Can we block or warn against all deployment attempts initiated via “Deploy to Azure” buttons or external ARM/Bicep templates — without preventing legitimate internal portal usage? Teams should still be able to click and deploy through the Azure portal; we don’t want to block that. But we do want to avoid any one-click deployments or external templates that haven’t been reviewed.
ARM Template: ARM resource definition according to Microsoft-standard JSON
Quickstart Template: Microsoft + community
Custom Template: You/your organization
I’ve looked into how these buttons work. Their functionality is similar to Custom Templates, except they come preloaded with content from a linked source—often GitHub or Microsoft Learn. They are labeled as “Azure Resource Manager template” or “Azure quickstart template” when you use a button.
Examples; Deploy to Azure button - Azure Resource Manager | Microsoft Learn
azure-quickstart-templates/quickstarts/microsoft.storage/storage-account-create at master · Azure/azure-quickstart-templates · GitHub
Can harmful things be deployed here? Yes, but only if our own user is extremely careless and irresponsible.
Risks:
- Network is opened to the internet
- Foreign and unknown files are uploaded during resource setup; the file could be hostile or malicious
- An excessively expensive resource is purchased
- An unverified third-party resource is deployed
However, there is no significant difference between this method and deploying your own Infrastructure as Code (IaC).