module/ConfigurationProvider/ControlConfigurations/Services/ContainerInstance.json
{
"FeatureName": "ContainerInstance", "Reference": "aka.ms/azsktcp/ContainerInstance", "IsMaintenanceMode": false, "Controls": [ { "ControlID": "Azure_ContainerInstance_DP_Avoid_Plaintext_Secrets", "Description": "Container Instance must not have secrets/credentials present in plain text.", "Id": "ContainerInstance10", "ControlSeverity": "High", "Automated": "Yes", "MethodName": "ContainerInstanceAvoidPlaintextSecretsAsync", "DisplayName": "Container Instance must not have secrets/credentials present in plain text.", "Category": "Credentials Access", "ControlRequirements": "Eliminating plain text credentials", "Rationale": "Keeping secrets/credentials such as DB connection strings, passwords, keys, etc. in plain text can lead to exposure at various avenues during an application's lifecycle. Storing them in a key vault ensures that they are protected at rest.", "Recommendation": "Find detected secrets/credentials using the information available in the UI, rotate those credentials and remove them. Refer: https://learn.microsoft.com/en-us/azure/container-instances/container-instances-managed-identity to manage secrets in Key Vault and use Manage Identity to access Key Vault.", "Tags": [ "SDL", "TCP", "Automated", "DP", "Baseline" ], "Enabled": true, "CustomTags": [ "Daily", "Preview", "TenantBaseline", "MSD", "TBv9", "CAIPreview", "EDPreview", "SMTPreview", "TRWave4", "TRPreview", "TRBaseline", "SN:ContainerInstance_AvoidSecrets", "CAIWave1", "Secrets" ] } ] } |