title | platform |
---|---|
About the azure_key_vault_secrets Resource |
azure |
Use the azure_key_vault_secrets
InSpec audit resource to test properties and configuration of multiple of Azure secrets within vaults.
This resource interacts with api versions supported by the resource provider.
The api_version
can be defined as a resource parameter.
If not provided, the latest version will be used.
For more information, refer to azure_generic_resource
.
Unless defined, azure_cloud
global endpoint, and default values for the http client will be used.
For more information, refer to the resource pack README.
This resource is available in the InSpec Azure resource pack.
For an example inspec.yml
file and how to set up your Azure credentials, refer to resource pack README.
An azure_key_vault_secrets
resource block returns all secrets within a vault.
describe azure_key_vault_secrets(vault_name: 'example_vault') do
#...
end
vault_name
: The name of the vault.
Property | Description | Filter Criteria* |
---|---|---|
attributes | A list of the secret management attributes in this format. | attributes |
ids | A list of secret ids. | id |
managed | A list of boolean values indicating if the secrets are managed by key vault or not. | managed |
contentTypes | A list of content type of the secrets being interrogated. | contentType |
tags | A list of tag:value pairs defined on the resources being interrogated. |
tags |
* For information on how to use filter criteria on plural resources refer to FilterTable usage.
describe azure_key_vault_secrets(vault_name: 'example_vault').where { id.include?('my_secret')} do
it { should exist }
its('count') { should be 1 }
end
azure_key_vault_secrets(vault_name: 'example_vault').ids.each do |id|
describe azure_key_vault_secret(secret_id: id) do
it { should exist }
end
end
This InSpec audit resource has the following special matchers. For a full list of available matchers, please visit our Universal Matchers page.
The control will pass if the filter returns at least one result. Use should_not
if you expect zero matches.
# If we expect to have at least one secret in a vault
describe azure_key_vault_secrets(vault_name: 'example_vault') do
it { should exist }
end
# If we expect not have any secrets in a vault
describe azure_key_vault_secrets(vault_name: 'example_vault') do
it { should_not exist }
end
Your Service Principal must be setup with a contributor
role on the subscription you wish to test.