turbot/azure_compliance

Query: keyvault_secret_expiration_set

Usage

powerpipe query azure_compliance.query.keyvault_secret_expiration_set

SQL

select
kvs.id as resource,
case
when enabled
and expires_at is null then 'alarm'
else 'ok'
end as status,
vault_name || ' secret ' || name || case
when enabled
and expires_at is null then ' expiration date not set.'
when not enabled then ' disabled.'
else ' expiration date set to ' || to_char(expires_at, 'DD-Mon-YYYY') || '.'
end as reason,
kvs.resource_group as resource_group,
sub.display_name as subscription
from
azure_key_vault_secret as kvs,
azure_subscription as sub
where
sub.subscription_id = kvs.subscription_id;

Controls

The query is being used by the following controls: