turbot/steampipe-mod-azure-compliance

Control: Shared key access should be disabled for storage accounts

Description

Disabling shared key access ensures that only Azure AD identities can access storage accounts, improving security.

Usage

Run the control in your terminal:

powerpipe control run azure_compliance.control.storage_account_shared_key_access_disabled

Snapshot and share results via Turbot Pipes:

powerpipe login
powerpipe control run azure_compliance.control.storage_account_shared_key_access_disabled --share

SQL

This control uses a named query:

select
sa.id as resource,
case
when allow_shared_key_access then 'alarm'
else 'ok'
end as status,
case
when allow_shared_key_access then sa.name || ' shared key access is enabled.'
else sa.name || ' shared key access is disabled.'
end as reason
, sa.resource_group as resource_group
, sub.display_name as subscription
from
azure_storage_account sa,
azure_subscription sub
where
sub.subscription_id = sa.subscription_id;

Tags