Get the FREE Ultimate OpenClaw Setup Guide →

azure-compliance

npx machina-cli add skill microsoft/GitHub-Copilot-for-Azure/azure-compliance --openclaw
Files (1)
SKILL.md
4.9 KB

Azure Compliance & Security Auditing

Quick Reference

PropertyDetails
Best forCompliance scans, security audits, Key Vault expiration checks
Primary capabilitiesComprehensive Resources Assessment, Key Vault Expiration Monitoring
MCP toolsazqr, subscription and resource group listing, Key Vault item inspection

When to Use This Skill

  • Run azqr or Azure Quick Review for compliance assessment
  • Validate Azure resource configuration against best practices
  • Identify orphaned or misconfigured resources
  • Audit Key Vault keys, secrets, and certificates for expiration

Skill Activation Triggers

Activate this skill when user wants to:

  • Check Azure compliance or best practices
  • Assess Azure resources for configuration issues
  • Run azqr or Azure Quick Review
  • Identify orphaned or misconfigured resources
  • Review Azure security posture
  • "Show me expired certificates/keys/secrets in my Key Vault"
  • "Check what's expiring in the next 30 days"
  • "Audit my Key Vault for compliance"
  • "Find secrets without expiration dates"
  • "Check certificate expiration dates"

Prerequisites

  • Authentication: user is logged in to Azure via az login
  • Permissions to read resource configuration and Key Vault metadata

Assessments

AssessmentReference
Comprehensive Compliance (azqr)references/azure-quick-review.md
Key Vault Expirationreferences/azure-keyvault-expiration-audit.md
Resource Graph Queriesreferences/azure-resource-graph.md

MCP Tools

ToolPurpose
mcp_azure_mcp_extension_azqrRun azqr compliance scans
mcp_azure_mcp_subscription_listList available subscriptions
mcp_azure_mcp_group_listList resource groups
keyvault_key_listList all keys in vault
keyvault_key_getGet key details including expiration
keyvault_secret_listList all secrets in vault
keyvault_secret_getGet secret details including expiration
keyvault_certificate_listList all certificates in vault
keyvault_certificate_getGet certificate details including expiration

Assessment Workflow

  1. Select scope (subscription or resource group) for Comprehensive Resources Assessment.
  2. Run azqr and capture output artifacts.
  3. Analyze Scan Results and summarize findings and recommendations.
  4. Review Key Vault Expiration Monitoring output for keys, secrets, and certificates.
  5. Classify issues and propose remediation or fix steps for each finding.

Priority Classification

PriorityGuidance
CriticalImmediate remediation required for high-impact exposure
HighResolve within days to reduce risk
MediumPlan a resolution in the next sprint
LowTrack and fix during regular maintenance

Error Handling

ErrorMessageRemediation
Authentication required"Please login"Run az login and retry
Access denied"Forbidden"Confirm permissions and fix role assignments
Missing resource"Not found"Verify subscription and resource group selection

Best Practices

  • Run compliance scans on a regular schedule (weekly or monthly)
  • Track findings over time and verify remediation effectiveness
  • Separate compliance reporting from remediation execution
  • Keep Key Vault expiration policies documented and enforced

SDK Quick References

For programmatic Key Vault access, see the condensed SDK guides:

Source

git clone https://github.com/microsoft/GitHub-Copilot-for-Azure/blob/main/plugin/skills/azure-compliance/SKILL.mdView on GitHub

Overview

Azure Compliance & Security Auditing helps assess resources against Azure best practices, monitor Key Vault expirations, and validate configurations for security and policy compliance. It leverages azqr, resource graph queries, and Key Vault audits to surface gaps and remediation opportunities.

How This Skill Works

The skill executes azqr-based assessments across a chosen scope (subscription or resource group), then uses Key Vault item queries to check expiration of keys, secrets, and certificates. Findings are aggregated into actionable remediation guidance and aligned with policy compliance and security posture evaluation.

When to Use It

  • Run azqr or Azure Quick Review for compliance assessment
  • Validate Azure resource configuration against best practices
  • Identify orphaned or misconfigured resources
  • Audit Key Vault keys, secrets, and certificates for expiration
  • Review security posture and identify expiring items within 30 days

Quick Start

  1. Step 1: az login and set the target scope (subscription or resource group)
  2. Step 2: Run azqr-based assessment (e.g., mcp_azure_mcp_extension_azqr) and collect output artifacts
  3. Step 3: Review findings (config issues, expirations, policy gaps) and plan remediation

Best Practices

  • Authenticate to Azure with az login and ensure read permissions before scanning
  • Run comprehensive assessments at subscription or resource group scope to catch drift
  • Include Key Vault expiration checks (keys, secrets, certificates) in every run
  • Correlate scan results with Resource Graph queries and Azure policy references
  • Prioritize remediation using the provided guidance and error handling steps

Example Use Cases

  • Perform a comprehensive compliance scan across a new subscription to surface misconfigurations and policy gaps
  • Audit all Key Vaults for expiring keys, secrets, and certificates and generate renewal reminders
  • Identify orphaned resources after project decommissioning and propose cleanup actions
  • Validate resource configurations against Azure best practices and generate remediation steps
  • Evaluate security posture for regulatory compliance and track findings over time

Frequently Asked Questions

Add this skill to your agents
Sponsor this space

Reach thousands of developers