Enforce Restrictions with Azure Policy
15 May 2020 • 6 min readBuilt-in Azure Policies
1. Once you login to Azure Portal, search for "Policy" and click on it in the search result.2. Click on "Definitions" on the left navigation menu, you should see a long list of built-in and custom policies. Feel free to explore; there may be some policies which may benefit your use cases.


Custom Azure Policies
In order to demonstrate the creation of custom policies, I will create a custom policy to allow certain SKUs for App Service Plan.1. Create a custom policy
On the "Definitions" page of Policy, click on "+ Policy Definition". Select a subscription for "Definition Location" and fill up the name.
2. Default Policy Rule
This is the default policy rule supplied by Azure:{
"mode": "All",
"policyRule": {
"if": {
"not": {
"field": "location",
"in": "[parameters('allowedLocations')]"
}
},
"then": {
"effect": "audit"
}
},
"parameters": {
"allowedLocations": {
"type": "Array",
"metadata": {
"description": "The list of allowed locations for resources.",
"displayName": "Allowed locations",
"strongType": "location"
}
}
}
}
3. Replace The "policyRule" Block
Replace the "policyRule" block in the above JSON code with the following code:"policyRule": {
"if": {
"allOf": [
{
"field": "type",
"equals": "Microsoft.Web/serverfarms"
},
{
"not": {
"field": "Microsoft.Web/serverfarms/sku.name",
"in": "[parameters('listOfAllowedSKUs')]"
}
}
]
},
"then": {
"effect": "deny"
}
}


{
"not": {
"field": "Microsoft.Web/serverfarms/sku.name",
"in": "[parameters('listOfAllowedSKUs')]"
}
}
4. Replace The "parameters" Block
Replace the "parameters" block in step 2 with the following JSON code:"parameters": {
"listOfAllowedSKUs": {
"type": "Array",
"metadata": {
"displayName": "listOfAllowedSKUs",
"description": "List of Allowed SKUs"
},
"allowedValues": [
"D1",
"F1",
"B1",
"B2",
"B3"
]
}
}
5. Policy Rule After Replacement
After replacing the blocks of code in step 3 and 4, the Policy Rule should look like this:{
"mode": "All",
"policyRule": {
"if": {
"allOf": [
{
"field": "type",
"equals": "Microsoft.Web/serverfarms"
},
{
"not": {
"field": "Microsoft.Web/serverfarms/sku.name",
"in": "[parameters('listOfAllowedSKUs')]"
}
}
]
},
"then": {
"effect": "deny"
}
},
"parameters": {
"listOfAllowedSKUs": {
"type": "Array",
"metadata": {
"displayName": "listOfAllowedSKUs",
"description": "List of Allowed SKUs"
},
"allowedValues": ["D1", "F1", "B1", "B2", "B3"]
}
}
}
6. Save and Assign
Click "Save" to save the custom policy. You may wish to follow Step 3 - 6 in the section "Built-In Azure Policies" of this article to assign this custom policy (instead of a built-in policy) to a subscription / resource group.7. Verify The Assigned Custom Policy
After assigning the policy successfully, you may try to create a Web App with an App Service Plan which do not have the SKU whitelisted, you will see the following error.
TL;DR
Azure Policy is useful in implementing organisation-wide standards and compliance. It can help to enforce certain restrictions, such as preventing the creation of certain SKUs / tiers of resources. It can also improve security of your infrastructure and applications indirectly by enforcing some requirements, such as using the latest TLS version in your API app.MicrosoftAzureCompliance