turbot/azure_compliance

Query: keyvault_with_rbac_key_expiration_set

Usage

powerpipe query azure_compliance.query.keyvault_with_rbac_key_expiration_set

SQL

with rbac_vault as (
select
name
from
azure_key_vault
where enable_rbac_authorization
)
select
kvk.id as resource,
case
when v.name is null then 'skip'
when enabled and expires_at is null then 'alarm'
else 'ok'
end as status,
vault_name || ' key ' || kvk.name ||
case
when v.name is null then ' not RBAC enabled vault.'
when enabled and expires_at is null then ' expiration date not set.'
when not enabled then ' disabled.'
else ' expiration date set to ' || to_char(expires_at, 'DD-Mon-YYYY') || '.'
end as reason
, kvk.resource_group as resource_group
, sub.display_name as subscription
from
azure_key_vault_key kvk
left join rbac_vault as v on v.name = kvk.vault_name,
azure_subscription sub
where
sub.subscription_id = kvk.subscription_id;

Controls

The query is being used by the following controls: