Steampipe MCP Server →
Steampipe Hub 
Hub
  • Plugins
  • Mods
  • Docs
  • Home
PluginsModsDocsHome
Plugins
turbot/azure
GitHub Repo Stars
Overview
166
Tables
1,390
Queries
PowerpipeModsGitHub
steampipe plugin install azuresteampipe plugin install azure
Get Involved
Edit on GitHubDiscuss on Slack

Query: Vulnerability assessment should be enabled on your SQL servers

Description

Audit Azure SQL servers which do not have recurring vulnerability assessment scans enabled. Vulnerability assessment can discover, track, and help you remediate potential database vulnerabilities.

Query

Tables used in this query:

  • azure_sql_server
  • azure_subscription

Controls using this query:

  • 4.2.2 Ensure that Vulnerability Assessment (VA) is enabled on a SQL server by setting a Storage Account
  • 4.2.2 Ensure that Vulnerability Assessment (VA) is enabled on a SQL server by setting a Storage Account
  • 4.2.2 Ensure that Vulnerability Assessment (VA) is enabled on a SQL server by setting a Storage Account
  • 4.2.2 Ensure that Vulnerability Assessment (VA) is enabled on a SQL server by setting a Storage Account
  • Vulnerability assessment should be enabled on your SQL servers

SQL

Steampipe
Steampipe
  • Hub
  • Docs
  • Blog
  • Changelog
Products
  • GuardrailsGuardrails
  • PipesPipes
  • SteampipeSteampipe
  • PowerpipePowerpipe
  • FlowpipeFlowpipe
  • TailpipeTailpipe
Turbot
  • Home
  • About us
  • We're hiring!
  • Contact us
Community

Our community of 3,000+ practitioners love to discuss Steampipe, cloud intelligence & security.

Slack logoJoin us on Slack →

System StatusLegalSecurity
Terms of UseSecurityPrivacy