turbot/steampipe-mod-azure-compliance

Control: 3.12 Ensure the 'Minimum TLS version' is set to 'Version 1.2'

Description

TLS 1.0 has known vulnerabilities and has been replaced by later versions of the TLS protocol. Continued use of this legacy protocol affects the security of data in transit.

Remediation

From Console

  1. Login to Azure Portal
  2. Go to Storage Accounts
  3. Click on each Storage Account
  4. Under Setting section, Click on Configuration
  5. Set the minimum TLS version to be Version 1.2

Usage

Run the control in your terminal:

powerpipe control run azure_compliance.control.cis_v140_3_12

Snapshot and share results via Turbot Pipes:

powerpipe login
powerpipe control run azure_compliance.control.cis_v140_3_12 --share

SQL

This control uses a named query:

select
sa.id as resource,
case
when minimum_tls_version = 'TLSEnforcementDisabled' then 'alarm'
when minimum_tls_version = 'TLS1_2' then 'ok'
else 'alarm'
end as status,
case
when minimum_tls_version = 'TLSEnforcementDisabled' then sa.name || ' TLS enforcement is disabled.'
when minimum_tls_version = 'TLS1_2' then sa.name || ' minimum TLS version set to ' || minimum_tls_version || '.'
else sa.name || ' minimum TLS version set to ' || minimum_tls_version || '.'
end as reason
, sa.resource_group as resource_group
, sub.display_name as subscription
from
azure_storage_account sa,
azure_subscription sub
where
sub.subscription_id = sa.subscription_id;

Tags