turbot/terraform_azure_compliance

Query: sql_database_server_azure_defender_enabled

Usage

powerpipe query terraform_azure_compliance.query.sql_database_server_azure_defender_enabled

Steampipe Tables

SQL

select
address as resource,
case
when (attributes_std ->> 'tier') = 'Standard'
and (attributes_std ->> 'resource_type') = 'SqlServers' then 'ok'
else 'skip'
end status,
split_part(address, '.', 2) || case
when (attributes_std ->> 'tier') = 'Standard'
and (attributes_std ->> 'resource_type') = 'SqlServers' then ' Azure defender enabled for SqlServer(s)'
else ' Azure defender enabled for ' || (attributes_std ->> 'resource_type') || ''
end || '.' reason,
path || ':' || start_line
from
terraform_resource
where
type = 'azurerm_security_center_subscription_pricing';

Controls

The query is being used by the following controls: