Benchmark: Compute
Description
This benchmark provides a set of controls that detect Terraform Azure Compute resources deviating from security best practices.
Usage
Install the mod:
mkdir dashboardscd dashboardspowerpipe mod initpowerpipe mod install github.com/turbot/steampipe-mod-terraform-azure-compliance
Start the Powerpipe server:
steampipe service startpowerpipe server
Open http://localhost:9033 in your browser and select Compute.
Run this benchmark in your terminal:
powerpipe benchmark run terraform_azure_compliance.benchmark.compute
Snapshot and share results via Turbot Pipes:
powerpipe benchmark run terraform_azure_compliance.benchmark.compute --share
Controls
- Managed disks should be encrypted
- Virtual machines should not allow extension operations
- Virtual machines and scale sets should have agent installed
- Virtual machines and virtual machine scale sets should have encryption at host enabled
- Linux Virtual machines and scale sets should enable SSH key authentication
- Windows Virtual machines and scale sets should have automatic updates enabled
- Azure Defender for servers should be enabled
- Linux virtual machines should disable password authentication
- Virtual machines should disable password authentication
- Deploy the Linux Guest Configuration extension to enable Guest Configuration assignments on Linux VMs
- Deploy the Windows Guest Configuration extension to enable Guest Configuration assignments on Windows VMs
- Guest Configuration extension should be installed on your machines
- Deploy default Microsoft IaaSAntimalware extension for Windows Server
- Compute virtual machine scale sets should have automatic OS image patching enabled
- Linux virtual machines scale sets should disable password authentication
- System updates should be installed on your machines
- Virtual machines should be migrated to new Azure Resource Manager resources
- IP Forwarding on your virtual machine should be disabled