Skip to content

Commit

Permalink
feat(arm): add CKV_AZURE_137 Ensure ACR admin account is disabled (#6430
Browse files Browse the repository at this point in the history
)

* Add CKV_AZURE_137 to ARM

* fix

* Update ACRAdminAccountDisabled.py

* Update ACRAdminAccountDisabled.py
  • Loading branch information
chani6887 committed Jun 27, 2024
1 parent f25edae commit 8f3618b
Show file tree
Hide file tree
Showing 4 changed files with 139 additions and 0 deletions.
22 changes: 22 additions & 0 deletions checkov/arm/checks/resource/ACRAdminAccountDisabled.py
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
from __future__ import annotations
from typing import Any, List
from checkov.common.models.enums import CheckCategories
from checkov.arm.base_resource_negative_value_check import BaseResourceNegativeValueCheck


class ACRAdminAccountDisabled(BaseResourceNegativeValueCheck):
def __init__(self) -> None:
name = "Ensure ACR admin account is disabled"
id = "CKV_AZURE_137"
supported_resources = ("Microsoft.ContainerRegistry/registries",)
categories = [CheckCategories.IAM]
super().__init__(name=name, id=id, categories=categories, supported_resources=supported_resources)

def get_inspected_key(self) -> str:
return "properties/adminUserEnabled"

def get_forbidden_values(self) -> List[Any]:
return [True]


check = ACRAdminAccountDisabled()
Original file line number Diff line number Diff line change
@@ -0,0 +1,37 @@
{
"$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#",
"contentVersion": "1.0.0.1",
"resources": [
{
"apiVersion": "2019-05-01",
"type": "Microsoft.ContainerRegistry/registries",
"name": "fail",
"location": "[resourceGroup().location]",
"sku": {
"name": "Basic"
},
"properties": {
"adminUserEnabled": true,
"anonymousPullEnabled": true,
"dataEndpointEnabled": true,
"encryption": {
"keyVaultProperties": {
"identity": "someIdentity",
"keyIdentifier": "someKeyIdentifier"
},
"status": "enabled"
},
"networkRuleBypassOptions": "AzureServices",
"networkRuleSet": {
"defaultAction": "Deny",
"ipRules": [
{
"action": "Allow",
"value": "127.0.0.1"
}
]
}
}
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,37 @@
{
"$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#",
"contentVersion": "1.0.0.1",
"resources": [
{
"apiVersion": "2019-05-01",
"type": "Microsoft.ContainerRegistry/registries",
"name": "pass",
"location": "[resourceGroup().location]",
"sku": {
"name": "Standard"
},
"properties": {
"adminUserEnabled": false,
"anonymousPullEnabled": true,
"dataEndpointEnabled": true,
"encryption": {
"keyVaultProperties": {
"identity": "someIdentity",
"keyIdentifier": "someKeyIdentifier"
},
"status": "enabled"
},
"networkRuleBypassOptions": "AzureServices",
"networkRuleSet": {
"defaultAction": "Deny",
"ipRules": [
{
"action": "Allow",
"value": "127.0.0.1"
}
]
}
}
}
]
}
43 changes: 43 additions & 0 deletions tests/arm/checks/resource/test_ACRAdminAccountDisabled.py
Original file line number Diff line number Diff line change
@@ -0,0 +1,43 @@
import os
import unittest

from checkov.arm.checks.resource.ACRAdminAccountDisabled import check
from checkov.arm.runner import Runner
from checkov.runner_filter import RunnerFilter


class TestACRAdminAccountDisabled(unittest.TestCase):

def test_summary(self):
runner = Runner()
current_dir = os.path.dirname(os.path.realpath(__file__))

test_files_dir = current_dir + "/example_ACRAdminAccountDisabled"
report = runner.run(root_folder=test_files_dir,
runner_filter=RunnerFilter(checks=[check.id]))
summary = report.get_summary()

passing_resources = {
'Microsoft.ContainerRegistry/registries.pass',
}
failing_resources = {
'Microsoft.ContainerRegistry/registries.fail'
}
skipped_resources = {}

passed_check_resources = set([c.resource for c in report.passed_checks])
failed_check_resources = set([c.resource for c in report.failed_checks])



self.assertEqual(summary['passed'], len(passing_resources))
self.assertEqual(summary['failed'], len(failing_resources))
self.assertEqual(summary['skipped'], len(skipped_resources))
self.assertEqual(summary['parsing_errors'], 0)

self.assertEqual(passing_resources, passed_check_resources)
self.assertEqual(failing_resources, failed_check_resources)


if __name__ == '__main__':
unittest.main()

0 comments on commit 8f3618b

Please sign in to comment.