turbot/azure_compliance

Control: Authorized IP ranges should be defined on Kubernetes Services

Description

ARestrict access to the Kubernetes Service Management API by granting API access only to IP addresses in specific ranges. It is recommended to limit access to authorized IP ranges to ensure that only applications from allowed networks can access the cluster.

Usage

Run the control in your terminal:

powerpipe control run azure_compliance.control.kubernetes_cluster_authorized_ip_range_defined

Snapshot and share results via Turbot Pipes:

powerpipe login
powerpipe control run azure_compliance.control.kubernetes_cluster_authorized_ip_range_defined --share

SQL

This control uses a named query:

kubernetes_cluster_authorized_ip_range_defined

Tags