turbot/steampipe-mod-azure-compliance

Control: Ensure that soft delete for containers on Azure Blob Storage storage accounts is Enabled

Description

Containers in Azure storage accounts may contain sensitive or personal data, such as ePHI or financial information. Data that is erroneously modified or deleted by an application or a user can lead to data loss or unavailability.

Usage

Run the control in your terminal:

powerpipe control run azure_compliance.control.storage_account_container_soft_delete_enabled

Snapshot and share results via Turbot Pipes:

powerpipe login
powerpipe control run azure_compliance.control.storage_account_container_soft_delete_enabled --share

SQL

This control uses a named query:

select
sa.id as resource,
case
when
blob_container_soft_delete_enabled
and blob_container_soft_delete_retention_days between 7 and 365 then 'ok'
else 'alarm'
end as status,
case
when
blob_container_soft_delete_enabled
and blob_container_soft_delete_retention_days between 7 and 365 then
sa.name || ' container soft delete is enabled with retention days: ' || blob_container_soft_delete_retention_days || '.'
when
(not blob_container_soft_delete_enabled or blob_container_soft_delete_enabled is null) then
sa.name || ' container soft delete is disabled.'
when
blob_container_soft_delete_retention_days < 7 or blob_container_soft_delete_retention_days > 365 then
sa.name || ' container soft delete retention days (' || blob_container_soft_delete_retention_days::text || ') is not between 7 and 365 days.'
end as reason
, sa.resource_group as resource_group
, sub.display_name as subscription
from
azure_storage_account sa
left join azure_subscription sub on sub.subscription_id = sa.subscription_id;

Tags