github.com/khulnasoft-lab/defsec@v1.0.5-0.20230827010352-5e9f46893d95/rules/cloud/policies/azure/database/threat_alert_email_set.tf.go (about) 1 package database 2 3 var terraformThreatAlertEmailSetGoodExamples = []string{ 4 ` 5 resource "azurerm_mssql_server_security_alert_policy" "good_example" { 6 resource_group_name = azurerm_resource_group.example.name 7 server_name = azurerm_sql_server.example.name 8 state = "Enabled" 9 storage_endpoint = azurerm_storage_account.example.primary_blob_endpoint 10 storage_account_access_key = azurerm_storage_account.example.primary_access_key 11 disabled_alerts = [ 12 "Sql_Injection", 13 "Data_Exfiltration" 14 ] 15 email_addresses = ["db-security@acme.org"] 16 } 17 `, 18 } 19 20 var terraformThreatAlertEmailSetBadExamples = []string{ 21 ` 22 resource "azurerm_mssql_server_security_alert_policy" "bad_example" { 23 resource_group_name = azurerm_resource_group.example.name 24 server_name = azurerm_sql_server.example.name 25 state = "Enabled" 26 storage_endpoint = azurerm_storage_account.example.primary_blob_endpoint 27 storage_account_access_key = azurerm_storage_account.example.primary_access_key 28 disabled_alerts = [ 29 "Sql_Injection", 30 "Data_Exfiltration" 31 ] 32 email_addresses = [] 33 } 34 `, 35 } 36 37 var terraformThreatAlertEmailSetLinks = []string{ 38 `https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs/resources/mssql_server_security_alert_policy#email_addresses`, 39 } 40 41 var terraformThreatAlertEmailSetRemediationMarkdown = ``