Control: Kubernetes cluster nodes should restrict public access
Description
Ensure Kubernetes cluster node do not have public IP addresses. This control is non-compliant if Kubernetes cluster node have a public IP address assigned.
Usage
Run the control in your terminal:
powerpipe control run terraform_azure_compliance.control.kubernetes_cluster_node_restrict_public_access
Snapshot and share results via Turbot Pipes:
powerpipe loginpowerpipe control run terraform_azure_compliance.control.kubernetes_cluster_node_restrict_public_access --share
SQL
This control uses a named query:
kubernetes_cluster_node_restrict_public_access