module/ConfigurationProvider/ControlConfigurations/Services/DataFactory.json

{
    "FeatureName": "DataFactory",
    "Reference": "aka.ms/azsktcp/datafactory",
    "IsMaintenanceMode": false,
    "Controls": [
        {
            "ControlID": "Azure_DataFactory_DP_Avoid_Plaintext_Secrets_Trial",
            "Description": "Data Factory must not have secrets/credentials present in plain text",
            "Id": "DataFactory10",
            "ControlSeverity": "High",
            "Automated": "Yes",
            "MethodName": "DataFactoryAvoidPlaintextSecrets",
            "DisplayName": "Data Factory must not have secrets/credentials present in plain text",
            "Category": "Credentials Access",
            "ControlRequirements": "Eliminating plain text credentials",
            "Rationale": "Keeping secrets/credentials such as DB connection strings, passwords, keys, etc. in plain text can lead to exposure at various avenues during an application's lifecycle. Storing them in a key vault ensures that they are protected at rest.",
            "Recommendation": "Find detected secrets/credentials using the API information available in Source, rotate those credentials and remove them. Use KeyVault to store secrets/credentials.",
            "Tags": [
              "SDL",
              "TCP",
              "Automated",
              "DP",
              "Baseline",
              "Daily",
              "Trial"
            ],
            "Enabled": true
        }
    ]
}