terraform.azure.best-practice.azure-keyvault-enables-firewall-rules-settings.azure-keyvault-enables-firewall-rules-settings

profile photo of semgrepsemgrep
Author
unknown
Download Count*

Ensure that key vault allows firewall rules settings

Run Locally

Run in CI

Defintion

rules:
  - id: azure-keyvault-enables-firewall-rules-settings
    message: Ensure that key vault allows firewall rules settings
    patterns:
      - pattern: resource
      - pattern-not-inside: |
          resource "azurerm_key_vault" "..." {
          ...
          network_acls {
            ...
            default_action = "Deny"
            ...
          }
          ...
          }
      - pattern-inside: |
          resource "azurerm_key_vault" "..." {
          ...
          }
    metadata:
      category: best-practice
      technology:
        - terraform
        - azure
      license: Commons Clause License Condition v1.0[LGPL-2.1-only]
    languages:
      - hcl
    severity: WARNING

Examples

azure-keyvault-enables-firewall-rules-settings.tf

# fail
# ruleid: azure-keyvault-enables-firewall-rules-settings
resource "azurerm_key_vault" "example" {
    name                        = "examplekeyvault"
    location                    = azurerm_resource_group.example.location
    resource_group_name         = azurerm_resource_group.example.name
    enabled_for_disk_encryption = true
    tenant_id                   = data.azurerm_client_config.current.tenant_id
    soft_delete_retention_days  = 7
    purge_protection_enabled    = false

    sku_name = "standard"

    access_policy {
    tenant_id = data.azurerm_client_config.current.tenant_id
    object_id = data.azurerm_client_config.current.object_id

    key_permissions = [
        "Get",
    ]
    
    secret_permissions = [
        "Get",
    ]

    storage_permissions = [
        "Get",
    ]
    }
}

# fail
# ruleid: azure-keyvault-enables-firewall-rules-settings
resource "azurerm_key_vault" "example" {
    name                        = "examplekeyvault"
    location                    = azurerm_resource_group.example.location
    resource_group_name         = azurerm_resource_group.example.name
    enabled_for_disk_encryption = true
    tenant_id                   = data.azurerm_client_config.current.tenant_id
    soft_delete_retention_days  = 7
    purge_protection_enabled    = false
  
    sku_name = "standard"
  
    access_policy {
      tenant_id = data.azurerm_client_config.current.tenant_id
      object_id = data.azurerm_client_config.current.object_id
  
      key_permissions = [
        "Get",
      ]
  
      secret_permissions = [
        "Get",
      ]
  
      storage_permissions = [
        "Get",
      ]
    }
    network_acls {
      default_action = "Allow"
    }
}

# pass
resource "azurerm_key_vault" "example" {
    name                        = "examplekeyvault"
    location                    = azurerm_resource_group.example.location
    resource_group_name         = azurerm_resource_group.example.name
    enabled_for_disk_encryption = true
    tenant_id                   = data.azurerm_client_config.current.tenant_id
    soft_delete_retention_days  = 7
    purge_protection_enabled    = false
  
    sku_name = "standard"
  
    access_policy {
      tenant_id = data.azurerm_client_config.current.tenant_id
      object_id = data.azurerm_client_config.current.object_id
  
      key_permissions = [
        "Get",
      ]
      
      secret_permissions = [
        "Get",
      ]
  
      storage_permissions = [
        "Get",
      ]
    }
    network_acls {
      default_action = "Deny"
    }
}