Control: Enforce SSL connection should be enabled for PostgreSQL database servers
Description
Azure Database for PostgreSQL supports connecting your Azure Database for PostgreSQL server to client applications using Secure Sockets Layer (SSL). Enforcing SSL connections between your database server and your client applications helps protect against 'man in the middle' attacks by encrypting the data stream between the server and your application. This configuration enforces that SSL is always enabled for accessing your database server
Usage
Run the control in your terminal:
powerpipe control run terraform_azure_compliance.control.postgresql_ssl_enabledSnapshot and share results via Turbot Pipes:
powerpipe loginpowerpipe control run terraform_azure_compliance.control.postgresql_ssl_enabled --shareSQL
This control uses a named query:
select  address as resource,  case    when (attributes_std ->> 'ssl_enforcement_enabled') is null then 'alarm'    when (attributes_std ->> 'ssl_enforcement_enabled')::boolean then 'ok'    else 'alarm'  end status,  split_part(address, '.', 2) || case    when (attributes_std ->> 'ssl_enforcement_enabled') is null then ' ''ssl_enforcement_enabled'' not set'    when (attributes_std ->> 'ssl_enforcement_enabled')::boolean then ' SSL connection enabled'    else ' SSL connection disabled'  end || '.' reason    , path || ':' || start_linefrom  terraform_resourcewhere  type = 'azurerm_postgresql_server';