Control: Lambda functions should restrict public URL
Description
This control verifies that the Lambda function does not have a publicly accessible URL. Exposing services publicly could potentially make sensitive data accessible to malicious actors.
Usage
Run the control in your terminal:
powerpipe control run aws_compliance.control.lambda_function_restrict_public_urlSnapshot and share results via Turbot Pipes:
powerpipe loginpowerpipe control run aws_compliance.control.lambda_function_restrict_public_url --shareSQL
This control uses a named query:
select  arn as resource,  case    when url_config is null then 'info'    when url_config ->> 'AuthType' = 'AWS_IAM' then 'ok'    else 'alarm'  end as status,  case    when url_config is null then title || ' having no URL config.'    when url_config ->> 'AuthType' = 'AWS_IAM' then title || ' restricts public function URL.'    else title || ' public function URL configured.'  end as reason    , region, account_idfrom  aws_lambda_function;