Loading source
Pulling the file list, source metadata, and syntax-aware rendering for this listing.
Source from repo
Audit Azure resources for compliance, security best practices, and Key Vault expiration monitoring
Files
Skill
Size
Entrypoint
Format
Open file
Syntax-highlighted preview of this file as included in the skill package.
SKILL.md
1---2name: azure-compliance3description: "Run Azure compliance and security audits with azqr plus Key Vault expiration checks. Covers best-practice assessment, resource review, policy/compliance validation, and security posture checks. WHEN: compliance scan, security audit, BEFORE running azqr (compliance cli tool), Azure best practices, Key Vault expiration check, expired certificates, expiring secrets, orphaned resources, compliance assessment."4license: MIT5metadata:6author: Microsoft7version: "1.1.1"8---910# Azure Compliance & Security Auditing1112## Quick Reference1314| Property | Details |15|---|---|16| Best for | Compliance scans, security audits, Key Vault expiration checks |17| Primary capabilities | Comprehensive Resources Assessment, Key Vault Expiration Monitoring |18| MCP tools | azqr, subscription and resource group listing, Key Vault item inspection |1920## When to Use This Skill2122- Run azqr or Azure Quick Review for compliance assessment23- Validate Azure resource configuration against best practices24- Identify orphaned or misconfigured resources25- Audit Key Vault keys, secrets, and certificates for expiration2627## Skill Activation Triggers2829Activate this skill when user wants to:30- Check Azure compliance or best practices31- Assess Azure resources for configuration issues32- Run azqr or Azure Quick Review33- Identify orphaned or misconfigured resources34- Review Azure security posture35- "Show me expired certificates/keys/secrets in my Key Vault"36- "Check what's expiring in the next 30 days"37- "Audit my Key Vault for compliance"38- "Find secrets without expiration dates"39- "Check certificate expiration dates"4041## Prerequisites4243- Authentication: user is logged in to Azure via `az login`44- Permissions to read resource configuration and Key Vault metadata4546## Assessments4748| Assessment | Reference |49|------------|-----------|50| Comprehensive Compliance (azqr) | [references/azure-quick-review.md](references/azure-quick-review.md) |51| Key Vault Expiration | [references/azure-keyvault-expiration-audit.md](references/azure-keyvault-expiration-audit.md) |52| Resource Graph Queries | [references/azure-resource-graph.md](references/azure-resource-graph.md) |5354## MCP Tools5556| Tool | Purpose |57|------|---------|58| `mcp_azure_mcp_extension_azqr` | Run azqr compliance scans |59| `mcp_azure_mcp_subscription_list` | List available subscriptions |60| `mcp_azure_mcp_group_list` | List resource groups |61| `keyvault_key_list` | List all keys in vault |62| `keyvault_key_get` | Get key details including expiration |63| `keyvault_secret_list` | List all secrets in vault |64| `keyvault_secret_get` | Get secret details including expiration |65| `keyvault_certificate_list` | List all certificates in vault |66| `keyvault_certificate_get` | Get certificate details including expiration |6768## Assessment Workflow69701. Select scope (subscription or resource group) for Comprehensive Resources Assessment.712. Run azqr and capture output artifacts.723. Analyze Scan Results and summarize findings and recommendations.734. Review Key Vault Expiration Monitoring output for keys, secrets, and certificates.745. Classify issues and propose remediation or fix steps for each finding.7576### Priority Classification7778| Priority | Guidance |79|---|---|80| Critical | Immediate remediation required for high-impact exposure |81| High | Resolve within days to reduce risk |82| Medium | Plan a resolution in the next sprint |83| Low | Track and fix during regular maintenance |8485## Error Handling8687| Error | Message | Remediation |88|---|---|---|89| Authentication required | "Please login" | Run `az login` and retry |90| Access denied | "Forbidden" | Confirm permissions and fix role assignments |91| Missing resource | "Not found" | Verify subscription and resource group selection |9293## Best Practices9495- Run compliance scans on a regular schedule (weekly or monthly)96- Track findings over time and verify remediation effectiveness97- Separate compliance reporting from remediation execution98- Keep Key Vault expiration policies documented and enforced99100## SDK Quick References101102For programmatic Key Vault access, see the condensed SDK guides:103104- **Key Vault (Python)**: [Secrets/Keys/Certs](references/sdk/azure-keyvault-py.md)105- **Secrets**: [TypeScript](references/sdk/azure-keyvault-secrets-ts.md) | [Rust](references/sdk/azure-keyvault-secrets-rust.md) | [Java](references/sdk/azure-security-keyvault-secrets-java.md)106- **Keys**: [.NET](references/sdk/azure-security-keyvault-keys-dotnet.md) | [Java](references/sdk/azure-security-keyvault-keys-java.md) | [TypeScript](references/sdk/azure-keyvault-keys-ts.md) | [Rust](references/sdk/azure-keyvault-keys-rust.md)107- **Certificates**: [Rust](references/sdk/azure-keyvault-certificates-rust.md)108109