terraform.azure.best-practice.azure-sqlserver-email-alerts-toadmins-enabled.azure-sqlserver-email-alerts-toadmins-enabled
semgrep
Author
unknown
Download Count*
License
Ensure that Email service and co-administrators is Enabled for MSSQL servers
Run Locally
Run in CI
Defintion
rules:
- id: azure-sqlserver-email-alerts-toadmins-enabled
message: Ensure that Email service and co-administrators is Enabled for MSSQL
servers
patterns:
- pattern: resource
- pattern-inside: |
resource "azurerm_mssql_server_security_alert_policy" "..." {
...
}
- pattern-not-inside: |
resource "azurerm_mssql_server_security_alert_policy" "..." {
...
state = "Enabled"
email_account_admins = true
...
}
metadata:
category: best-practice
technology:
- terraform
- azure
license: Commons Clause License Condition v1.0[LGPL-2.1-only]
languages:
- hcl
severity: WARNING
Examples
azure-sqlserver-email-alerts-toadmins-enabled.tf
# fail
# ruleid: azure-sqlserver-email-alerts-toadmins-enabled
resource "azurerm_mssql_server_security_alert_policy" "example" {
resource_group_name = azurerm_resource_group.example.name
server_name = azurerm_sql_server.example.name
state = "Enabled"
storage_endpoint = azurerm_storage_account.example.primary_blob_endpoint
storage_account_access_key = azurerm_storage_account.example.primary_access_key
disabled_alerts = [
"Sql_Injection",
"Data_Exfiltration"
]
retention_days = 20
}
# pass
resource "azurerm_mssql_server_security_alert_policy" "example" {
resource_group_name = azurerm_resource_group.example.name
server_name = azurerm_sql_server.example.name
state = "Enabled"
storage_endpoint = azurerm_storage_account.example.primary_blob_endpoint
storage_account_access_key = azurerm_storage_account.example.primary_access_key
disabled_alerts = []
email_addresses = ["example@gmail.com"]
email_account_admins = true
retention_days = 20
}
Short Link: https://sg.run/ANKp