module/ConfigurationProvider/ControlConfigurations/Services/DataFactory.json
{
"FeatureName": "DataFactory", "Reference": "aka.ms/azsktcp/datafactory", "IsMaintenanceMode": false, "Controls": [ { "ControlID": "Azure_DataFactory_DP_Avoid_Plaintext_Secrets", "Description": "Data Factory must not have secrets/credentials present in plain text", "Id": "DataFactory10", "ControlSeverity": "High", "Automated": "Yes", "MethodName": "DataFactoryAvoidPlaintextSecrets", "DisplayName": "Data Factory must not have secrets/credentials present in plain text", "Category": "Credentials Access", "ControlRequirements": "Eliminating plain text credentials", "Rationale": "Keeping secrets/credentials such as DB connection strings, passwords, keys, etc. in plain text can lead to exposure at various avenues during an application's lifecycle. Storing them in a key vault ensures that they are protected at rest.", "Recommendation": "Find detected secrets/credentials using the information available in the UI, rotate those credentials and remove them. Use KeyVaults for storing secrets. (Store credentials in Azure Key Vault - Azure Data Factory | Microsoft Docs - https://docs.microsoft.com/en-us/azure/data-factory/store-credentials-in-key-vault; Use Azure Key Vault secrets in pipeline activities - Azure Data Factory | Microsoft Docs - https://docs.microsoft.com/en-us/azure/data-factory/how-to-use-azure-key-vault-secrets-pipeline-activities). Use SecureString parameter types for parameters with credentials.", "Tags": [ "SDL", "TCP", "Automated", "DP", "Baseline", "Daily" ], "CustomTags": [ "Wave9", "ShadowITActiveBaseline", "TenantBaseline", "Prod" ], "Enabled": true } ] } |