Control: 2.11 Ensure that the log metric filter and alerts exist for SQL instance configuration changes
Description
It is recommended that a metric filter and alarm be established for SQL instance configuration changes.
Monitoring changes to SQL instance configuration changes may reduce the time needed to detect and correct misconfigurations done on the SQL server.
Below are a few of the configurable options which may the impact security posture of an SQL instance:
- Enable auto backups and high availability: Misconfiguration may adversely impact business continuity, disaster recovery, and high availability
- Authorize networks: Misconfiguration may increase exposure to untrusted networks
Remediation
From Console
Create a required log metric:
- Login to GCP console and navigate to Logs-based Metrics.
- Click CREATE METRIC.
- Select
Metric Type
asCounter
, enterLog metric name
andUnits
to 1. - Clear any text in the
Build filter
field and add below text
protoPayload.methodName="cloudsql.instances.update"
- Click CREATE METRIC. The logs display based on the filter text entered by the user.
Create a required alert policy for the log metric::
- Identify the newly created metric under the section User-defined Metrics.
- Click the 3-dot icon in the right most column for the desired metric and select Create alert from metric. A new page opens.
- Fill out the alert policy configuration and click Save. Choose the alerting threshold and configuration that makes sense for the user's organization. For example, a threshold of zero(0) for the most recent value will ensure that a notification is triggered for every owner change in the project.
- Configure the desired notifications channels in the section Notifications.
- Enter
Alert name
and click Save.
From Command Line
Create a required log metric:
- Use the command: gcloud beta logging metrics create.
- Reference for Command Usage.
Create a alert policy for the log metric:
- Use the command: gcloud alpha monitoring policies create.
- Reference for Command Usage.
Usage
Run the control in your terminal:
powerpipe control run gcp_compliance.control.cis_v120_2_11
Snapshot and share results via Turbot Pipes:
powerpipe loginpowerpipe control run gcp_compliance.control.cis_v120_2_11 --share
SQL
This control uses a named query:
logging_metric_alert_sql_instance_configuration_changes