Comprehensive Azure compliance and security auditing capabilities including best practices assessment, Key Vault expiration monitoring, and resource configuration validation. WHEN: compliance scan, security audit, azqr, Azure best practices, Key Vault expiration check, compliance assessment, resource review, configuration validation, expired certificates, expiring secrets, orphaned resources, policy compliance, security posture evaluation.
Install with Tessl CLI
npx tessl i github:microsoft/azure-skills --skill azure-compliance85
Quality
78%
Does it follow best practices?
Impact
96%
1.47xAverage score across 3 eval scenarios
Optimize this skill with Tessl
npx tessl skill review --optimize ./.github/plugins/azure-skills/skills/azure-compliance/SKILL.mdKey Vault expiration audit report
Summary statistics section
40%
100%
Critical issues section
100%
100%
Warnings section
100%
62%
Risks section
75%
50%
Recommendations section
100%
100%
Critical priority tier
100%
100%
High priority tier
100%
100%
Medium priority tier
100%
100%
No-expiration as security risk
80%
90%
Rotation schedule recommendation
100%
100%
All resource types covered
100%
100%
Disabled items noted
100%
100%
Without context: $0.2606 · 1m 30s · 8 turns · 13 in / 5,452 out tokens
With context: $0.5183 · 2m 10s · 20 turns · 23 in / 7,616 out tokens
azqr compliance assessment structured report
Report header with scope info
100%
100%
Severity summary table
100%
100%
Security category present
100%
100%
Reliability category present
100%
100%
Cost category present
100%
100%
Operations category present
100%
100%
Critical severity for public blob
100%
100%
Recommended actions section
100%
100%
Remediation explains risk
100%
100%
Next steps section
87%
100%
Remediation options mentioned
100%
100%
Separate analysis from remediation
62%
75%
Without context: $0.2920 · 1m 37s · 10 turns · 15 in / 5,741 out tokens
With context: $0.4382 · 1m 46s · 13 turns · 2,863 in / 6,104 out tokens
Resource Graph queries and production auth patterns
ManagedIdentityCredential in production
0%
100%
DefaultAzureCredential for local dev
0%
100%
Environment-aware credential selection
0%
100%
Resource-graph extension prerequisite
0%
100%
Resource Graph query method
0%
100%
Case-insensitive type matching
0%
100%
Properties dot-notation in KQL
0%
100%
Compliance query for misconfiguration
0%
100%
No hardcoded credentials
100%
100%
Without context: $0.2921 · 1m 26s · 19 turns · 25 in / 4,919 out tokens
With context: $0.4418 · 1m 45s · 20 turns · 1,195 in / 6,322 out tokens
Table of Contents
If you maintain this skill, you can claim it as your own. Once claimed, you can manage eval scenarios, bundle related skills, attach documentation or rules, and ensure cross-agent compatibility.