Cloud Infrastructure Audit
Public Exposure
3
Storage accounts exposed to public internet.
Key Vault Policies
85%
Keys without rotation policy (GDPR risk).
Unencrypted DBs
0
Databases without mandatory encryption.
Role Assignments
78
Total custom role assignments.
Critical Cloud Resources
| Resource Name | Type / Location | Compliance | Risk Level | Details |
|---|---|---|---|---|
| Prod Data Storage | Storage Account (WEU) | Failed | High | |
| Dev Key Vault | Key Vault (WEU) | Warning | Medium | |
| SQL Database | Azure SQL (NEU) | Compliant | Low | |
| Shared Web App | App Service (WEU) | Compliant | Low |
Top Cloud Risks Detected
- Public IP addresses are assigned to 5 VMs, increasing attack surface.
- Key Vault 'prod-vault' lacks soft-delete and purge protection policies.
- 3 custom Azure RBAC roles grant excessive permissions outside their scope.