Control: Container registries should not allow unrestricted network access
Description
Azure container registries by default accept connections over the internet from hosts on any network. To protect your registries from potential threats, allow access from only specific public IP addresses or address ranges. If your registry doesn't have an IP/firewall rule or a configured virtual network, it will appear in the unhealthy resources.
Usage
Run the control in your terminal:
powerpipe control run terraform_azure_compliance.control.container_registry_restrict_public_access
Snapshot and share results via Turbot Pipes:
powerpipe loginpowerpipe control run terraform_azure_compliance.control.container_registry_restrict_public_access --share
SQL
This control uses a named query:
container_registry_restrict_public_access