github.com/khulnasoft-lab/defsec@v1.0.5-0.20230827010352-5e9f46893d95/rules/cloud/policies/azure/database/threat_alert_email_set.tf.go (about)

     1  package database
     2  
     3  var terraformThreatAlertEmailSetGoodExamples = []string{
     4  	`
     5   resource "azurerm_mssql_server_security_alert_policy" "good_example" {
     6     resource_group_name        = azurerm_resource_group.example.name
     7     server_name                = azurerm_sql_server.example.name
     8     state                      = "Enabled"
     9     storage_endpoint           = azurerm_storage_account.example.primary_blob_endpoint
    10     storage_account_access_key = azurerm_storage_account.example.primary_access_key
    11     disabled_alerts = [
    12       "Sql_Injection",
    13       "Data_Exfiltration"
    14     ]
    15     email_addresses = ["db-security@acme.org"]
    16   }
    17   `,
    18  }
    19  
    20  var terraformThreatAlertEmailSetBadExamples = []string{
    21  	`
    22   resource "azurerm_mssql_server_security_alert_policy" "bad_example" {
    23     resource_group_name        = azurerm_resource_group.example.name
    24     server_name                = azurerm_sql_server.example.name
    25     state                      = "Enabled"
    26     storage_endpoint           = azurerm_storage_account.example.primary_blob_endpoint
    27     storage_account_access_key = azurerm_storage_account.example.primary_access_key
    28     disabled_alerts = [
    29       "Sql_Injection",
    30       "Data_Exfiltration"
    31     ]
    32     email_addresses = []
    33   }
    34   `,
    35  }
    36  
    37  var terraformThreatAlertEmailSetLinks = []string{
    38  	`https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs/resources/mssql_server_security_alert_policy#email_addresses`,
    39  }
    40  
    41  var terraformThreatAlertEmailSetRemediationMarkdown = ``