Skip to content

Governance Policies Azure Management Logic Apps

Joshua Davis edited this page Apr 5, 2026 · 2 revisions

Logic Apps

Governance policies for Logic Apps

Domain: azure-management

Patterns

Name Description
Logic App with managed identity and access control Secure Logic App with managed identity, IP restrictions, and Key Vault-backed parameters

Anti-Patterns

Description Instead
Do not hardcode credentials in workflow parameters Use managed identity for API connections and Key Vault references for secrets
Do not expose trigger URLs without access restrictions Configure allowedCallerIpAddresses to restrict trigger invocation

References


Checks (4)

Check Severity Description
AZ-LA-001 Required Deploy Logic Apps Standard with managed identity, VNet integration, and disabled public access
AZ-LA-002 Required Use managed identity for all API connections instead of connection strings
AZ-LA-003 Recommended Configure IP-based access control for triggers, actions, and management endpoints
AZ-LA-004 Recommended Enable diagnostic logging for workflow runs and trigger history

AZ-LA-001

Deploy Logic Apps Standard with managed identity, VNet integration, and disabled public access

Severity: Required
Rationale: Logic Apps process business workflows that often handle sensitive data; managed identity eliminates connection credentials
Agents: terraform-agent, bicep-agent, cloud-architect

Targets

  • Microsoft.Logic/workflows

Companion Resources

Resource Name Purpose
Microsoft.Insights/diagnosticSettings diag-logic-app Diagnostic settings to route workflow run logs and trigger events to Log Analytics
Microsoft.Authorization/roleAssignments Logic App Contributor RBAC role assignments for Logic App management

AZ-LA-002

Use managed identity for all API connections instead of connection strings

Severity: Required
Rationale: Connection strings are shared secrets; managed identity provides per-connection, auditable access
Agents: terraform-agent, bicep-agent, cloud-architect, app-developer, csharp-developer, python-developer

Targets

  • Microsoft.Logic/workflows

AZ-LA-003

Configure IP-based access control for triggers, actions, and management endpoints

Severity: Recommended
Rationale: IP restrictions limit who can invoke workflows and access run history
Agents: terraform-agent, bicep-agent, cloud-architect, security-reviewer

Targets

  • Microsoft.Logic/workflows

AZ-LA-004

Enable diagnostic logging for workflow runs and trigger history

Severity: Recommended
Rationale: Workflow logs provide audit trail and troubleshooting data for business process execution
Agents: terraform-agent, bicep-agent, cloud-architect, monitoring-agent

Targets

  • Microsoft.Logic/workflows

Home

Getting Started

Stages

Interfaces

Configuration

Agent System

Features

Quality

Help

Governance

Policies — Azure

AI Services

Compute

Data Services

Identity

Management

Messaging

Monitoring

Networking

Security

Storage

Web & App

Policies — Well-Architected

Reliability

Security

Cost Optimization

Operational Excellence

Performance Efficiency

Integration

Anti-Patterns
Standards

Application

IaC

Principles

Transforms

Clone this wiki locally