Control: Ensure 'TLS Version' is set to 'TLSV1.2' for MySQL flexible Database Server
Description
Ensure TLS version on MySQL flexible servers is set to the default value.
Usage
Run the control in your terminal:
powerpipe control run azure_compliance.control.mysql_server_min_tls_1_2
Snapshot and share results via Turbot Pipes:
powerpipe loginpowerpipe control run azure_compliance.control.mysql_server_min_tls_1_2 --share
SQL
This control uses a named query:
select s.id as resource, case when minimal_tls_version = 'TLSEnforcementDisabled' then 'alarm' when minimal_tls_version = 'TLS1_2' then 'ok' else 'alarm' end as status, case when minimal_tls_version = 'TLSEnforcementDisabled' then s.name || ' TLS enforcement is disabled.' when minimal_tls_version = 'TLS1_2' then s.name || ' minimum TLS version set to ' || minimal_tls_version || '.' else s.name || ' minimum TLS version set to ' || minimal_tls_version || '.' end as reason , s.resource_group as resource_group , sub.display_name as subscriptionfrom azure_mysql_server as s, azure_subscription as subwhere sub.subscription_id = s.subscription_id;