AzSK.psm1

Set-StrictMode -Version Latest
Write-Host "Importing Az modules. This may take a while..." -ForegroundColor Yellow
Import-Module Az.Accounts -RequiredVersion 1.6.0 -WarningAction SilentlyContinue

. $PSScriptRoot\Framework\Framework.ps1


@("$PSScriptRoot\SVT", "$PSScriptRoot\AlertMonitoring", "$PSScriptRoot\SubscriptionSecurity", "$PSScriptRoot\ContinuousAssurance" , "$PSScriptRoot\AzSKInfo", "$PSScriptRoot\PolicySetup", "$PSScriptRoot\ARMChecker","$PSScriptRoot\PIM","$PSScriptRoot\CredHygiene", "$PSScriptRoot\InClusterCA") |
    ForEach-Object {
    (Get-ChildItem -Path $_ -Recurse -File -Include "*.ps1") |
        ForEach-Object {
        . $_.FullName
    }
}
#create aliases
function Get-AzSKAccessToken {
    <#
    .SYNOPSIS
    This command would help in generating the access token from the current login context for the specified resource URI.
    .DESCRIPTION
    This command would help in generating the access token from the current login context for the specified resource URI.
 
    .PARAMETER ResourceAppIdURI
        Provide the Resource App ID URI
    .PARAMETER TenantId
        Current logged in user tenant id.
 
    .LINK
    https://aka.ms/azskossdocs
 
    #>

    Param(
        [Parameter(Mandatory = $true, HelpMessage = "Provide the Resource App ID URI")]
        [string]
        [Alias("rau")]
        $ResourceAppIdURI,

        [Parameter(Mandatory = $false, HelpMessage = "Current logged in user tenant id.")]
        [string]
        [Alias("ti")]
        $TenantId
    )
    Begin 
    {
        [CommandHelper]::BeginCommand($MyInvocation);
    }
    Process 
    {
        try 
        {
            [ContextHelper]::GetAccessToken($ResourceAppIdURI, $TenantId);        
        }
        catch 
        {
            [EventBase]::PublishGenericException($_);
        }
    } 
}

function Get-AzSKSupportedResourceTypes {
    <#
    .SYNOPSIS
    This command would list all the resource types of Azure Services which are currently supported by AzSK
    .DESCRIPTION
    This command would list all the resource types of Azure Services which are currently supported by AzSK
 
    .LINK
    https://aka.ms/azskossdocs
 
    #>

    Param()
    Begin 
    {
        [CommandHelper]::BeginCommand($MyInvocation);
    }
    Process 
    {
        try 
        {
            [SVTMapping]::Mapping | Where-Object { $_.ResourceTypeName} | Select-Object -Property ResourceTypeName, ResourceType | Sort-Object -Property ResourceTypeName;
        }
        catch 
        {
            [EventBase]::PublishGenericException($_);
        }
    }
}

function Set-AzSKPolicySettings {
    <#
    .SYNOPSIS
    This command would help to set online policy store URL.
    .DESCRIPTION
    This command would help to set online policy store URL.
 
    .PARAMETER OnlinePolicyStoreURL
        Provide the online policy URL
    .PARAMETER DisableOnlinePolicy
        Flag to disable online policy.
    .PARAMETER EnableAADAuthForOnlinePolicyStore
        Enables AAD authentication for online policy store.
    .PARAMETER EnableOnlinePolicy
        Provide the flag to enable online policy
    .PARAMETER AutoUpdateCommand
            Provide org install URL
    .PARAMETER AutoUpdate
            Toggle the auto-update feature
        .PARAMETER DisableOrgPolicyCheckForSession
        Disable org-policy check for current session
     
    .LINK
    https://aka.ms/azskossdocs
 
    #>

    Param(
        [Parameter(Mandatory = $false, HelpMessage = "Provide the Online Policy Store URI")]
        [string]
        [Alias("opu")]
        $OnlinePolicyStoreUrl,

        [Parameter(Mandatory = $false, HelpMessage = "Provide the local policy folder path")]
        [string]
        [Alias("lopf")]
        $LocalOrgPolicyFolderPath,

        [Parameter(Mandatory = $false, HelpMessage = "Provide the flag to enable online policy")]
        [switch]
        [Alias("eop")]
        $EnableOnlinePolicy,

        [Parameter(Mandatory = $false, HelpMessage = "Provide your Azure Environment")]
        [string]
        [Alias("ae")]
        $AzureEnvironment,

        [Parameter(Mandatory = $false, HelpMessage = "Provide the flag to disable online policy")]
        [switch]
        [Alias("dop")]
        $DisableOnlinePolicy,

