github.com/khulnasoft-lab/defsec@v1.0.5-0.20230827010352-5e9f46893d95/rules/cloud/policies/azure/database/enable_audit.tf.go (about)

     1  package database
     2  
     3  var terraformEnableAuditGoodExamples = []string{
     4  	`
     5   resource "azurerm_sql_server" "good_example" {
     6     name                         = "mssqlserver"
     7     resource_group_name          = azurerm_resource_group.example.name
     8     location                     = azurerm_resource_group.example.location
     9     version                      = "12.0"
    10     administrator_login          = "mradministrator"
    11     administrator_login_password = "terrasecRocks"
    12   
    13     extended_auditing_policy {
    14       storage_endpoint                        = azurerm_storage_account.example.primary_blob_endpoint
    15       storage_account_access_key              = azurerm_storage_account.example.primary_access_key
    16       storage_account_access_key_is_secondary = true
    17       retention_in_days                       = 6
    18     }
    19   }
    20   `,
    21  }
    22  
    23  var terraformEnableAuditBadExamples = []string{
    24  	`
    25   resource "azurerm_sql_server" "bad_example" {
    26     name                         = "mssqlserver"
    27     resource_group_name          = azurerm_resource_group.example.name
    28     location                     = azurerm_resource_group.example.location
    29     version                      = "12.0"
    30     administrator_login          = "mradministrator"
    31     administrator_login_password = "terrasecRocks"
    32   }
    33   `,
    34  }
    35  
    36  var terraformEnableAuditLinks = []string{
    37  	`https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs/resources/sql_server#extended_auditing_policy`,
    38  }
    39  
    40  var terraformEnableAuditRemediationMarkdown = ``