turbot/steampipe-mod-terraform-azure-compliance

Control: Azure Defender for DNS should be enabled

Description

Azure Defender for DNS provides an additional layer of protection for your cloud resources by continuously monitoring all DNS queries from your Azure resources. Azure Defender alerts you about suspicious activity at the DNS layer.

Usage

Run the control in your terminal:

powerpipe control run terraform_azure_compliance.control.dns_azure_defender_enabled

Snapshot and share results via Turbot Pipes:

powerpipe login
powerpipe control run terraform_azure_compliance.control.dns_azure_defender_enabled --share

SQL

This control uses a named query:

select
address as resource,
case
when (attributes_std ->> 'resource_type') = 'Dns' and (attributes_std ->> 'tier') = 'Standard' then 'ok'
else 'skip'
end status,
split_part(address, '.', 2) || case
when (attributes_std ->> 'resource_type') = 'Dns' and (attributes_std ->> 'tier') = 'Standard' then ' Dns azure defender enabled'
else ' Dns azure defender disabled'
end || '.' reason
, path || ':' || start_line
from
terraform_resource
where
type = 'azurerm_security_center_subscription_pricing';

Tags