        [Parameter(Mandatory = $false, HelpMessage = "Provide the flag to enable auth for online policy")]
        [switch]
        [Alias("eaop")]
        $EnableAADAuthForOnlinePolicyStore,

        [Parameter(Mandatory = $false, HelpMessage = "Provide org install URL")]
        [string]
        [Alias("auc")]
        $AutoUpdateCommand,

        [Parameter(Mandatory = $false, ParameterSetName = "AutoUpdatePolicy", HelpMessage = "Toggle the auto-update feature")]
        [ValidateSet("On", "Off", "NotSet")]
        [Alias("au")]
        $AutoUpdate,

        [Parameter(Mandatory = $true, ParameterSetName = "CACentralMode")]
        [switch]
        $EnableCentralScanMode,

        [Parameter(Mandatory = $false, HelpMessage = "Provide the flag to disable org-policy check for current session")]
        [switch]
        [Alias("dopc")]
        $DisableOrgPolicyCheckForSession
    )
    Begin {
        [CommandHelper]::BeginCommand($PSCmdlet.MyInvocation);
        [AzListenerHelper]::RegisterListeners();
    }
    Process {
        try {

            # This setting will disable the mandatory org-policy check for azsk cmdlets in current session. To enable this policy check, use a fresh PS session.
        # This is independent of AzSKSettings.json file.
            if ($DisableOrgPolicyCheckForSession) {
                [CommandHelper]::Mapping | ForEach-Object {
                    $_.IsOrgPolicyMandatory = $false
                }
            }

        $azskSettings = [ConfigurationManager]::GetLocalAzSKSettings();
            if (-not [string]::IsNullOrWhiteSpace($OnlinePolicyStoreUrl)) {
                try {
                    $url = [System.Net.WebRequest]::Create($OnlinePolicyStoreUrl)
                }
                catch {
                    [EventBase]::PublishGenericCustomMessage("Enter valid URL : $OnlinePolicyStoreUrl", [MessageType]::Error);
                    return
                }

                $azskSettings.OnlinePolicyStoreUrl = $OnlinePolicyStoreUrl

                if ($EnableAADAuthForOnlinePolicyStore) {
                    $azskSettings.EnableAADAuthForOnlinePolicyStore = $true
                }
                else {
                    $azskSettings.EnableAADAuthForOnlinePolicyStore = $false
                }
            }

            #Set local policy folder path to OnlinePolicyStoreUrl. At runtime it will detect its folder path and starting running cmdlets with local policy.
            if($LocalOrgPolicyFolderPath)
            {
                if((-not[string]::IsNullOrWhiteSpace($LocalOrgPolicyFolderPath)) -and (Test-Path $LocalOrgPolicyFolderPath))
                {
                    $azskSettings.OnlinePolicyStoreUrl = $LocalOrgPolicyFolderPath
                }
                else {
                    
                    [EventBase]::PublishGenericCustomMessage("Policy folder does not exists. Enter valid policy folder path: $LocalOrgPolicyFolderPath", [MessageType]::Error);
                    return
                }
            }

            if ($EnableAADAuthForOnlinePolicyStore) {
                $azskSettings.EnableAADAuthForOnlinePolicyStore = $true
            }

            if ($DisableOnlinePolicy) {
                $azskSettings.UseOnlinePolicyStore = $false
            }

            if ($EnableOnlinePolicy) {
                $azskSettings.UseOnlinePolicyStore = $true
            }

            if (-not [string]::IsNullOrWhiteSpace($AutoUpdateCommand)) {
                $azskSettings.AutoUpdateCommand = $AutoUpdateCommand;
            }

            if ($AutoUpdate) {
                $azskSettings.AutoUpdateSwitch = $AutoUpdate
            }
            if($EnableCentralScanMode)
            {
                 $azskSettings.IsCentralScanModeOn = $EnableCentralScanMode
            }
            if ($AzureEnvironment) {
                $azskSettings.AzureEnvironment = $AzureEnvironment
            }
            else {
                $azskSettings.AzureEnvironment = [Constants]::DefaultAzureEnvironment
            }
            [ConfigurationManager]::UpdateAzSKSettings($azskSettings);
            [ConfigOverride]::ClearConfigInstance();            
            [EventBase]::PublishGenericCustomMessage("Successfully configured policy settings.", [MessageType]::Warning);
        }
        catch {
            [EventBase]::PublishGenericException($_);
        }
    }
    End {
        [AzListenerHelper]::UnregisterListeners();
    }
}

function Set-AzSKLocalAIOrgTelemetrySettings {
    <#
    .SYNOPSIS
    This command would help to set local control telemetry settings.
    .DESCRIPTION
    This command would help to set local control telemetry settings.
 
