Turbot Guardrails Hub 
Hub
  • Mods
  • Policy Packs
  • Docs
  • Home
ModsPolicy PacksDocsHome
Policy Packs
Azure CIS v2.0.0 - Section 4 - Database Services
  • Azure > Cosmos DB > Database Account > Firewall
  • Azure > Cosmos DB > Database Account > Firewall > IP Ranges > Required
  • Azure > Cosmos DB > Database Account > Firewall > IP Ranges > Required > Items
  • Azure > Cosmos DB > Database Account > Firewall > Virtual Networks > Required
  • Azure > Cosmos DB > Database Account > Firewall > Virtual Networks > Required > Items
  • Azure > MySQL > Flexible Server > Encryption in Transit
  • Azure > MySQL > Flexible Server > Minimum TLS Version
  • Azure > MySQL > Server [Deprecated] > Encryption in Transit
  • Azure > PostgreSQL > Flexible Server > Audit Logging
  • Azure > PostgreSQL > Flexible Server > Audit Logging > Log Checkpoints
  • Azure > PostgreSQL > Flexible Server > Encryption in Transit
  • Azure > PostgreSQL > Server > Approved
  • Azure > PostgreSQL > Server > Approved > Custom
  • Azure > PostgreSQL > Server > Audit Logging
  • Azure > PostgreSQL > Server > Audit Logging > Connection Throttling
  • Azure > PostgreSQL > Server > Audit Logging > Log Checkpoints
  • Azure > PostgreSQL > Server > Audit Logging > Log Connections
  • Azure > PostgreSQL > Server > Audit Logging > Log Disconnections
  • Azure > PostgreSQL > Server > Audit Logging > Log Retention Days
  • Azure > PostgreSQL > Server > Encryption in Transit
  • Azure > SQL > Database > Encryption at Rest
  • Azure > SQL > Server > Active Directory Administrator
  • Azure > SQL > Server > Active Directory Administrator > Name
  • Azure > SQL > Server > Advanced Data Security
  • Azure > SQL > Server > Advanced Data Security > Threat Protection > Email Addresses
  • Azure > SQL > Server > Advanced Data Security > Threat Protection > Notify Admins
  • Azure > SQL > Server > Advanced Data Security > Threat Protection > Types
  • Azure > SQL > Server > Advanced Data Security > Vulnerability Assessment > Periodic Scans
  • Azure > SQL > Server > Advanced Data Security > Vulnerability Assessment > Periodic Scans > Email Addresses
  • Azure > SQL > Server > Advanced Data Security > Vulnerability Assessment > Periodic Scans > Notify Admins
  • Azure > SQL > Server > Advanced Data Security > Vulnerability Assessment > Storage Account
  • Azure > SQL > Server > Auditing
  • Azure > SQL > Server > Auditing > Retention Days
  • Azure > SQL > Server > Auditing > Storage Account
  • Azure > SQL > Server > Firewall > IP Ranges > Approved
  • Azure > SQL > Server > Firewall > IP Ranges > Approved > Rules
Get Involved
Discuss on Slack

Policy Setting: Azure > MySQL > Server [Deprecated] > Encryption in Transit

Policies

This policy setting is dependent on the following policy types:

  • Azure > MySQL > Server [Deprecated] > Encryption in Transit

Source

resource "turbot_policy_setting" "azure_mysql_server_encryption_in_transit" {
resource = turbot_policy_pack.main.id
type = "tmod:@turbot/azure-mysql#/policy/types/serverEncryptionInTransit"
note = "Azure CIS v2.0.0 - Control: 4.4.1"
value = "Check: Enabled"
# value = "Enforce: Enabled"
}
Guardrails
Guardrails Hub
  • Hub
  • Docs
  • Blog
  • Changelog
Products
  • GuardrailsGuardrails
  • PipesPipes
  • SteampipeSteampipe
  • PowerpipePowerpipe
  • FlowpipeFlowpipe
  • TailpipeTailpipe
Turbot
  • Home
  • About us
  • We're hiring!
  • Contact us
Community

Our community of practitioners love to discuss cloud governance & security.

Slack logoJoin us on Slack →

System StatusLegalSecurity
Terms of UseSecurityPrivacy