Policy: Azure > CIS v2.0 > 04 - Database Services > 4.01 SQL Server - Auditing
Auditing for Azure SQL Servers and SQL Databases tracks database events and writes them to an audit log Azure storage account, Log Analytics workspace or Event Hubs. Auditing helps to maintain regulatory compliance, understand database activity, and gain insight into discrepancies and anomalies that could indicate business concerns or suspected security violations. Auditing enables and facilitates adherence to compliance standards, although it doesn't guarantee compliance. The Default SQL Server Auditing profile set for SQL server is inherited by all the SQL Databases which are part of the SQL server.
Resource Types
This policy targets the following resource types:
Primary Policy
This policy is used with the following primary policy:
Related Policies
- 4.01.01 - Ensure that 'Auditing' is set to 'On'
- 4.01.02 - Ensure no Azure SQL Databases allow ingress from 0.0.0.0/0 (ANY IP)
- 4.01.03 - Ensure SQL server's Transparent Data Encryption (TDE) protector is encrypted with Customer-managed key
- 4.01.04 - Ensure that Azure Active Directory Admin is Configured for SQL Servers
- 4.01.05 - Ensure that 'Data encryption' is set to 'On' on a SQL Database
- 4.01.06 - Ensure that 'Auditing' Retention is 'greater than 90 days'
Controls
- Azure > CIS v2.0
- Azure > CIS v2.0 > 04 - Database Services
- Azure > CIS v2.0 > 04 - Database Services > 4.01 SQL Server - Auditing
Policy Specification
Schema Type |
|
---|---|
Default |
|
Valid Values [YAML] |
|
Examples [YAML] |
|
Category
In Your Workspace
Developers
- tmod:@turbot/cis#/control/categories/cis
- tmod:@turbot/azure-cisv2-0#/policy/types/s0401
- turbot graphql policy-type --id "tmod:@turbot/azure-cisv2-0#/policy/types/s0401"
- turbot graphql policy-settings --filter "policyTypeId:tmod:@turbot/azure-cisv2-0#/policy/types/s0401"
Get Policy TypeGet Policy Settings
Category URI
Policy Type URI
GraphQL
CLI