standard
turbot/azure_compliance

Trigger: Detect & correct Storage Accounts with blob public access enabled

Detect Storage Accounts with blob public access enabled and then disable blob public access.

Query

select
concat(id, ' [', subscription_id, '/', resource_group, ']') as title,
id as id,
name,
resource_group,
subscription_id,
_ctx ->> 'connection_name' as conn
from
azure_storage_account
where
allow_blob_public_access;

Schedule

15m

Tags

category = Compliance
plugin = azure
service = Azure/Storage