Policy: Azure > CIS v3.0 > 05 - Database Services > 05.01 - Azure SQL Database
This section covers security best practice recommendations for Azure SQL Database. Azure Product Page: https://azure.microsoft.com/en-us/products/azure-sql/database/
Primary Policy
This policy is used with the following primary policy:
Related Policies
- 05.01.01 - Ensure that 'Auditing' is set to 'On'
- 05.01.02 - Ensure no Azure SQL Databases allow ingress from 0.0.0.0/0 (ANY IP)
- 05.01.03 - Ensure SQL Server's Transparent Data Encryption (TDE) protector is encrypted with Customer-managed key
- 05.01.04 - Ensure that Microsoft Entra authentication is Configured for SQL Servers
- 05.01.05 - Ensure that 'Data encryption' is set to 'On' on a SQL Database
- 05.01.06 - Ensure that 'Auditing' Retention is 'greater than 90 days'
- 05.01.07 - Ensure Public Network Access is Disabled
Category
In Your Workspace
Developers
- tmod:@turbot/cis#/control/categories/cis
- tmod:@turbot/azure-cisv3-0#/policy/types/s0501
- turbot graphql policy-type --id "tmod:@turbot/azure-cisv3-0#/policy/types/s0501"
- turbot graphql policy-settings --filter "policyTypeId:tmod:@turbot/azure-cisv3-0#/policy/types/s0501"
Get Policy TypeGet Policy Settings
Category URI
Policy Type URI
GraphQL
CLI