standard
turbot/azure_compliance

Pipeline: Detect & correct NSGs allowing inbound to SSH port

Detect NSGs that allow inbound from 0.0.0.0/0 to SSH port and then revoke NSG rule.

Run the pipeline

To run this pipeline from your terminal:

flowpipe pipeline run azure_compliance.pipeline.detect_and_correct_network_security_groups_allowing_inbound_to_ssh_port

Use this pipeline

To call this pipeline from your pipeline, use a step:

step "pipeline" "step_name" {
pipeline = azure_compliance.pipeline.detect_and_correct_network_security_groups_allowing_inbound_to_ssh_port
}

Params

NameTypeRequiredDescriptionDefault
database
connection.steampipe
YesDatabase connection string.connection.steampipe.default
notifier
notifier
YesThe name of the notifier to use for sending notification messages.notifier.default
notification_level
string
verbose, info, error
YesThe verbosity level of notification messages to send. Valid options are 'verbose', 'info', 'error'.info
approvers
list(notifier)
YesList of notifiers to be used for obtaining action/approval decisions.notifier.default
default_action
string
notify, skip, revoke_nsg_rule
YesThe default action to use when there are no approvers.notify
enabled_actions
list(string)
skip, revoke_nsg_rule
YesThe list of enabled actions to provide to approvers for selection.
[
"skip",
"revoke_nsg_rule"
]

Outputs

This pipeline has no outputs.

Tags

category = Compliance
plugin = azure
service = Azure/Network