Control: Secure Boot should be enabled on supported Windows virtual machines
Description
Enable Secure Boot on supported Windows virtual machines to mitigate against malicious and unauthorized changes to the boot chain. Once enabled, only trusted bootloaders, kernel and kernel drivers will be allowed to run. This assessment applies to Trusted Launch and Confidential Windows virtual machines.
Usage
Run the control in your terminal:
powerpipe control run azure_compliance.control.compute_windows_vm_secure_boot_enabled
Snapshot and share results via Turbot Pipes:
powerpipe loginpowerpipe control run azure_compliance.control.compute_windows_vm_secure_boot_enabled --share
SQL
This control uses a named query:
compute_windows_vm_secure_boot_enabled