    .PARAMETER LocalAIOrgTelemetryKey
        Provide local telemetry key.
    .PARAMETER EnableLocalAIOrgTelemetry
        Enables local control telemetry.
    .LINK
    https://aka.ms/azskossdocs
 
    #>

    Param(
        [Parameter(Mandatory = $true, HelpMessage = "Provide the local control telemetry key")]
        [string]
        [Alias("lotk")]
        $LocalAIOrgTelemetryKey,

        [Parameter(Mandatory = $true, HelpMessage = "Provide the flag to enable local control telemetry")]
        [bool]
        [Alias("elot")]
        $EnableLocalAIOrgTelemetry
    )
    Begin {
        [CommandHelper]::BeginCommand($PSCmdlet.MyInvocation);
        [AzListenerHelper]::RegisterListeners();
    }
    Process {
        try { 
            $azskSettings = [ConfigurationManager]::GetLocalAzSKSettings();
            $azskSettings.LocalControlTelemetryKey = $LocalAIOrgTelemetryKey
            $azskSettings.LocalEnableControlTelemetry = $EnableLocalAIOrgTelemetry
            [ConfigurationManager]::UpdateAzSKSettings($azskSettings);
            [EventBase]::PublishGenericCustomMessage("Successfully set control telemetry settings");
        }
        catch {
            [EventBase]::PublishGenericException($_);
        }
    }
    End {
        [AzListenerHelper]::UnregisterListeners();
    }
}

function Set-AzSKUsageTelemetryLevel {
    <#
    .SYNOPSIS
    This command would help to set telemetry level.
    .DESCRIPTION
    This command would help to set telemetry level.
 
    .PARAMETER Level
        Provide the telemetry level
    .LINK
    https://aka.ms/azskossdocs
 
    #>

    Param(
        [Parameter(Mandatory = $true, HelpMessage = "Provide the telemetry level")]
        [ValidateSet("None", "Anonymous")]
        [string]
        [Alias("lvl")]
        $Level
    )
    Begin {
        [CommandHelper]::BeginCommand($PSCmdlet.MyInvocation);
        [AzListenerHelper]::RegisterListeners();
    }
    Process {
        try {
            $azskSettings = [ConfigurationManager]::GetLocalAzSKSettings();
            $azskSettings.UsageTelemetryLevel = $Level
            [ConfigurationManager]::UpdateAzSKSettings($azskSettings);
            [EventBase]::PublishGenericCustomMessage("Successfully set usage telemetry level");
        }
        catch {
            [EventBase]::PublishGenericException($_);
        }
    }
    End {
        [AzListenerHelper]::UnregisterListeners();
    }
}

function Set-AzSKUserPreference {
    <#
    .SYNOPSIS
    This command would help to set user preferences for AzSK.
    .DESCRIPTION
    This command would help to set user preferences for AzSK.
 
    .PARAMETER OutputFolderPath
    Provide the custom folder path for output files generated from AzSK
    .PARAMETER ResetOutputFolderPath
    Reset the output folder path to default value
    .PARAMETER DoNotOpenOutputFolder
    Switch to specify whether to open output folder.
    .LINK
    https://aka.ms/azskossdocs
 
    #>

    Param
    (
        [Parameter(Mandatory = $true, ParameterSetName = "Set OutputFolderPath", HelpMessage = "Provide the custom folder path for output files generated from AzSK")]
        [string]
        [Alias("ofp")]
        $OutputFolderPath,

        [Parameter(Mandatory = $true, ParameterSetName = "Reset OutputFolderPath", HelpMessage = "Reset the output folder path to default value")]
        [switch]
        [Alias("rofp")]
        $ResetOutputFolderPath,

        [switch]
        [Parameter(Mandatory = $false, HelpMessage = "Switch to specify whether to open output folder.")]
        [Alias("dnof")]
        $DoNotOpenOutputFolder,

        [switch]
        [Parameter(Mandatory = $true, ParameterSetName = "EnableComplianceStorage", HelpMessage = "Switch to enable storage of compliance report data at subscription.")]
        [Alias("scus")]
        $StoreComplianceSummaryInUserSubscriptions,

        [switch]
        [Parameter(Mandatory = $false, ParameterSetName = "DisableComplianceStorage", HelpMessage = "Switch to disable storage of compliance report data at subscription.")]
        [Alias("dcsus")]
        $DisableComplianceSummaryStorageInUserSubscriptions
    )
    Begin {
        [CommandHelper]::BeginCommand($PSCmdlet.MyInvocation);
        [AzListenerHelper]::RegisterListeners();
    }
    Process {
        try {
            $azskSettings = [ConfigurationManager]::GetLocalAzSKSettings();
            if ($ResetOutputFolderPath) {
                
                $azskSettings.OutputFolderPath = "";
                [EventBase]::PublishGenericCustomMessage("Output folder path has been reset successfully");
            }
            elseif (-not [string]::IsNullOrWhiteSpace($OutputFolderPath)) {
                if (Test-Path -Path $OutputFolderPath) {                    
                    $azskSettings.OutputFolderPath = $OutputFolderPath;
                    [EventBase]::PublishGenericCustomMessage("Output folder path has been changed successfully");
                }
                else {
                    [EventBase]::PublishGenericCustomMessage("The specified path does not exist", [MessageType]::Error);
                }
            }
            
            if($StoreComplianceSummaryInUserSubscriptions)
            {
                $azskSettings.StoreComplianceSummaryInUserSubscriptions = $true;
            }
            if($DisableComplianceSummaryStorageInUserSubscriptions)
            {
                $azskSettings.StoreComplianceSummaryInUserSubscriptions = $false;
            }
            
            [ConfigurationManager]::UpdateAzSKSettings($azskSettings);
            [EventBase]::PublishGenericCustomMessage("Successfully set user preference");
        }
        catch {
            [EventBase]::PublishGenericException($_);
        }
    }
    End {
        [AzListenerHelper]::UnregisterListeners();
    }
}

function Send-AzSKInternalData {
    <#
    .SYNOPSIS
    This command is for internal use. Not recommended to run until advised by support team.
    .DESCRIPTION
    This command is for internal use. Not recommended to run until advised by support team.
 
    .PARAMETER SubscriptionId
        Subscription id for which the data to be sent.
 
    .LINK
    https://aka.ms/azskossdocs
 
    #>

    Param
    (
        [string]
        [Parameter(Mandatory = $true, HelpMessage="Subscription id for which the data to be sent.")]
        [ValidateNotNullOrEmpty()]
        [Alias("sid","s")]
        $SubscriptionId
    )
    Begin {
        [CommandHelper]::BeginCommand($PSCmdlet.MyInvocation);
        [AzListenerHelper]::RegisterListeners();
    }
    Process {
        try {
            $resolver = [SVTResourceResolver]::new($SubscriptionId);
            $secStatus = [ServicesSecurityStatus]::new($SubscriptionId, $PSCmdlet.MyInvocation, $resolver);
            if ($secStatus) {                
            return $secStatus.InvokeFunction($secStatus.ComputeApplicableControls)               
            }
        }
        catch {
            [EventBase]::PublishGenericException($_);
        }
    }
    End {
        [AzListenerHelper]::UnregisterListeners();
    }
}

function Set-AzSKPrivacyNoticeResponse {
    <#
    .SYNOPSIS
    This command would help to set user preferences for EULA and Privacy.
    .DESCRIPTION
    This command would help to set user preferences for EULA and Privacy.
 
    .PARAMETER AcceptPrivacyNotice
        Provide the flag to suppress the Privacy notice prompt and submit the acceptance. (Yes/No)
 
    .LINK
    https://aka.ms/azskossdocs
 
    #>

    Param
    (
        [Parameter(Mandatory = $true, HelpMessage = "Provide the flag to suppress the Privacy notice prompt and submit the acceptance. (Yes/No)")]
        [string]
        [ValidateSet("Yes", "No")]
        [Alias("apn")]
        $AcceptPrivacyNotice
    )
    Begin {
        [CommandHelper]::BeginCommand($PSCmdlet.MyInvocation);
        [AzListenerHelper]::RegisterListeners();
    }
    Process {
        try {
            $azskSettings = [ConfigurationManager]::GetLocalAzSKSettings();

            if ($AcceptPrivacyNotice -eq "yes") {
                $azskSettings.PrivacyNoticeAccepted = $true
                $azskSettings.UsageTelemetryLevel = "Anonymous"
            }

            if ($AcceptPrivacyNotice -eq "no") {
                $azskSettings.PrivacyNoticeAccepted = $false
                $azskSettings.UsageTelemetryLevel = "None"
            }
            [ConfigurationManager]::UpdateAzSKSettings($azskSettings)
            [EventBase]::PublishGenericCustomMessage("Successfully updated privacy settings.");
        }
        catch {
            [EventBase]::PublishGenericException($_);
        }

    }
    End {
        [AzListenerHelper]::UnregisterListeners();
    }
}

function Clear-AzSKSessionState {

    Write-Host "Clearing AzSK session state..." -ForegroundColor Yellow
    [ConfigOverride]::ClearConfigInstance()
    Write-Host "Session state cleared." -ForegroundColor Yellow

}

$FrameworkPath = $PSScriptRoot

. $FrameworkPath\Framework\Helpers\AliasHelper.ps1