github.com/khulnasoft-lab/defsec@v1.0.5-0.20230827010352-5e9f46893d95/rules/cloud/policies/azure/database/threat_alert_email_to_owner.tf.go (about)

     1  package database
     2  
     3  var terraformThreatAlertEmailToOwnerGoodExamples = []string{
     4  	`
     5   resource "azurerm_mssql_server_security_alert_policy" "good_example" {
     6     resource_group_name        = azurerm_resource_group.example.name
     7     server_name                = azurerm_sql_server.example.name
     8     state                      = "Enabled"
     9     storage_endpoint           = azurerm_storage_account.example.primary_blob_endpoint
    10     storage_account_access_key = azurerm_storage_account.example.primary_access_key
    11     disabled_alerts = []
    12   
    13     email_account_admins = true
    14   }
    15   `,
    16  }
    17  
    18  var terraformThreatAlertEmailToOwnerBadExamples = []string{
    19  	`
    20   resource "azurerm_mssql_server_security_alert_policy" "bad_example" {
    21     resource_group_name        = azurerm_resource_group.example.name
    22     server_name                = azurerm_sql_server.example.name
    23     state                      = "Enabled"
    24     storage_endpoint           = azurerm_storage_account.example.primary_blob_endpoint
    25     storage_account_access_key = azurerm_storage_account.example.primary_access_key
    26     disabled_alerts = [
    27     ]
    28     email_account_admins = false
    29   }
    30   `,
    31  }
    32  
    33  var terraformThreatAlertEmailToOwnerLinks = []string{
    34  	`https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs/resources/mssql_server_security_alert_policy#email_account_admins`,
    35  }
    36  
    37  var terraformThreatAlertEmailToOwnerRemediationMarkdown = ``