Control: 2.1.4 Ensure That Microsoft Defender for Azure SQL Databases Is Set To 'On'
Description
Turning on Microsoft Defender for Azure SQL Databases enables threat detection for Azure SQL database servers, providing threat intelligence, anomaly detection, and behavior analytics in the Microsoft Defender for Cloud.
Enabling Microsoft Defender for Azure SQL Databases allows for greater defense-in- depth, with threat detection provided by the Microsoft Security Response Center (MSRC).
Remediation
From Azure Portal
- Go to
Microsoft Defender for Cloud. - Select
Environment Settingsblade. - Click on the subscription name.
- Select the
Defender plansblade. - Click
Select types> in the row forDatabases. - Set the radio button next to
Azure SQL DatabasestoOn. - Select
Continue. - Select
Save.
From Azure CLI
Run the following command:
az security pricing create -n SqlServers --tier 'standard'az security pricing create -n SqlServers --tier 'standard'
From Powershell
Run the following command:
Set-AzSecurityPricing -Name 'SqlServers' -PricingTier 'Standard'
Default Value
By default, Microsoft Defender plan is off.
Usage
Run the control in your terminal:
powerpipe control run azure_compliance.control.cis_v200_2_1_4Snapshot and share results via Turbot Pipes:
powerpipe loginpowerpipe control run azure_compliance.control.cis_v200_2_1_4 --shareSQL
This control uses a named query:
select sub_pricing.id as resource, case when pricing_tier = 'Standard' then 'ok' else 'alarm' end as status, case when pricing_tier = 'Standard' then 'Azure Defender on for SQL database servers.' else 'Azure Defender off for SQL database servers.' end as reason , sub.display_name as subscriptionfrom azure_security_center_subscription_pricing sub_pricing right join azure_subscription sub on sub_pricing.subscription_id = sub.subscription_idwhere name = 'SqlServers';