Control: Container registries should not allow unrestricted network access
Azure container registries by default accept connections over the internet from hosts on any network. To protect your registries from potential threats, allow access from only specific public IP addresses or address ranges. If your registry doesn't have an IP/firewall rule or a configured virtual network, it will appear in the unhealthy resources.
Run the control in your terminal:
steampipe check terraform_azure_compliance.control.container_registry_restrict_public_access
Snapshot and share results via Steampipe Cloud:
steampipe loginsteampipe check --share terraform_azure_compliance.control.container_registry_restrict_public_access
This control uses a named query:container_registry_restrict_public_access