turbot/azure_compliance

Query: keyvault_managed_hms_logging_enabled

Usage

powerpipe query azure_compliance.query.keyvault_managed_hms_logging_enabled

SQL

with logging_details as (
select
name as key_vault_name
from
azure_key_vault_managed_hardware_security_module,
jsonb_array_elements(diagnostic_settings) setting,
jsonb_array_elements(setting -> 'properties' -> 'logs') log
where
diagnostic_settings is not null
and setting -> 'properties' ->> 'storageAccountId' <> ''
and (log ->> 'enabled') :: boolean
and log ->> 'category' = 'AuditEvent'
and (log -> 'retentionPolicy') :: JSONB ? 'days'
)
select
v.id as resource,
case
when v.diagnostic_settings is null then 'alarm'
when l.key_vault_name not like concat('%', v.name, '%') then 'alarm'
else 'ok'
end as status,
case
when v.diagnostic_settings is null then v.name || ' logging not enabled.'
when l.key_vault_name not like concat('%', v.name, '%') then v.name || ' logging not enabled.'
else v.name || ' logging enabled.'
end as reason,
v.resource_group as resource_group,
sub.display_name as subscription
from
azure_key_vault_managed_hardware_security_module as v,
logging_details as l,
azure_subscription as sub
where
sub.subscription_id = v.subscription_id;

Controls

The query is being used by the following controls: