terraform.azure.best-practice.azure-sqlserver-email-alerts-toadmins-enabled.azure-sqlserver-email-alerts-toadmins-enabled

profile photo of semgrepsemgrep
Author
unknown
Download Count*

Ensure that Email service and co-administrators is Enabled for MSSQL servers

Run Locally

Run in CI

Defintion

rules:
  - id: azure-sqlserver-email-alerts-toadmins-enabled
    message: Ensure that Email service and co-administrators is Enabled for MSSQL
      servers
    patterns:
      - pattern: resource
      - pattern-inside: |
          resource "azurerm_mssql_server_security_alert_policy" "..." {
          ...
          }
      - pattern-not-inside: |
          resource "azurerm_mssql_server_security_alert_policy" "..." {
          ...
          state = "Enabled"
          email_account_admins = true
          ...
          }
    metadata:
      category: best-practice
      technology:
        - terraform
        - azure
      license: Commons Clause License Condition v1.0[LGPL-2.1-only]
    languages:
      - hcl
    severity: WARNING

Examples

azure-sqlserver-email-alerts-toadmins-enabled.tf

# fail
# ruleid: azure-sqlserver-email-alerts-toadmins-enabled
resource "azurerm_mssql_server_security_alert_policy" "example" {
    resource_group_name        = azurerm_resource_group.example.name
    server_name                = azurerm_sql_server.example.name
    state                      = "Enabled"
    storage_endpoint           = azurerm_storage_account.example.primary_blob_endpoint
    storage_account_access_key = azurerm_storage_account.example.primary_access_key
    disabled_alerts = [
    "Sql_Injection",
    "Data_Exfiltration"
    ]
    retention_days = 20
}

# pass
resource "azurerm_mssql_server_security_alert_policy" "example" {
    resource_group_name        = azurerm_resource_group.example.name
    server_name                = azurerm_sql_server.example.name
    state                      = "Enabled"
    storage_endpoint           = azurerm_storage_account.example.primary_blob_endpoint
    storage_account_access_key = azurerm_storage_account.example.primary_access_key
    disabled_alerts = []
    email_addresses = ["example@gmail.com"]
    email_account_admins = true
    retention_days = 20
}