Periodic recurring vulnerability assessment scans should be enabled on SQL servers
Warning: This rule will be deprecated 18 December 2023 as part of the update to Azure CIS version 2.0.0
Description
Enable vulnerability assessment (VA) periodic recurring scans for critical SQL servers and corresponding SQL databases.
Rationale
VA setting “Periodic recurring scans” schedules periodic (weekly) vulnerability scanning for the SQL server and corresponding Databases. Routine vulnerability scanning provides risk visibility based on updated known vulnerability signatures and best practices.
From the console
- Go to SQL servers
- For each server instance
- Click on Security Center
- In Section Vulnerability Assessment Settings, set Storage Account
- Toggle “Periodic recurring scans” to ON.
- Click Save using the Azure PowerShell. If not already set, enable Advanced Data Security for a SQL ServerSet:
-AZSqlServerThreatDetectionPolicy -ResourceGroupName <resource group name> -ServerName <server name> -EmailAdmins $True To enable ADS-VA service with ''Periodic recurring scans'' Update-AzSqlServerVulnerabilityAssessmentSetting ` -ResourceGroupName "<resource group name>"` -ServerName "<Server Name>"` -StorageAccountName "<Storage Name from same subscription and same Location" ` -ScanResultsContainerName "vulnerability-assessment" ` -RecurringScansInterval Weekly ` -EmailSubscriptionAdmins $true ` -NotificationEmail @("mail1@mail.com" , "mail2@mail.com")
Impact
Enabling the Azure Defender for SQL feature will incur additional costs for each SQL server.
References
- https://docs.microsoft.com/en-us/azure/sql-database/sql-vulnerability-assessment
- https://docs.microsoft.com/en-us/rest/api/sql/servervulnerabilityassessments/listbyserver
- https://docs.microsoft.com/en-in/powershell/module/Az.Sql/Update-AzSqlServerVulnerabilityAssessmentSetting?view=azps-2.6.0
- https://docs.microsoft.com/en-in/powershell/module/Az.Sql/Get-AzSqlServerVulnerabilityAssessmentSetting?view=azps-2.6.0
- https://docs.microsoft.com/en-us/azure/security/benchmarks/security-controls-v2-posture-vulnerability-management#pv-6-perform-software-vulnerability-assessments
CIS Controls
Version 7 3.1 Run Automated Vulnerability Scanning Tools: Utilize an up-to-date SCAP-compliant vulnerability scanning tool to automatically scan all systems on the network on a weekly or more frequent basis to identify all potential vulnerabilities on the organization’s systems.