Benchmark: 4.1 SQL Server - Auditing
Overview
This section covers security recommendations to follow to set general database services policies on an Azure Subscription. Subsections will address specific database types.
Usage
Install the mod:
mkdir dashboardscd dashboardspowerpipe mod initpowerpipe mod install github.com/turbot/steampipe-mod-azure-compliance
Start the Powerpipe server:
steampipe service startpowerpipe server
Open http://localhost:9033 in your browser and select 4.1 SQL Server - Auditing.
Run this benchmark in your terminal:
powerpipe benchmark run azure_compliance.benchmark.cis_v140_4_1
Snapshot and share results via Turbot Pipes:
powerpipe benchmark run azure_compliance.benchmark.cis_v140_4_1 --share
Controls
- 4.1.1 Ensure that 'Auditing' is set to 'On'
- 4.1.2 Ensure that 'Data encryption' is set to 'On' on a SQL Database
- 4.1.3 Ensure that 'Auditing' Retention is 'greater than 90 days'