turbot/steampipe-mod-terraform-azure-compliance

Control: Custom subscription administrator roles should not exist

Description

The principle of least privilege should be followed and only necessary privileges should be assigned instead of allowing full administrative access.

Usage

Run the control in your terminal:

powerpipe control run terraform_azure_compliance.control.iam_no_custom_subscription_owner_roles_created

Snapshot and share results via Turbot Pipes:

powerpipe login
powerpipe control run terraform_azure_compliance.control.iam_no_custom_subscription_owner_roles_created --share

SQL

This control uses a named query:

select
address as resource,
case
when (attributes_std -> 'permissions' -> 'actions') @> '["*"]' then 'alarm'
else 'ok'
end status,
split_part(address, '.', 2) || case
when (attributes_std -> 'permissions' -> 'actions') @> '["*"]' then 'has custom owner roles'
else ' does not have custom owner roles'
end || '.' reason
, path || ':' || start_line
from
terraform_resource
where
type = 'azurerm_role_definition';

Tags