turbot/terraform_azure_compliance

GitHub
Loading controls...

Control: Public network access on Azure SQL Database should be disabled

Description

Disabling the public network access property improves security by ensuring your Azure SQL Database can only be accessed from a private endpoint. This configuration denies all logins that match IP or virtual network based firewall rules.

Usage

Run the control in your terminal:

steampipe check terraform_azure_compliance.control.sql_db_public_network_access_disabled

Snapshot and share results via Steampipe Cloud:

steampipe login
steampipe check --share terraform_azure_compliance.control.sql_db_public_network_access_disabled

SQL

This control uses a named query:

sql_db_public_network_access_disabled

Tags