turbot/azure_compliance

Query: keyvault_firewall_enabled

Usage

powerpipe query azure_compliance.query.keyvault_firewall_enabled

SQL

select
kv.id as resource,
case
when jsonb_array_length(network_acls -> 'ipRules') > 0 then 'ok'
else 'alarm'
end as status,
case
when jsonb_array_length(network_acls -> 'ipRules') > 0 then name || ' firewall enabled.'
else name || ' firewall disabled.'
end as reason,
kv.resource_group as resource_group,
sub.display_name as subscription
from
azure_key_vault kv,
azure_subscription sub
where
sub.subscription_id = kv.subscription_id;

Controls

The query is being used by the following controls: