Control: Authorized IP ranges should be defined on Kubernetes Services
Description
ARestrict access to the Kubernetes Service Management API by granting API access only to IP addresses in specific ranges. It is recommended to limit access to authorized IP ranges to ensure that only applications from allowed networks can access the cluster.
Usage
Run the control in your terminal:
powerpipe control run azure_compliance.control.kubernetes_cluster_authorized_ip_range_defined
Snapshot and share results via Turbot Pipes:
powerpipe loginpowerpipe control run azure_compliance.control.kubernetes_cluster_authorized_ip_range_defined --share
SQL
This control uses a named query:
kubernetes_cluster_authorized_ip_range_defined