Governance constraints were discovered from the live Azure environment and not assumed.
Query
Results
Timestamp
REST API Total
21 assignments total
2026-04-14T14:03:53Z
Subscription-scope
5 direct assignments
2026-04-14T14:03:53Z
MG-inherited
9 inherited assignments
2026-04-14T14:03:53Z
Resource-group
7 RG-scoped assignments
2026-04-14T14:03:53Z
Deny-effect
1 true blocker found
2026-04-14T14:03:53Z
Tag Policies
9 required RG tags discovered
2026-04-14T14:03:53Z
Security Policies
10 relevant constraints
2026-04-14T14:03:53Z
Discovery Method: Azure Policy MCP (policy_assignment_list) plus direct ARM REST (az rest) for assignment, policy definition, and initiative policyRule inspection
Subscription: noalz (00858ffc-dded-4f0f-8bbf-e17fff0d47d9)
Tenant: 2d04cb4c-999b-4e60-a3a7-e8993edc768bScope: Full subscription, including management-group-inherited assignments
Portal Validation: Not performed in this session; assignment coverage is REST-verified but was not cross-checked in Azure Portal
The only true deny blocker for this architecture is the resource-group tag policy.
Public endpoint concerns for Storage and Key Vault are currently audit / modify, not deny, in the active subscription scope.
The deny initiative contains no direct App Service, ACR, Key Vault vault, or Storage Account deny policy for modern resource types.
A governance inconsistency exists: the resource-group deny policy requires technical-contact, but the tag inheritance modify policy uses tech-contact for child resources.
Set allowBlobPublicAccess: false and allowSharedKeyAccess: false explicitly in IaC
Public Key Vault and relaxed Storage network posture were treated as provisional architecture decisions
Azure Security Baseline built-ins
Audit / AuditIfNotExists
Resolved: VNet integration + private endpoints for Key Vault, Storage, and ACR eliminate public endpoint exposure. publicNetworkAccess: Disabled is set on all three services. This resolves ARC-004 (public endpoint risk) from the original architecture assessment
May auto-create resource group McapsGovernance in WestUS2
Deploy Storage Account for Diagnostic Settings
DeployIfNotExists
May auto-create a governance-managed StorageV2 account in McapsGovernance with TLS 1.2, HTTPS-only, no blob public access, no shared key access, and publicNetworkAccess = Disabled