Control: IP Forwarding on your virtual machine should be disabled
Description
Enabling IP forwarding on a virtual machine's NIC allows the machine to receive traffic addressed to other destinations. IP forwarding is rarely required (e.g., when using the VM as a network virtual appliance), and therefore, this should be reviewed by the network security team.
Usage
Run the control in your terminal:
powerpipe control run terraform_azure_compliance.control.network_interface_ip_forwarding_disabled
Snapshot and share results via Turbot Pipes:
powerpipe loginpowerpipe control run terraform_azure_compliance.control.network_interface_ip_forwarding_disabled --share
SQL
This control uses a named query:
select address as resource, case when (attributes_std ->> 'enable_ip_forwarding')::boolean then 'alarm' else 'ok' end as status, split_part(address, '.', 2) || case when (attributes_std ->> 'enable_ip_forwarding')::boolean then ' network interface enabled with IP forwarding' else ' network interface disabled with IP forwarding' end || '.' reason , path || ':' || start_linefrom terraform_resourcewhere type = 'azurerm_network_interface'