turbot/terraform_azure_compliance

Control: Public network access on Azure SQL Database should be disabled

Description

Disabling the public network access property improves security by ensuring your Azure SQL Database can only be accessed from a private endpoint. This configuration denies all logins that match IP or virtual network based firewall rules.

Usage

Run the control in your terminal:

powerpipe control run terraform_azure_compliance.control.sql_db_public_network_access_disabled

Snapshot and share results via Turbot Pipes:

powerpipe login
powerpipe control run terraform_azure_compliance.control.sql_db_public_network_access_disabled --share

SQL

This control uses a named query:

sql_db_public_network_access_disabled

Tags