Creating and Managing Azure Policies
Azure Policies are governance tools provided by Microsoft Azure to create, assign, and manage rules that ensure compliance and adherence to enterprise standards for cloud resources. More information is available in the official documentation: Azure Policy Overview.
Goal of DX Azure Policies
To improve the control and management of resources across different Azure environments, the DX team provides a predefined set of policies that product teams can apply to their Subscriptions. These policies allow better monitoring of critical configurations and resources, ensuring higher standardization and security:
Once applied, these policies help maintain an organized and compliant environment, reducing the risk of misconfigurations or unauthorized changes.
DX Policies extend the functionalities of the Technology Policies. Unlike DX Policies, which have a limited scope, Technology Policies apply to all corporate subscriptions without distinction.
Product teams can also propose new DX Policies for additional requirements.
Policies are applied via Terraform, and the rules that implement them
(policyRule
) are stored in the DX Repository.
This guide explains the steps required to apply existing policies or add new ones.
Policy Configuration
Azure Policies are commonly defined in JSON and consist of multiple
components: policyRule
definitions, parameters
, and metadata required for
deployment on Azure. Since we manage the latter using Terraform, the only two
sections that remain defined in JSON are lists of policyRule
and
parameters
.
Defining Policy Rules
Policy Rules consist of if/then blocks that define the conditions to be evaluated once the policy is assigned and the action to be taken if the conditions are met.
To add a new rule, create a file named <POLICY_SUMMARY>_rule_v<VERSION>.json
inside the infra/policy/_policy_rules
directory of the DX repository.
Define the policyRule
within the file, ensuring it adheres to the
documentation guidelines.
For example, to create a policy that prevents resource creation outside a
configurable region, create the file allowed_location_rule_v1.json
with the
following content:
{
"if": {
"not": [
{
"field": "location",
"equals": "[parameters('location')]"
}
]
},
"then": {
"effect": "deny"
}
}
Here, [parameters('location')]
is the reference to the associated parameter.
Defining Policy Rules Parameters
When defining a rule, parameters can be specified as configurable variables. These must also be defined in a JSON file.
To add a new set of parameters, create a file named
<POLICY_SUMMARY>_parameters_v<VERSION>.json
within the
infra/policy/_policy_rules
directory of the DX repository. Define the
parameters inside the file according to the documentation guidelines.
Continuing the previous example, create the file
allowed_location_parameters_v1.json
with the following content:
{
"location": {
"type": "String",
"metadata": {
"displayName": "Allowed Locations",
"description": "Specify the allowed Locations value."
}
}
}
This ensures that when the policy is assigned, a parameter must be set.
It is also possible to specify a list of allowed values and a default value. For more details, refer to the official documentation.
Applying Policies via Terraform
Once the Policy Rule and its corresponding Parameters
are defined, the policy
must be deployed using Terraform. Product teams that wish to apply DX Policy
Rules to one or more subscriptions should create the necessary descriptors in
their repository following this file structure:
infra/
├── policy/
├── <dev/uat/prod>
├── <policy_name>.tf
├── data.tf
Example of Terraform Definition
# data.tf File
data "http" "allowed_location_policy_rule" {
url = "https://raw.githubusercontent.com/pagopa/dx/refs/heads/main/infra/policy/_policy_rules/allowed_location_rule_v1.json"
}
data "http" "allowed_location_policy_parameters" {
url = "https://raw.githubusercontent.com/pagopa/dx/refs/heads/main/infra/policy/_policy_rules/allowed_location_parameters_v1.json"
}
# allowed_locations.tf File
resource "azurerm_policy_definition" "allowed_location_policy" {
name = "${module.naming_convention.project}-allowed-location-policy"
policy_type = "Custom"
mode = "Indexed"
display_name = "Enforce Italy North region"
description = "Ensures that resources have Italy North region during creation."
metadata = jsonencode({
category = "Custom DevEx"
version = "1.0.0"
})
policy_rule = data.http.allowed_location_policy_rule.response_body
parameters = data.http.allowed_location_policy_parameters.response_body
}
resource "azurerm_subscription_policy_assignment" "allowed_location_assignment" {
name = "${module.naming_convention.project}-allowed-location-assignment"
display_name = "Enforce Italy North region"
policy_definition_id = azurerm_policy_definition.allowed_location_policy.id
subscription_id = data.azurerm_subscription.current.id
parameters = jsonencode({
"location" = {
"value" = "Italy North"
}
})
}
Versioning Policy Rules and Parameters
When creating or modifying Policy Rules and/or Parameters in the DX repository,
the version must be updated only in the case of breaking changes. To update the
version, modify the <VERSION>
reference in the JSON file name:
<POLICY_SUMMARY>_rule_v<VERSION>.json
<POLICY_SUMMARY>_parameters_v<VERSION>.json
Where version is an incrementing integer (e.g., v1, v2, …).
Deploying Policies
Once everything is configured, the product team should submit a Pull Request in
their own repository. Optionally, they can share it with the DX team for review
before merging and applying it in production via the GitHub Action that triggers
terraform apply
.