turbot/steampipe-mod-azure-compliance

Control: Public network access on Azure SQL Database should be disabled

Description

Disabling the public network access property improves security by ensuring your Azure SQL Database can only be accessed from a private endpoint. This configuration denies all logins that match IP or virtual network based firewall rules.

Usage

Run the control in your terminal:

powerpipe control run azure_compliance.control.sql_db_public_network_access_disabled

Snapshot and share results via Turbot Pipes:

powerpipe login
powerpipe control run azure_compliance.control.sql_db_public_network_access_disabled --share

SQL

This control uses a named query:

select
s.id as resource,
case
when public_network_access = 'Enabled' then 'alarm'
else 'ok'
end as status,
case
when public_network_access = 'Enabled' then name || ' public network access enabled.'
else name || ' public network access disabled.'
end as reason
, s.resource_group as resource_group
, sub.display_name as subscription
from
azure_sql_server as s,
azure_subscription as sub
where
sub.subscription_id = s.subscription_id;

Tags