take if a condition is met. A condition compares a resource property field or a value to a required value. There are many built-in policy definitions and you can customize the policies.
+ The Azure Policy remediation task feature is used to bring resources into compliance based on a definition and assignment. Resources that are non-compliant to a modify or deployIfNotExist definition assignment, can be brought into compliance using a remediation task.
+ You can configure a resource lock on a subscription, resource group, or resource. The lock can protect a resource from accidental user deletions and modifications. The lock overrides any user permissions.
+ Azure Policy is pre-deployment security practice. RBAC and resource locks are post-deployment security practice.
+ Azure Policy is pre-deployment security practice. RBAC and resource locks are post-deployment security practice.