turbot/azure_compliance

Query: storage_account_blobs_logging_enabled

Usage

powerpipe query azure_compliance.query.storage_account_blobs_logging_enabled

SQL

select
sa.id as resource,
case
when lower(sa.sku_tier) = 'standard'
and (
not (sa.blob_service_logging ->> 'Read') :: boolean
or not (sa.blob_service_logging ->> 'Write') :: boolean
or not (sa.blob_service_logging ->> 'Delete') :: boolean
) then 'alarm'
else 'ok'
end as status,
case
when lower(sa.sku_tier) = 'standard'
and (
not (sa.blob_service_logging ->> 'Read') :: boolean
or not (sa.blob_service_logging ->> 'Write') :: boolean
or not (sa.blob_service_logging ->> 'Delete') :: boolean
) then name || ' storage account logging for blobs is disabled for' || concat_ws(
', ',
case
when not (sa.blob_service_logging ->> 'Write') :: boolean then 'write'
end,
case
when not (sa.blob_service_logging ->> 'Read') :: boolean then 'read'
end,
case
when not (sa.blob_service_logging ->> 'Delete') :: boolean then 'delete'
end
) || ' requests.'
else name || ' storage account logging for blobs is enabled.'
end as reason,
sa.resource_group as resource_group,
sub.display_name as subscription
from
azure_storage_account sa,
azure_subscription sub
where
sub.subscription_id = sa.subscription_id;

Controls

The query is being used by the following controls: