Skip to content

Latest commit

 

History

History
31 lines (22 loc) · 1.95 KB

File metadata and controls

31 lines (22 loc) · 1.95 KB

CIS Microsoft Azure Foundational Sentinel policies

The following code snippets show the configuration settings that are required to successfully deploy Sentinel policies that follow the security recommendations that are provided in the CIS Microsoft Azure Foundations Benchmark version 1.1.0. We cover policy configuration in more details in the Managing Sentinel Policies section in the Terraform Cloud documentation.

CIS 4.11: Ensure 'Enforce SSL connection' is set to 'ENABLED' for MySQL Database Server

Overview

Enforcing SSL connections between database server and client applications helps protect against "man in the middle" attacks by encrypting the data stream between the server and application.

Configuration

policy "azure-cis-4.11-databases-mysql-enforce-ssl-connection-is-enabled" {
  source = "https://raw.githubusercontent.com/hashicorp/terraform-foundational-policies-library/master/cis/azure/databases/azure-cis-4.11-databases-mysql-enforce-ssl-connection-is-enabled/azure-cis-4.11-databases-mysql-enforce-ssl-connection-is-enabled.sentinel"
  enforcement_level = "advisory"
}

CIS 4.13: Ensure 'Enforce SSL connection' is set to 'ENABLED' for PostgreSQL Database Server

Overview

Enforcing SSL connections between database server and client applications helps protect against "man in the middle" attacks by encrypting the data stream between the server and application.

Configuration

policy "azure-cis-4.13-databases-psql-enforce-ssl-connection-is-enabled" {
  source = "https://raw.githubusercontent.com/hashicorp/terraform-foundational-policies-library/master/cis/azure/databases/azure-cis-4.13-databases-psql-enforce-ssl-connection-is-enabled/azure-cis-4.13-databases-psql-enforce-ssl-connection-is-enabled.sentinel"
  enforcement_level = "advisory"
}