standard
turbot/azure_compliance

Pipeline: Detect & correct Key Vaults with RBAC secrets without expiration date

Detect Key Vaults with RBAC secrets that do not have an expiration date set and then set expiration date.

Run the pipeline

To run this pipeline from your terminal:

flowpipe pipeline run azure_compliance.pipeline.detect_and_correct_keyvault_with_rbac_secrets_expiration_not_set

Use this pipeline

To call this pipeline from your pipeline, use a step:

step "pipeline" "step_name" {
pipeline = azure_compliance.pipeline.detect_and_correct_keyvault_with_rbac_secrets_expiration_not_set
}

Params

NameTypeRequiredDescriptionDefault
database
connection.steampipe
YesDatabase connection string.connection.steampipe.default
notifier
notifier
YesThe name of the notifier to use for sending notification messages.notifier.default
notification_level
string
verbose, info, error
YesThe verbosity level of notification messages to send. Valid options are 'verbose', 'info', 'error'.info

Outputs

This pipeline has no outputs.

Tags

category = Compliance
plugin = azure
service = Azure/KeyVault