turbot/steampipe-mod-terraform-azure-compliance

Control: Ensure that Azure Defender is set to On for Key Vault

Description

Turning on Azure Defender enables threat detection for Key Vault, providing threat intelligence, anomaly detection, and behavior analytics in the Azure Security Center.

Usage

Run the control in your terminal:

powerpipe control run terraform_azure_compliance.control.securitycenter_azure_defender_on_for_keyvault

Snapshot and share results via Turbot Pipes:

powerpipe login
powerpipe control run terraform_azure_compliance.control.securitycenter_azure_defender_on_for_keyvault --share

SQL

This control uses a named query:

select
address as resource,
case
when (attributes_std ->> 'resource_type') = 'KeyVaults' and (attributes_std ->> 'tier') = 'Standard' then 'ok'
else 'skip'
end status,
split_part(address, '.', 2) || case
when (attributes_std ->> 'resource_type') = 'KeyVaults' and (attributes_std ->> 'tier') = 'Standard' then ' Azure Defender on for Key Vaults'
else ' Azure Defender off for Key Vaults'
end || '.' reason
, path || ':' || start_line
from
terraform_resource
where
type = 'azurerm_security_center_subscription_pricing';

Tags