turbot/azure_compliance

Control: 2.1.3 Ensure That Microsoft Defender for (Managed Instance) Azure SQL Databases Is Set To 'On'

Description

Turning on Microsoft Defender for Azure SQL Databases enables threat detection for Managed Instance Azure SQL databases, providing threat intelligence, anomaly detection, and behavior analytics in Microsoft Defender for Cloud.

Enabling Microsoft Defender for Azure SQL Databases allows for greater defense-in-depth, includes functionality for discovering and classifying sensitive data, surfacing and mitigating potential database vulnerabilities, and detecting anomalous activities that could indicate a threat to your database.

Remediation

From Azure Portal

  1. Go to Microsoft Defender for Cloud.
  2. Select Environment Settings.
  3. Click on the subscription name.
  4. Select Defender plans blade.
  5. Click Select types > in the row for Databases.
  6. Set the radio button next to Azure SQL Databases to On.
  7. Select Continue.
  8. Select Save.

From Azure CLI

Run the following command:

az security pricing create -n SqlServers --tier 'standard'

From Azure PowerShell

Run the following command:

Set-AzSecurityPricing -Name 'SqlServers' -PricingTier 'Standard'

Default Value

By default, Microsoft Defender Plans are off.

Usage

Run the control in your terminal:

powerpipe control run azure_compliance.control.cis_v210_2_1_3

Snapshot and share results via Turbot Pipes:

powerpipe login
powerpipe control run azure_compliance.control.cis_v210_2_1_3 --share

SQL

This control uses a named query:

securitycenter_azure_defender_on_for_sqldb

Tags