Benchmark: 5.1 SQL Azure SQL Database
Overview
This section covers security best practice recommendations for Azure SQL Database.
Azure Product Page: https://azure.microsoft.com/en-us/products/azure-sql/database/
Usage
Install the mod:
mkdir dashboardscd dashboardspowerpipe mod initpowerpipe mod install github.com/turbot/steampipe-mod-azure-compliance
Start the Powerpipe server:
steampipe service startpowerpipe server
Open http://localhost:9033 in your browser and select 5.1 SQL Azure SQL Database.
Run this benchmark in your terminal:
powerpipe benchmark run azure_compliance.benchmark.cis_v300_5_1
Snapshot and share results via Turbot Pipes:
powerpipe benchmark run azure_compliance.benchmark.cis_v300_5_1 --share
Controls
- 5.1.1 Ensure that 'Auditing' is set to 'On'
- 5.1.2 Ensure no Azure SQL Databases allow ingress from 0.0.0.0/0 (ANY IP)
- 5.1.3 Ensure SQL server's Transparent Data Encryption (TDE) protector is encrypted with Customer-managed key
- 5.1.4 Ensure that Microsoft Entra authentication is Configured for SQL Servers
- 5.1.5 Ensure that 'Data encryption' is set to 'On' on a SQL Database
- 5.1.6 Ensure that 'Auditing' Retention is 'greater than 90 days'
- 5.1.7 Ensure Public Network Access is Disabled