turbot/terraform_azure_compliance

Control: Kubernetes cluster nodes should restrict public access

Description

Ensure Kubernetes cluster node do not have public IP addresses. This control is non-compliant if Kubernetes cluster node have a public IP address assigned.

Usage

Run the control in your terminal:

powerpipe control run terraform_azure_compliance.control.kubernetes_cluster_node_restrict_public_access

Snapshot and share results via Turbot Pipes:

powerpipe login
powerpipe control run terraform_azure_compliance.control.kubernetes_cluster_node_restrict_public_access --share

SQL

This control uses a named query:

kubernetes_cluster_node_restrict_public_access

Tags