Control: Azure Service Bus namespaces should use private link
Description
Azure Private Link lets you connect your virtual network to Azure services without a public IP address at the source or destination. The Private Link platform handles the connectivity between the consumer and services over the Azure backbone network. By mapping private endpoints to Service Bus namespaces, data leakage risks are reduced.
Usage
Run the control in your terminal:
powerpipe control run azure_compliance.control.servicebus_name_space_private_link_used
Snapshot and share results via Turbot Pipes:
powerpipe loginpowerpipe control run azure_compliance.control.servicebus_name_space_private_link_used --share
SQL
This control uses a named query:
select a.id as resource, case when sku_name in ('Basic', 'Standard') then 'skip' when private_endpoint_connections is null then 'info' when private_endpoint_connections @> '[{"privateLinkServiceConnectionStateStatus": "Approved"}]'::jsonb then 'ok' else 'alarm' end as status, case when sku_name in ('Basic', 'Standard') then a.name || ' is of ' || sku_name || ' tier.' when private_endpoint_connections is null then a.name || ' no private link exists.' when private_endpoint_connections @> '[{"privateLinkServiceConnectionStateStatus": "Approved"}]'::jsonb then a.name || ' using private link.' else a.name || ' not using private link.' end as reason , a.resource_group as resource_group , sub.display_name as subscriptionfrom azure_servicebus_namespace a, azure_subscription sub;