github.com/khulnasoft-lab/defsec@v1.0.5-0.20230827010352-5e9f46893d95/rules/cloud/policies/azure/database/threat_alert_email_to_owner.tf.go (about) 1 package database 2 3 var terraformThreatAlertEmailToOwnerGoodExamples = []string{ 4 ` 5 resource "azurerm_mssql_server_security_alert_policy" "good_example" { 6 resource_group_name = azurerm_resource_group.example.name 7 server_name = azurerm_sql_server.example.name 8 state = "Enabled" 9 storage_endpoint = azurerm_storage_account.example.primary_blob_endpoint 10 storage_account_access_key = azurerm_storage_account.example.primary_access_key 11 disabled_alerts = [] 12 13 email_account_admins = true 14 } 15 `, 16 } 17 18 var terraformThreatAlertEmailToOwnerBadExamples = []string{ 19 ` 20 resource "azurerm_mssql_server_security_alert_policy" "bad_example" { 21 resource_group_name = azurerm_resource_group.example.name 22 server_name = azurerm_sql_server.example.name 23 state = "Enabled" 24 storage_endpoint = azurerm_storage_account.example.primary_blob_endpoint 25 storage_account_access_key = azurerm_storage_account.example.primary_access_key 26 disabled_alerts = [ 27 ] 28 email_account_admins = false 29 } 30 `, 31 } 32 33 var terraformThreatAlertEmailToOwnerLinks = []string{ 34 `https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs/resources/mssql_server_security_alert_policy#email_account_admins`, 35 } 36 37 var terraformThreatAlertEmailToOwnerRemediationMarkdown = ``