turbot/azure_compliance

Query: iam_user_not_allowed_to_register_application

Usage

powerpipe query azure_compliance.query.iam_user_not_allowed_to_register_application

SQL

with distinct_tenant as (
select
distinct tenant_id,
subscription_id,
_ctx
from
azure_tenant
)
select
a.id as resource,
case
when a.default_user_role_permissions ->> 'allowedToCreateApps' = 'false' then 'ok'
else 'alarm'
end as status,
case
when a.default_user_role_permissions ->> 'allowedToCreateApps' = 'false' then a.display_name || ' does not allow user to register applications.'
else a.display_name || ' allows user to register applications.'
end as reason,
t.tenant_id
from
distinct_tenant as t,
azuread_authorization_policy as a;

Controls

The query is being used by the following controls: