turbot/terraform_azure_compliance

Control: Cognitive Services accounts should disable public network access

Description

Disabling public network access improves security by ensuring that Cognitive Services account isn't exposed on the public internet. Creating private endpoints can limit exposure of Cognitive Services account.

Usage

Run the control in your terminal:

powerpipe control run terraform_azure_compliance.control.cognitive_account_public_network_access_disabled

Snapshot and share results via Turbot Pipes:

powerpipe login
powerpipe control run terraform_azure_compliance.control.cognitive_account_public_network_access_disabled --share

SQL

This control uses a named query:

cognitive_account_public_network_access_disabled

Tags