Skip to content

Latest commit

 

History

History
67 lines (52 loc) · 3.06 KB

File metadata and controls

67 lines (52 loc) · 3.06 KB

Enable Soft Delete and Purge Protection for Key Vault

This job enables Soft Delete and Purge Protection for the Azure Key Vault. The Retention period will be for 90 days.

NOTE - Enabling Soft Delete and Purge Protection is irreversible.

Applicable Rule

Rule ID:

e2090e34-3580-4088-a815-2ead6a72700f

Rule Name:

Key Vault should be recoverable

Getting Started

Prerequisites

The provided Azure service principal must have the following permissions: Microsoft.KeyVault/vaults/read, Microsoft.KeyVault/vaults/write

A sample role with requisite permissions can be found here

More information about already builtin roles and permissions can be found here

Running the script

You may run this script using following commands:

  pip install -r requirements.txt
  python3 azure_key_vault_is_recoverable.py

Running the tests

You may run test using following command under vss-remediation-worker-job-code-python directory:

    pip install -r requirements-dev.txt
    python3 -m pytest test

Deployment

Provision an instance by creating an Azure Virtual Machine to use for the worker. The minimum required specifications are 128 MB memory and 1/2 Core CPU. Setup Docker on newly provisioned Azure Virtual Machine instance.You can refer to the docs here for more information. Deploy the worker docker image by SSH into the Azure Virtual Machine instance and run the following commands:

docker run --rm -it --name {worker_name}\
-e VSS_CLIENT_ID={ENTER CLIENT ID}\
-e VSS_CLIENT_SECRET={ENTER CLIENT SECRET}\
-e AZURE_CLIENT_ID={ENTER AZURE_CLIENT_ID} \
-e AZURE_CLIENT_SECRET={ENTER AZURE_CLIENT_SECRET} \
-e AZURE_TENANT_ID={ENTER AZURE_TENANT_ID} \
vmware/vss-remediation-worker:latest-python

Contributing

The Secure State team welcomes contributions from the community. If you wish to contribute code and you have not signed our contributor license agreement (CLA), our bot will update the issue when you open a Pull Request. For any questions about the CLA process, please refer to our FAQ.

All contributions to this repository must be signed as described on that page. Your signature certifies that you wrote the patch or have the right to pass it on as an open-source patch.

For more detailed information, refer to CONTRIBUTING.md.

Versioning

We use SemVer for versioning. For the versions available, see the tags on this repository.

Authors

  • VMware Secure State - Initial work See also the list of contributors who participated in this project.

License

This project is licensed under the Apache License - see the LICENSE file for details