Control: Ensure that VA setting 'Send scan reports to' is configured for a SQL server
Description
Configure 'Send scan reports to' with email ids of concerned data owners/stakeholders for a critical SQL servers.
Usage
Run the control in your terminal:
powerpipe control run azure_compliance.control.sql_server_va_setting_scan_reports_configured
Snapshot and share results via Turbot Pipes:
powerpipe loginpowerpipe control run azure_compliance.control.sql_server_va_setting_scan_reports_configured --share
SQL
This control uses a named query:
select s.id as resource, case when security -> 'properties' ->> 'state' = 'Disabled' or ( security -> 'properties' ->> 'state' = 'Enabled' and assessment -> 'properties' ->> 'storageContainerPath' is not null and assessment -> 'properties' -> 'recurringScans' ->> 'emails' = '[]' ) then 'alarm' else 'ok' end as status, case when security -> 'properties' ->> 'state' = 'Disabled' or ( security -> 'properties' ->> 'state' = 'Enabled' and assessment -> 'properties' ->> 'storageContainerPath' is not null and assessment -> 'properties' -> 'recurringScans' ->> 'emails' = '[]' ) then s.name || ' VA scan reports and alerts not configured send email.' else s.name || ' VA scan reports and alerts configured to send email.' end as reason , s.resource_group as resource_group , sub.display_name as subscriptionfrom azure_sql_server s, jsonb_array_elements(server_security_alert_policy) security, jsonb_array_elements(server_vulnerability_assessment) assessment, azure_subscription subwhere sub.subscription_id = s.subscription_id;