Azure Policy policy definitions for Azure Private 5G Core

This page lists the Azure Policy policy definitions for Azure Private 5G Core. For the full list of Azure Policy definitions across Azure services, see Azure Policy built-in definitions.

The name of each policy definition links to the policy definition in the Azure portal. Use the link in the Version column to view the source on the Azure Policy GitHub repo.

To assign a policy to your Azure Private 5G Core deployment, see Create and manage policies to enforce compliance.

Name
(Azure portal)
Description Effect(s) Version
(GitHub)
Configure Packet Core Control Plane diagnostic access to use authentication type Microsoft EntraID Authenticaton type must be Microsoft EntraID for packet core diagnostic access over local APIs Modify, Disabled 1.0.0
Packet Core Control Plane diagnostic access should only use Microsoft EntraID authentication type Authenticaton type must be Microsoft EntraID for packet core diagnostic access over local APIs Audit, Deny, Disabled 1.0.0
SIM Group should use customer-managed keys to encrypt data at rest Use customer-managed keys to manage the encryption at rest of SIM secrets in a SIM Group. Customer-managed keys are commonly required to meet regulatory compliance standards and they enable the data to be encrypted with an Azure Key Vault key created and owned by you. You have full control and responsibility for the key lifecycle, including rotation and management. Audit, Deny, Disabled 1.0.0

Next steps