Control: Public network access on Azure SQL Database should be disabled
Description
Disabling the public network access property improves security by ensuring your Azure SQL Database can only be accessed from a private endpoint. This configuration denies all logins that match IP or virtual network based firewall rules.
Usage
Run the control in your terminal:
powerpipe control run azure_compliance.control.sql_db_public_network_access_disabled
Snapshot and share results via Turbot Pipes:
powerpipe loginpowerpipe control run azure_compliance.control.sql_db_public_network_access_disabled --share
SQL
This control uses a named query:
select s.id as resource, case when public_network_access = 'Enabled' then 'alarm' else 'ok' end as status, case when public_network_access = 'Enabled' then name || ' public network access enabled.' else name || ' public network access disabled.' end as reason , s.resource_group as resource_group , sub.display_name as subscriptionfrom azure_sql_server as s, azure_subscription as subwhere sub.subscription_id = s.subscription_id;