module/ConfigurationProvider/ControlConfigurations/Services/ActionGroups.json
{
"FeatureName": "ActionGroups", "Reference": "", "IsMaintenanceMode": false, "Controls": [ { "ControlID": "Azure_ActionGroups_DP_Avoid_Plaintext_Secrets_Trial", "Description": "[Trial] ActionGroups must not have secrets/credentials present in plain text", "Id": "ActionGroups10", "ControlSeverity": "High", "Automated": "Yes", "MethodName": "AvoidPlaintextSecretsAsync", "DisplayName": "[Trial] ActionGroups must not have secrets/credentials present in plain text", "Category": "Credentials Access", "ControlRequirements": "Eliminating plain text credentials", "Rationale": "Keeping secrets/credentials such as DB connection strings, passwords, keys, etc. in plain text can lead to exposure at various avenues during an application's lifecycle. Storing them in a key vault ensures that they are protected at rest.", "Recommendation": "Find detected secrets/credentials using the API information available in Source, rotate those credentials and remove them. Use KeyVault to store secrets/credentials.", "Tags": [ "Automated", "DP", "Baseline", "ActionGroups" ], "Enabled": true, "CustomTags": [ "Daily", "Trial", "Secrets" ] } ] } |