Control: Kubernetes cluster should restrict public access
Description
Ensure that Kubernetes cluster enables private clusters to restrict public access.
Usage
Run the control in your terminal:
powerpipe control run azure_compliance.control.kubernetes_cluster_restrict_public_accessSnapshot and share results via Turbot Pipes:
powerpipe loginpowerpipe control run azure_compliance.control.kubernetes_cluster_restrict_public_access --shareSQL
This control uses a named query:
select  c.id as resource,  case    when api_server_access_profile ->> 'enablePrivateCluster' = 'true' then 'ok'    else 'alarm'  end as status,  case    when api_server_access_profile ->> 'enablePrivateCluster' = 'true' then c.name || ' not publicly accessible.'    else c.name || ' publicly accessibe.'  end as reason    , c.resource_group as resource_group  , sub.display_name as subscriptionfrom  azure_kubernetes_cluster c  left join azure_subscription as sub on sub.subscription_id = c.subscription_id;