turbot/steampipe-mod-azure-compliance

Query: ad_custom_banned_password_enforced

Usage

powerpipe query azure_compliance.query.ad_custom_banned_password_enforced

SQL

with distinct_tenant as (
select
distinct tenant_id,
display_name,
subscription_id,
_ctx
from
azure_tenant
)
select
id as resource,
case
when (value)::bool then 'ok'
else 'alarm'
end as status,
case
when (value)::bool then t.display_name || ' custom banned password list is enforced.'
else
t.display_name || ' custom banned password list is not enforced'
end as reason,
t.tenant_id
from
distinct_tenant as t,
azuread_directory_setting
where
name = 'EnableBannedPasswordCheck';

Controls

The query is being used by the following controls: