Control: SQL servers should have all Security Alerts enabled
Description
Enable all Security Alerts on SQL servers. It is recommended to enable all Security Alerts on SQL servers.
Usage
Run the control in your terminal:
powerpipe control run terraform_azure_compliance.control.sql_server_all_security_alerts_enabledSnapshot and share results via Turbot Pipes:
powerpipe loginpowerpipe control run terraform_azure_compliance.control.sql_server_all_security_alerts_enabled --shareSQL
This control uses a named query:
select address as resource, case when (attributes_std ->> 'disabled_alerts') is not null then 'alarm' else 'ok' end status, split_part(address, '.', 2) || case when (attributes_std ->> 'disabled_alerts') is not null then ' some security alerts disabled' else ' all security alerts enabled' end || '.' reason , path || ':' || start_linefrom terraform_resourcewhere type = 'azurerm_mssql_server_security_alert_policy';