turbot/azure_compliance

Control: Secure Boot should be enabled on supported Windows virtual machines

Description

Enable Secure Boot on supported Windows virtual machines to mitigate against malicious and unauthorized changes to the boot chain. Once enabled, only trusted bootloaders, kernel and kernel drivers will be allowed to run. This assessment applies to Trusted Launch and Confidential Windows virtual machines.

Usage

Run the control in your terminal:

powerpipe control run azure_compliance.control.compute_windows_vm_secure_boot_enabled

Snapshot and share results via Turbot Pipes:

powerpipe login
powerpipe control run azure_compliance.control.compute_windows_vm_secure_boot_enabled --share

SQL

This control uses a named query:

compute_windows_vm_secure_boot_enabled

Tags