standard
turbot/azure_compliance
Get Involved
Version
Pipeline: Detect & correct Key Vaults with RBAC keys without expiration date
Detect Key Vaults with RBAC keys that do not have an expiration date set and then set expiration date.
Run the pipeline
To run this pipeline from your terminal:
flowpipe pipeline run azure_compliance.pipeline.detect_and_correct_keyvault_with_rbac_keys_expiration_not_set
Use this pipeline
To call this pipeline from your pipeline, use a step:
step "pipeline" "step_name" { pipeline = azure_compliance.pipeline.detect_and_correct_keyvault_with_rbac_keys_expiration_not_set }
Params
Name | Type | Required | Description | Default |
---|---|---|---|---|
database | connection.steampipe | Yes | Database connection string. | connection.steampipe.default |
notifier | notifier | Yes | The name of the notifier to use for sending notification messages. | notifier.default |
notification_level | string verbose , info , error | Yes | The verbosity level of notification messages to send. Valid options are 'verbose', 'info', 'error'. | info |
Outputs
This pipeline has no outputs.
Tags
category = Compliance
plugin = azure
service = Azure/KeyVault