4.1.1 Ensure that 'Auditing' is set to 'On'

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

Enable auditing on SQL Servers.

Rationale:

The Azure platform allows a SQL server to be created as a service. Enabling auditing at the server level ensures that all existing and newly created databases on the SQL server instance are audited. Auditing policy applied on the SQL database does not override auditing policy and settings applied on the particular SQL server where the database is hosted.

Auditing tracks database events and writes them to an audit log in the Azure storage account. It also helps to maintain regulatory compliance, understand database activity, and gain insight into discrepancies and anomalies that could indicate business concerns or suspected security violations.

Solution

From Azure Console

Go to SQL servers

For each server instance

Click on Auditing

Set Auditing to On

Using Azure PowerShell
Get the list of all SQL Servers

Get-AzureRmSqlServer

For each Server, enable auditing.

Set-AzureRmSqlServerAuditingPolicy -ResourceGroupName <resource group name> -ServerName <server name> -AuditType <audit type> -StorageAccountName <storage account name>

Default Value:

By default, Auditing is set to Off.

See Also

https://workbench.cisecurity.org/files/3459