Policy: Azure > SQL > Database > Advanced Data Security > Vulnerability Assessment > Storage Account
Define the storage account where scan results for database will be stored.
The storage account name is required. If the container name is not specified, then vulnerability-assessment
is taken as default.
example: - teststorageaccount - teststorageaccount/containername<br /><br />
Note: To avoid cross-region reads/writes of audit records, Azure highly recommends to use storage and server located in the same region.
Resource Types
This policy targets the following resource types:
Primary Policy
This policy is used with the following primary policy:
Controls
Policy Specification
Schema Type |
|
---|---|
Examples [YAML] | teststorageaccount/container-name |
Category
In Your Workspace
Developers
- tmod:@turbot/turbot#/control/categories/other
- tmod:@turbot/azure-sql#/policy/types/databaseVulnerabilityAssessmentStorageAccount
- turbot graphql policy-type --id "tmod:@turbot/azure-sql#/policy/types/databaseVulnerabilityAssessmentStorageAccount"
- turbot graphql policy-settings --filter "policyTypeId:tmod:@turbot/azure-sql#/policy/types/databaseVulnerabilityAssessmentStorageAccount"
Get Policy TypeGet Policy Settings
Category URI
Policy Type URI
GraphQL
CLI