Ensure that VA setting 'Send scan reports to' is configured for a SQL server

MEDIUM

Description

Description:

Configure 'Send scan reports to' with email ids of concerned data owners/stakeholders for a critical SQL servers.

Rationale:

Vulnerability Assessment (VA) scan reports and alerts will be sent to email ids configured at 'Send scan reports to'. This may help in reducing time required for identifying risks and taking corrective measures.

Enabling the 'Azure Defender for SQL' features will incur additional costs for each SQL server.

Remediation

From Azure Console

  1. Go to 'SQL servers'
  2. Select a server instance
  3. Click on 'Security Center'
  4. Ensure that 'Azure Defender for SQL' is set to 'Enabled'
  5. Select 'Configure' next to 'Enabled at subscription-level'
  6. In Section 'Vulnerability Assessment Settings', configure 'Storage Accounts' if not already
  7. Configure email ids for concerned data owners/stakeholders at 'Send scan reports to'
  8. Click 'Save'

Using Azure PowerShell

If not already, Enable 'Advanced Data Security' for a SQL Server:

Set-AZSqlServerThreatDetectionPolicy -ResourceGroupName -ServerName -EmailAdmins $True

To enable ADS-VA service and Set 'Send scan reports to'

Update-AzSqlServerVulnerabilityAssessmentSetting '
-ResourceGroupName ""'
-ServerName ""'
-StorageAccountName "<Storage Name from same subscription and same Location" '
-ScanResultsContainerName "vulnerability-assessment" '
-RecurringScansInterval Weekly '
-EmailSubscriptionAdmins $true '
-NotificationEmail @("[email protected]" , "[email protected]")
.

Policy Details

Rule Reference ID: AC_AZURE_0236
CSP: Azure
Remediation Available: No
Resource Category: Database
Resource Type: SQL Server

Frameworks