Skip to main content

Creating and Managing Azure Policies

Azure Policies are governance tools provided by Microsoft Azure to create, assign, and manage rules that ensure compliance and adherence to enterprise standards for cloud resources. More information is available in the official documentation: Azure Policy Overview.

Goal of DX Azure Policies

To improve the control and management of resources across different Azure environments, the DX team provides a predefined set of policies that product teams can apply to their Subscriptions. These policies allow better monitoring of critical configurations and resources, ensuring higher standardization and security:

Once applied, these policies help maintain an organized and compliant environment, reducing the risk of misconfigurations or unauthorized changes.

DX Policies extend the functionalities of the Technology Policies. Unlike DX Policies, which have a limited scope, Technology Policies apply to all corporate subscriptions without distinction.

Product teams can also propose new DX Policies for additional requirements.

Policies are applied via Terraform, and the rules that implement them (policyRule) are stored in the DX Repository.

This guide explains the steps required to apply existing policies or add new ones.

Policy Configuration

Azure Policies are commonly defined in JSON and consist of multiple components: policyRule definitions, parameters, and metadata required for deployment on Azure. Since we manage the latter using Terraform, the only two sections that remain defined in JSON are lists of policyRule and parameters.

Defining Policy Rules

Policy Rules consist of if/then blocks that define the conditions to be evaluated once the policy is assigned and the action to be taken if the conditions are met.

To add a new rule, create a file named <POLICY_SUMMARY>_rule_v<VERSION>.json inside the infra/policy/_policy_rules directory of the DX repository. Define the policyRule within the file, ensuring it adheres to the documentation guidelines.

For example, to create a policy that prevents resource creation outside a configurable region, create the file allowed_location_rule_v1.json with the following content:

{
"if": {
"not": [
{
"field": "location",
"equals": "[parameters('location')]"
}
]
},
"then": {
"effect": "deny"
}
}

Here, [parameters('location')] is the reference to the associated parameter.

Defining Policy Rules Parameters

When defining a rule, parameters can be specified as configurable variables. These must also be defined in a JSON file.

To add a new set of parameters, create a file named <POLICY_SUMMARY>_parameters_v<VERSION>.json within the infra/policy/_policy_rules directory of the DX repository. Define the parameters inside the file according to the documentation guidelines.

Continuing the previous example, create the file allowed_location_parameters_v1.json with the following content:

{
"location": {
"type": "String",
"metadata": {
"displayName": "Allowed Locations",
"description": "Specify the allowed Locations value."
}
}
}

This ensures that when the policy is assigned, a parameter must be set.

It is also possible to specify a list of allowed values and a default value. For more details, refer to the official documentation.

Applying Policies via Terraform

Once the Policy Rule and its corresponding Parameters are defined, the policy must be deployed using Terraform. Product teams that wish to apply DX Policy Rules to one or more subscriptions should create the necessary descriptors in their repository following this file structure:

infra/
├── policy/
├── <dev/uat/prod>
├── <policy_name>.tf
├── data.tf

Example of Terraform Definition

# data.tf File

data "http" "allowed_location_policy_rule" {
url = "https://raw.githubusercontent.com/pagopa/dx/refs/heads/main/infra/policy/_policy_rules/allowed_location_rule_v1.json"
}

data "http" "allowed_location_policy_parameters" {
url = "https://raw.githubusercontent.com/pagopa/dx/refs/heads/main/infra/policy/_policy_rules/allowed_location_parameters_v1.json"
}
# allowed_locations.tf File

resource "azurerm_policy_definition" "allowed_location_policy" {
name = "${module.naming_convention.project}-allowed-location-policy"
policy_type = "Custom"
mode = "Indexed"
display_name = "Enforce Italy North region"
description = "Ensures that resources have Italy North region during creation."

metadata = jsonencode({
category = "Custom DevEx"
version = "1.0.0"
})

policy_rule = data.http.allowed_location_policy_rule.response_body
parameters = data.http.allowed_location_policy_parameters.response_body
}

resource "azurerm_subscription_policy_assignment" "allowed_location_assignment" {
name = "${module.naming_convention.project}-allowed-location-assignment"
display_name = "Enforce Italy North region"
policy_definition_id = azurerm_policy_definition.allowed_location_policy.id
subscription_id = data.azurerm_subscription.current.id

parameters = jsonencode({
"location" = {
"value" = "Italy North"
}
})
}

Versioning Policy Rules and Parameters

When creating or modifying Policy Rules and/or Parameters in the DX repository, the version must be updated only in the case of breaking changes. To update the version, modify the <VERSION> reference in the JSON file name:

  • <POLICY_SUMMARY>_rule_v<VERSION>.json
  • <POLICY_SUMMARY>_parameters_v<VERSION>.json

Where version is an incrementing integer (e.g., v1, v2, …).

Deploying Policies

Once everything is configured, the product team should submit a Pull Request in their own repository. Optionally, they can share it with the DX team for review before merging and applying it in production via the GitHub Action that triggers terraform apply.

Reference Documentation