turbot/terraform_azure_compliance

Control: Container registries should not allow unrestricted network access

Description

Azure container registries by default accept connections over the internet from hosts on any network. To protect your registries from potential threats, allow access from only specific public IP addresses or address ranges. If your registry doesn't have an IP/firewall rule or a configured virtual network, it will appear in the unhealthy resources.

Usage

Run the control in your terminal:

powerpipe control run terraform_azure_compliance.control.container_registry_restrict_public_access

Snapshot and share results via Turbot Pipes:

powerpipe login
powerpipe control run terraform_azure_compliance.control.container_registry_restrict_public_access --share

SQL

This control uses a named query:

container_registry_restrict_public_access

Tags