github.com/khulnasoft-lab/defsec@v1.0.5-0.20230827010352-5e9f46893d95/rules/cloud/policies/azure/database/all_threat_alerts_enabled.tf.go (about) 1 package database 2 3 var terraformAllThreatAlertsEnabledGoodExamples = []string{ 4 ` 5 resource "azurerm_mssql_server_security_alert_policy" "good_example" { 6 resource_group_name = azurerm_resource_group.example.name 7 server_name = azurerm_sql_server.example.name 8 state = "Enabled" 9 storage_endpoint = azurerm_storage_account.example.primary_blob_endpoint 10 storage_account_access_key = azurerm_storage_account.example.primary_access_key 11 disabled_alerts = [] 12 retention_days = 20 13 } 14 `, 15 } 16 17 var terraformAllThreatAlertsEnabledBadExamples = []string{ 18 ` 19 resource "azurerm_mssql_server_security_alert_policy" "bad_example" { 20 resource_group_name = azurerm_resource_group.example.name 21 server_name = azurerm_sql_server.example.name 22 state = "Enabled" 23 storage_endpoint = azurerm_storage_account.example.primary_blob_endpoint 24 storage_account_access_key = azurerm_storage_account.example.primary_access_key 25 disabled_alerts = [ 26 "Sql_Injection", 27 "Data_Exfiltration" 28 ] 29 retention_days = 20 30 } 31 `, 32 } 33 34 var terraformAllThreatAlertsEnabledLinks = []string{ 35 `https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs/resources/mssql_server_security_alert_policy#disabled_alerts`, 36 } 37 38 var terraformAllThreatAlertsEnabledRemediationMarkdown = ``