Skip to content

Commit 7de89f7

Browse files
authored
Update Azure CIS v2.0.0 - Control 4.1.2. Closes #898 (#899)
1 parent b0665c8 commit 7de89f7

File tree

2 files changed

+14
-14
lines changed

2 files changed

+14
-14
lines changed

policy_packs/azure/cis_v200/section4/README.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -95,12 +95,12 @@ resource "turbot_policy_setting" "azure_sql_server_auditing" {
9595
value = "Enforce: Enabled"
9696
}
9797
98-
resource "turbot_policy_setting" "azure_network_network_security_group_ingress_rules_approved" {
98+
resource "turbot_policy_setting" "azure_sql_server_firewall_ip_ranges_approved" {
9999
resource = turbot_policy_pack.main.id
100-
type = "tmod:@turbot/azure-network#/policy/types/networkSecurityGroupIngressRulesApproved"
100+
type = "tmod:@turbot/azure-sql#/policy/types/serverFirewallIpRangesApproved"
101101
note = "Azure CIS v2.0.0 - Control: 4.1.2"
102-
# value = "Check: Approved"
103-
value = "Enforce: Delete unapproved if new"
102+
value = "Check: Approved"
103+
# value = "Enforce: Delete unapproved"
104104
}
105105
106106
resource "turbot_policy_setting" "azure_sql_server_active_directory_administrator" {

policy_packs/azure/cis_v200/section4/sql.tf

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -24,25 +24,25 @@ resource "turbot_policy_setting" "azure_sql_server_auditing_retention_days" {
2424
value = "90"
2525
}
2626

27-
# Azure > Network > Network Security Group > Ingress Rules > Approved
28-
resource "turbot_policy_setting" "azure_network_network_security_group_ingress_rules_approved" {
27+
# Azure > SQL > Server > Firewall > IP Ranges > Approved
28+
resource "turbot_policy_setting" "azure_sql_server_firewall_ip_ranges_approved" {
2929
resource = turbot_policy_pack.main.id
30-
type = "tmod:@turbot/azure-network#/policy/types/networkSecurityGroupIngressRulesApproved"
30+
type = "tmod:@turbot/azure-sql#/policy/types/serverFirewallIpRangesApproved"
3131
note = "Azure CIS v2.0.0 - Control: 4.1.2"
3232
value = "Check: Approved"
3333
# value = "Enforce: Delete unapproved"
3434
}
3535

36-
# Azure > Network > Network Security Group > Ingress Rules > Approved > Rules
37-
resource "turbot_policy_setting" "azure_network_network_security_group_ingress_rules_approved_rules" {
36+
# Azure > SQL > Server > Firewall > IP Ranges > Approved > Rules
37+
resource "turbot_policy_setting" "azure_sql_server_firewall_ip_ranges_approved_rules" {
3838
resource = turbot_policy_pack.main.id
39-
type = "tmod:@turbot/azure-network#/policy/types/networkSecurityGroupIngressRulesApprovedRules"
39+
type = "tmod:@turbot/azure-sql#/policy/types/serverFirewallIpRangesApprovedRules"
4040
note = "Azure CIS v2.0.0 - Control: 4.1.2"
41-
value = <<EOT
42-
REJECT $.turbot.cidr:0.0.0.0/0
41+
value = <<-EOT
42+
REJECT $.turbot.startIpAddress:0.0.0.0 $.turbot.endIpAddress:0.0.0.0
4343
44-
APPROVE *
45-
EOT
44+
APPROVE *
45+
EOT
4646
}
4747

4848
# Azure > SQL > Database > Encryption At Rest

0 commit comments

Comments
 (0)