File tree Expand file tree Collapse file tree 2 files changed +14
-14
lines changed
policy_packs/azure/cis_v200/section4 Expand file tree Collapse file tree 2 files changed +14
-14
lines changed Original file line number Diff line number Diff line change @@ -95,12 +95,12 @@ resource "turbot_policy_setting" "azure_sql_server_auditing" {
95
95
value = "Enforce: Enabled"
96
96
}
97
97
98
- resource "turbot_policy_setting" "azure_network_network_security_group_ingress_rules_approved " {
98
+ resource "turbot_policy_setting" "azure_sql_server_firewall_ip_ranges_approved " {
99
99
resource = turbot_policy_pack.main.id
100
- type = "tmod:@turbot/azure-network #/policy/types/networkSecurityGroupIngressRulesApproved "
100
+ type = "tmod:@turbot/azure-sql #/policy/types/serverFirewallIpRangesApproved "
101
101
note = "Azure CIS v2.0.0 - Control: 4.1.2"
102
- # value = "Check: Approved"
103
- value = "Enforce: Delete unapproved if new "
102
+ value = "Check: Approved"
103
+ # value = "Enforce: Delete unapproved"
104
104
}
105
105
106
106
resource "turbot_policy_setting" "azure_sql_server_active_directory_administrator" {
Original file line number Diff line number Diff line change @@ -24,25 +24,25 @@ resource "turbot_policy_setting" "azure_sql_server_auditing_retention_days" {
24
24
value = " 90"
25
25
}
26
26
27
- # Azure > Network > Network Security Group > Ingress Rules > Approved
28
- resource "turbot_policy_setting" "azure_network_network_security_group_ingress_rules_approved " {
27
+ # Azure > SQL > Server > Firewall > IP Ranges > Approved
28
+ resource "turbot_policy_setting" "azure_sql_server_firewall_ip_ranges_approved " {
29
29
resource = turbot_policy_pack. main . id
30
- type = " tmod:@turbot/azure-network #/policy/types/networkSecurityGroupIngressRulesApproved "
30
+ type = " tmod:@turbot/azure-sql #/policy/types/serverFirewallIpRangesApproved "
31
31
note = " Azure CIS v2.0.0 - Control: 4.1.2"
32
32
value = " Check: Approved"
33
33
# value = "Enforce: Delete unapproved"
34
34
}
35
35
36
- # Azure > Network > Network Security Group > Ingress Rules > Approved > Rules
37
- resource "turbot_policy_setting" "azure_network_network_security_group_ingress_rules_approved_rules " {
36
+ # Azure > SQL > Server > Firewall > IP Ranges > Approved > Rules
37
+ resource "turbot_policy_setting" "azure_sql_server_firewall_ip_ranges_approved_rules " {
38
38
resource = turbot_policy_pack. main . id
39
- type = " tmod:@turbot/azure-network #/policy/types/networkSecurityGroupIngressRulesApprovedRules "
39
+ type = " tmod:@turbot/azure-sql #/policy/types/serverFirewallIpRangesApprovedRules "
40
40
note = " Azure CIS v2.0.0 - Control: 4.1.2"
41
- value = << EOT
42
- REJECT $.turbot.cidr :0.0.0.0/ 0
41
+ value = <<- EOT
42
+ REJECT $.turbot.startIpAddress :0.0.0.0 $.turbot.endIpAddress:0.0.0. 0
43
43
44
- APPROVE *
45
- EOT
44
+ APPROVE *
45
+ EOT
46
46
}
47
47
48
48
# Azure > SQL > Database > Encryption At Rest
You can’t perform that action at this time.
0 commit comments