Name |
Azure SQL Database should have the minimal TLS version set to the highest version Azure Landing Zones (ALZ) GitHub JSON Deny-Sql-minTLS |
||||||||||
Id | Deny-Sql-minTLS | ||||||||||
Version | 1.0.0 details on versioning |
||||||||||
Category | SQL Microsoft docs |
||||||||||
Description | Setting minimal TLS version to 1.2 improves security by ensuring your Azure SQL Database can only be accessed from clients using TLS 1.2. Using versions of TLS less than 1.2 is not reccomended since they have well documented security vunerabilities. | ||||||||||
Mode | Indexed | ||||||||||
Type | Custom Azure Landing Zones (ALZ) | ||||||||||
Preview | FALSE | ||||||||||
Deprecated | FALSE | ||||||||||
Effect | Default Audit Allowed Audit, Disabled, Deny |
||||||||||
Used RBAC Role | none | ||||||||||
Rule Aliases | IF (1)
|
||||||||||
Rule ResourceTypes | IF (1) Microsoft.Sql/servers |
||||||||||
History | none | ||||||||||
Used in Initiatives |
|
||||||||||
JSON |
|