turbot/steampipe-mod-azure-compliance

Control: App Configuration should use private link

Description

Azure Private Link lets you connect your virtual network to Azure services without a public IP address at the source or destination. The private link platform handles the connectivity between the consumer and services over the Azure backbone network. By mapping private endpoints to your app configuration instances instead of the entire service, you'll also be protected against data leakage risks.

Usage

Run the control in your terminal:

powerpipe control run azure_compliance.control.app_configuration_private_link_used

Snapshot and share results via Turbot Pipes:

powerpipe login
powerpipe control run azure_compliance.control.app_configuration_private_link_used --share

SQL

This control uses a named query:

select
a.id as resource,
case
-- Only applicable to standard tier
when sku_name = 'free' then 'skip'
-- All networks, including the internet and private endpoints, can access this resource
-- Checking if all network enabled and no private endpoint then it's public access
when public_network_access = 'Enabled' and private_endpoint_connections is null then 'alarm'
when private_endpoint_connections @> '[{"privateLinkServiceConnectionStateStatus": "Approved"}]'::jsonb then 'ok'
else 'alarm'
end as status,
case
when sku_name = 'free' then a.name || ' is of ' || sku_name || ' tier.'
when public_network_access = 'Enabled' and private_endpoint_connections is null then ' using public networks.'
when private_endpoint_connections @> '[{"privateLinkServiceConnectionStateStatus": "Approved"}]'::jsonb then a.name || ' using private link.'
else a.name || ' not using private link.'
end as reason
, a.resource_group as resource_group
, sub.display_name as subscription
from
azure_app_configuration as a,
azure_subscription as sub;

Tags