Skip to content

Commit ad2ae41

Browse files
authored
Fix links and typos in secure configuration document
1 parent 318a9ae commit ad2ae41

1 file changed

Lines changed: 3 additions & 3 deletions

File tree

articles/azure-government/compliance/recommended-secure-configuration.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -49,7 +49,7 @@ Azure defines the following top-level administrative accounts.
4949

5050
**SCG-CSO-RSC Requirement:** Instructions about how to securely access, configure, operate, and decommission top-level administrative accounts that control enterprise access to the entire cloud service offering.
5151

52-
Azure publishes authoritative guidance for top-level admin roles via Microsoft Learn (Microsoft Entra documentation), including privileged role definitions, emergency access ("break-glass") account guidance, and FedRAMP High identity access controls. For more information, see [RBAC and Directory Admin Roles](/role-based-access-control/rbac-and-directory-admin-roles).
52+
Azure publishes authoritative guidance for top-level admin roles via Microsoft Learn (Microsoft Entra documentation), including privileged role definitions, emergency access ("break-glass") account guidance, and FedRAMP High identity access controls. For more information, see [RBAC and Directory Admin Roles](/azure/role-based-access-control/rbac-and-directory-admin-roles).
5353

5454
Microsoft Learn documents the built‑in administrative roles that are authorized to change tenant‑wide security settings, including:
5555

@@ -62,7 +62,7 @@ These roles have the ability to alter authentication requirements, disable prote
6262

6363
Azure provides guidance to protect administrator sign-in, enforce MFA, conditional access, and protected admin workstations which detail how to securely access top-level administrative accounts in Azure. For more information, see [Privileged roles and permissions](/entra/identity/role-based-access-control/privileged-roles-permissions).
6464

65-
Azure defines critical roles (Global/Privileged Role Admin), separation of duties, least‑privilege configuration and provides guidance to manage emergency access admin accounts in Entra ID – Guidance on creating and managing highly privileged break-glass global admin accounts (for emergency scenarios) to securely configure top-level administrative accounts with instructions to implement at [Microsoft cloud security benchmark – Privileged access](/security/benchmark/azure/mcsb-privileged-access) and [Azure identity & access security best practices](/azure/security/fundamentals/identity-management-best-practices).
65+
Azure defines critical roles (Global/Privileged Role Admin), separation of duties, least‑privilege configuration and provides guidance to manage emergency access admin accounts in Entra ID – Guidance on creating and managing highly privileged break-glass global admin accounts (for emergency scenarios) to securely configure top-level administrative accounts with instructions to implement at [Microsoft cloud security benchmark – Privileged access](/security/benchmark/azure/mcsb-privileged-access) and [Azure identity & access security best practices](/azure/security/fundamentals/identity-management-best-practices).
6666

6767
Azure provides operational guardrails for privileged sessions, access reviews, activation workflows, and monitoring to securely operate top-level administrative accounts as well as lifecycle guidance to remove stale assignments and revoke credentials with least standing privilege to securely decommission (retire) top‑level administrative accounts.
6868

@@ -780,7 +780,7 @@ Azure provides versioned JSON accessible through:
780780
- [List Azure role assignments using Azure CLI](/azure/role-based-access-control/role-assignments-list-cli)
781781
- [Quickstart: Execute a Resource Graph Query Using Azure CLI](/azure/governance/resource-graph/first-query-azurecli)
782782

783-
ARG enables diffing:
783+
ARG enables diffs:
784784

785785
- RBAC changes
786786
- Policy updates

0 commit comments

Comments
 (0)