Control: Kusto clusters should use managed identities
Description
Use a managed identity for enhanced authentication security.
Usage
Run the control in your terminal:
powerpipe control run terraform_azure_compliance.control.kusto_cluster_uses_managed_identitySnapshot and share results via Turbot Pipes:
powerpipe loginpowerpipe control run terraform_azure_compliance.control.kusto_cluster_uses_managed_identity --shareSQL
This control uses a named query:
select  address as resource,  case    when (attributes_std -> 'identity') is null then 'alarm'    else 'ok'  end status,  split_part(address, '.', 2) || case    when (attributes_std -> 'identity') is null then ' ''identity'' is not defined'    else ' uses ' || (attributes_std -> 'identity' ->> 'type') || ' identity'  end || '.' reason    , path || ':' || start_linefrom  terraform_resourcewhere  type = 'azurerm_kusto_cluster';