Control: IP Forwarding on your virtual machine should be disabled
Description
Enabling IP forwarding on a virtual machine's NIC allows the machine to receive traffic addressed to other destinations. IP forwarding is rarely required (e.g., when using the VM as a network virtual appliance), and therefore, this should be reviewed by the network security team.
Usage
Run the control in your terminal:
powerpipe control run terraform_azure_compliance.control.network_interface_ip_forwarding_disabledSnapshot and share results via Turbot Pipes:
powerpipe loginpowerpipe control run terraform_azure_compliance.control.network_interface_ip_forwarding_disabled --shareSQL
This control uses a named query:
select  address as resource,  case    when (attributes_std ->> 'enable_ip_forwarding')::boolean then 'alarm'    else 'ok'  end as status,  split_part(address, '.', 2) || case    when (attributes_std ->> 'enable_ip_forwarding')::boolean then ' network interface enabled with IP forwarding'    else ' network interface disabled with IP forwarding'  end || '.' reason    , path || ':' || start_linefrom  terraform_resourcewhere  type = 'azurerm_network_interface'