Severity Framework
Snyk CCSS
Rule category
Monitoring / Vulnerabilities
Is your enviroment affected by this misconfiguration?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsFrameworks
CIS-Azure
- Snyk ID SNYK-CC-00699
- credit Snyk Research Team
Description
The vulnerability assessment setting "Send scan reports to" specifies email addresses that will be sent scan reports and alerts about critical SQL servers. Configuring this setting may reduce the time required for identifying vulnerability risks and taking corrective measures.
How to fix?
Set the recurringScans.emails
attribute to one or more valid email addresses.
Example Configuration
{
"$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#",
"contentVersion": "1.0.0.0",
"resources": [
{
"name": "example699a1/allowed",
"type": "Microsoft.Sql/servers/vulnerabilityAssessments",
"apiVersion": "2018-06-01-preview",
"properties": {
"storageContainerPath": "[concat(reference(resourceId('Microsoft.Storage/storageAccounts', 'example699')).primaryEndpoints.blob, 'vulnerability-assessment')]",
"storageAccountAccessKey": "[listKeys(resourceId('Microsoft.Storage/storageAccounts', 'example699'), '2018-02-01').keys[0].value]",
"recurringScans": {
"isEnabled": true,
"emailSubscriptionAdmins": true,
"emails": [
"email@example1.com",
"email@example2.com"
]
}
},
"dependsOn": [
"[concat('Microsoft.Storage/storageAccounts/', 'example699')]",
"[concat('Microsoft.Sql/servers/', 'example699a1', '/securityAlertPolicies/Default')]"
]
}
]
}