standard
turbot/azure_compliance
Get Involved
Version
Pipeline: Detect & correct Key Vaults with RBAC secrets without expiration date
Detect Key Vaults with RBAC secrets that do not have an expiration date set and then set expiration date.
Run the pipeline
To run this pipeline from your terminal:
flowpipe pipeline run azure_compliance.pipeline.detect_and_correct_keyvault_with_rbac_secrets_expiration_not_set
Use this pipeline
To call this pipeline from your pipeline, use a step:
step "pipeline" "step_name" { pipeline = azure_compliance.pipeline.detect_and_correct_keyvault_with_rbac_secrets_expiration_not_set }
Params
Name | Type | Required | Description | Default |
---|---|---|---|---|
database | connection.steampipe | Yes | Database connection string. | connection.steampipe.default |
notifier | notifier | Yes | The name of the notifier to use for sending notification messages. | notifier.default |
notification_level | string verbose , info , error | Yes | The verbosity level of notification messages to send. Valid options are 'verbose', 'info', 'error'. | info |
Outputs
This pipeline has no outputs.
Tags
category = Compliance
plugin = azure
service = Azure/KeyVault