turbot/steampipe-mod-azure-compliance

Query: ad_security_defaults_policy_enabled

Usage

powerpipe query azure_compliance.query.ad_security_defaults_policy_enabled

SQL

with distinct_tenant as (
select
distinct tenant_id,
subscription_id,
_ctx
from
azure_tenant
)
select
p.id as resource,
case
when (p.is_enabled)::bool then 'ok'
else 'alarm'
end as status,
case
when (p.is_enabled)::bool then p.tenant_id || ' security defaults enabled.'
else p.tenant_id || ' security defaults disabled.'
end as reason,
t.tenant_id
from
distinct_tenant as t,
azuread_security_defaults_policy as p;

Controls

The query is being used by the following controls: