last sync: 2020-Jul-03 15:47:34 UTC

Azure Policy

Vulnerability assessment should be enabled on SQL Managed Instance

Policy DisplayName Vulnerability assessment should be enabled on SQL Managed Instance
Policy Id 1b7aa243-30e4-4c9e-bca8-d0d3022b634a
Policy Category SQL
Policy Description Audit each SQL Managed Instance which doesn't have recurring vulnerability assessment scans enabled. Vulnerability assessment can discover, track, and help you remediate potential database vulnerabilities.
Policy Mode Indexed
Policy Type BuiltIn
Policy in Preview FALSE
Policy Deprecated FALSE
Policy Effect Default: AuditIfNotExists
Allowed: (AuditIfNotExists,Disabled)
Roles used none
Policy Changes
Date/Time (UTC ymd) (i) Change Change detail
2020-06-08 18:42:36 change: DisplayName previous DisplayName: Vulnerability assessment should be enabled on your SQL managed instances
Used in Policy Initiative(s)
Initiative DisplayName Initiative Id
Enable Monitoring in Azure Security Center 1f3afdf9-d0c9-4c3d-847f-89da613e70a8
[Preview]: Australian Government ISM PROTECTED 27272c0b-c225-4cc3-b8b0-f2534b093077
UK OFFICIAL and UK NHS 3937f550-eedd-4639-9c5e-294358be442e
[Preview]: Azure Security Benchmark 42a694ed-f65e-42b2-aa9e-8052e9740a92
[Deprecated]: DOD Impact Level 4 8d792a84-723c-4d92-a3c3-e4ed16a2d133
HITRUST/HIPAA a169a624-5599-4385-a696-c8d643089fab
FedRAMP High d5264498-16f4-418a-b659-fa7ef418175f
Policy Rule
{
  "properties": {
    "displayName": "Vulnerability assessment should be enabled on SQL Managed Instance",
    "policyType": "BuiltIn",
    "mode": "Indexed",
    "description": "Audit each SQL Managed Instance which doesn't have recurring vulnerability assessment scans enabled. Vulnerability assessment can discover, track, and help you remediate potential database vulnerabilities.",
    "metadata": {
      "version": "1.0.1",
      "category": "SQL"
    },
    "parameters": {
      "effect": {
        "type": "String",
        "metadata": {
          "displayName": "Effect",
          "description": "Enable or disable the execution of the policy"
        },
        "allowedValues": [
          "AuditIfNotExists",
          "Disabled"
        ],
        "defaultValue": "AuditIfNotExists"
      }
    },
    "policyRule": {
      "if": {
        "field": "type",
        "equals": "Microsoft.Sql/managedInstances"
      },
      "then": {
      "effect": "[parameters('effect')]",
        "details": {
          "type": "Microsoft.Sql/managedInstances/vulnerabilityAssessments",
          "name": "default",
          "existenceCondition": {
            "field": "Microsoft.Sql/managedInstances/vulnerabilityAssessments/recurringScans.isEnabled",
            "equals": "True"
          }
        }
      }
    }
  },
  "id": "/providers/Microsoft.Authorization/policyDefinitions/1b7aa243-30e4-4c9e-bca8-d0d3022b634a",
  "type": "Microsoft.Authorization/policyDefinitions",
  "name": "1b7aa243-30e4-4c9e-bca8-d0d3022b634a"
}