github.com/khulnasoft-lab/defsec@v1.0.5-0.20230827010352-5e9f46893d95/rules/cloud/policies/azure/database/enable_audit.tf.go (about) 1 package database 2 3 var terraformEnableAuditGoodExamples = []string{ 4 ` 5 resource "azurerm_sql_server" "good_example" { 6 name = "mssqlserver" 7 resource_group_name = azurerm_resource_group.example.name 8 location = azurerm_resource_group.example.location 9 version = "12.0" 10 administrator_login = "mradministrator" 11 administrator_login_password = "terrasecRocks" 12 13 extended_auditing_policy { 14 storage_endpoint = azurerm_storage_account.example.primary_blob_endpoint 15 storage_account_access_key = azurerm_storage_account.example.primary_access_key 16 storage_account_access_key_is_secondary = true 17 retention_in_days = 6 18 } 19 } 20 `, 21 } 22 23 var terraformEnableAuditBadExamples = []string{ 24 ` 25 resource "azurerm_sql_server" "bad_example" { 26 name = "mssqlserver" 27 resource_group_name = azurerm_resource_group.example.name 28 location = azurerm_resource_group.example.location 29 version = "12.0" 30 administrator_login = "mradministrator" 31 administrator_login_password = "terrasecRocks" 32 } 33 `, 34 } 35 36 var terraformEnableAuditLinks = []string{ 37 `https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs/resources/sql_server#extended_auditing_policy`, 38 } 39 40 var terraformEnableAuditRemediationMarkdown = ``