standard
turbot/azure_compliance

Pipeline: Detect & correct Key Vaults with RBAC keys without expiration date

Detect Key Vaults with RBAC keys that do not have an expiration date set and then set expiration date.

Run the pipeline

To run this pipeline from your terminal:

flowpipe pipeline run azure_compliance.pipeline.detect_and_correct_keyvault_with_rbac_keys_expiration_not_set

Use this pipeline

To call this pipeline from your pipeline, use a step:

step "pipeline" "step_name" {
pipeline = azure_compliance.pipeline.detect_and_correct_keyvault_with_rbac_keys_expiration_not_set
}

Params

NameTypeRequiredDescriptionDefault
database
connection.steampipe
YesDatabase connection string.connection.steampipe.default
notifier
notifier
YesThe name of the notifier to use for sending notification messages.notifier.default
notification_level
string
verbose, info, error
YesThe verbosity level of notification messages to send. Valid options are 'verbose', 'info', 'error'.info

Outputs

This pipeline has no outputs.

Tags

category = Compliance
plugin = azure
service = Azure/KeyVault