github.com/khulnasoft-lab/defsec@v1.0.5-0.20230827010352-5e9f46893d95/rules/cloud/policies/azure/database/all_threat_alerts_enabled.tf.go (about)

     1  package database
     2  
     3  var terraformAllThreatAlertsEnabledGoodExamples = []string{
     4  	`
     5   resource "azurerm_mssql_server_security_alert_policy" "good_example" {
     6     resource_group_name        = azurerm_resource_group.example.name
     7     server_name                = azurerm_sql_server.example.name
     8     state                      = "Enabled"
     9     storage_endpoint           = azurerm_storage_account.example.primary_blob_endpoint
    10     storage_account_access_key = azurerm_storage_account.example.primary_access_key
    11     disabled_alerts = []
    12     retention_days = 20
    13   }
    14   `,
    15  }
    16  
    17  var terraformAllThreatAlertsEnabledBadExamples = []string{
    18  	`
    19   resource "azurerm_mssql_server_security_alert_policy" "bad_example" {
    20     resource_group_name        = azurerm_resource_group.example.name
    21     server_name                = azurerm_sql_server.example.name
    22     state                      = "Enabled"
    23     storage_endpoint           = azurerm_storage_account.example.primary_blob_endpoint
    24     storage_account_access_key = azurerm_storage_account.example.primary_access_key
    25     disabled_alerts = [
    26       "Sql_Injection",
    27       "Data_Exfiltration"
    28     ]
    29     retention_days = 20
    30   }
    31   `,
    32  }
    33  
    34  var terraformAllThreatAlertsEnabledLinks = []string{
    35  	`https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs/resources/mssql_server_security_alert_policy#disabled_alerts`,
    36  }
    37  
    38  var terraformAllThreatAlertsEnabledRemediationMarkdown = ``