Azure SQL

Overview
Critical
0
High
2
Medium
16
Low
3
Informational
0
Security issues (21)
Severity Non-Compliance Region Resource Issue Remediation Read more Action
Medium HIPAA (Backup) eastus master SQL Database is not restorable. To fulfill HIPAA requirements on backups of all user data and inventory to secure its future availability, ensure that SQL Database instances can be restored to a recent point. More info
Low eastus master SQL Database is not configured to be zone redundant. To avoid a single point of failure for all systems relying on SQL Databases, ensure that all SQL Database instances are created in multiple availability zones. More info
Medium CIS 4.1.1 PCI DSS 10.2 HIPAA (Audit) eastus my-sql-db SQL Database has Database Auditing disabled. To fulfill HIPAA requirements on secure audit record for read/write/delete activities in the system, ensure that SQL Database Auditing is enabled. More info
Medium HIPAA (Backup) eastus my-sql-db SQL Database is configured to retain backups for 5 days, while the recommended limit is 7 days. To fulfill HIPAA requirements on backups of all user data and inventory to secure its future availability, ensure that SQL Databases have a sufficient Point in Time Restore (PITR) backup retention period configured. More info
Medium CIS 4.4.2 PCI DSS (Old Protocols) HIPAA (Encryption) eastus prevasio-sql-server SQL Server has TLS version 1.1, which is lower than the desired TLS version 1.2. To comply with the industry standards, ensure TLS 1.2 or higher is used for all TLS connections to SQL Servers. More info
Medium CIS 4.1.6 PCI DSS 10.2 HIPAA (Audit) eastus prevasio-sql-server SQL Server Auditing retention is 10 days, while the recommended limit is 90 days. To fulfill HIPAA requirements on secure audit record for read/write/delete activities in the system, ensure that SQL Servers have a sufficient log data retention period, i.e. 90 days or more. More info
Medium eastus prevasio-sql-server SQL Server has no automatic tuning configured for indexes createIndex, dropIndex, forceLastGoodPlan. To monitor database queries and improve database workload performance, ensure that SQL Servers have automatic tuning enabled. More info
High CIS 4.1.2 eastus prevasio-sql-server SQL Server is open to outside traffic. In order to eliminate the exposure from the public Internet, ensure that your SQL Database Servers are accessible through private endpoints instead of public IP addresses or service endpoints. More info
Medium CIS 4.1.1 PCI DSS 10.2 HIPAA (Audit) westus master SQL Database has Database Auditing disabled. To fulfill HIPAA requirements on secure audit record for read/write/delete activities in the system, ensure that SQL Database Auditing is enabled. More info
Medium HIPAA (Backup) westus master SQL Database is not restorable. To fulfill HIPAA requirements on backups of all user data and inventory to secure its future availability, ensure that SQL Database instances can be restored to a recent point. More info
Low westus master SQL Database is not configured to be zone redundant. To avoid a single point of failure for all systems relying on SQL Databases, ensure that all SQL Database instances are created in multiple availability zones. More info
Low CIS 4.1.2 westus prevasio-sql-server2 SQL Server has no private endpoints configured. To connect your virtual network to services in Azure without a public IP address at the source or destination, ensure the SQL Servers are accessible only through private endpoints. More info
Medium westus prevasio-sql-server2 SQL Server has no auto-failover groups configured. To enable database replication and automatic failover, ensure that SQL Servers are using auto-failover groups. More info
Medium CIS 4.4.2 PCI DSS (Old Protocols) HIPAA (Encryption) westus prevasio-sql-server2 SQL Server has TLS version set to EnforcementDisabled, while the desired TLS version is 1.2. To comply with the industry standards, ensure TLS 1.2 or higher is used for all TLS connections to SQL Servers. More info
Medium westus prevasio-sql-server2 SQL Server has Advanced Data Security disabled. To provide a set of advanced SQL security capabilities for your SQL Database Servers, ensure that Advanced Data Security is enabled within your SQL Server configuration settings. More info
Medium westus prevasio-sql-server2 SQL Server has no Email Account Admins enabled. To send monitored data for unusual activity, vulnerabilities, and threats to the account admins and subscription owners, ensure that advanced data security for SQL Servers has Email Account Admins enabled. More info
High westus prevasio-sql-server2 SQL Server has no list of emails configured to which alerts could be sent upon detection of anomalous activities. To send alerts on unusual activity, vulnerabilities, and threats, specify email address(es) under "Send alerts to" in Advanced Threat Protection settings of Microsoft Defender for SQL. More info
Medium CIS 4.1.1 PCI DSS 10.2 HIPAA (Audit) westus prevasio-sql-server2 SQL Server has Database Auditing disabled. To fulfill HIPAA requirements on secure audit record for read/write/delete activities in the system, ensure that SQL Server Auditing is enabled. More info
Medium PCI DSS 10.2 HIPAA (Audit) westus prevasio-sql-server2 SQL Server has Audit Action and Groups disabled. To fulfill HIPAA requirements on secure audit record for read/write/delete activities in the system, ensure SQL Server Audit Action and Groups is configured to at least include SUCCESSFUL_DATABASE_AUTHENTICATION_GROUP, FAILED_DATABASE_AUTHENTICATION_GROUP and BATCH_COMPLETED_GROUP. More info
Medium CIS 4.1.4 westus prevasio-sql-server2 SQL Server uses no Active Directory administrator. To centrally manage identity and access to your SQL Database Servers, ensure that SQL Servers use an Active Directory administrator. More info
Medium CIS 4.1.3 westus prevasio-sql-server2 SQL Server has TDE (Transparent data encryption) that uses Microsoft managed key instead of BYOK (Bring Your Own Key). For greater control, transparency and increasing security by having full control of the encryption keys, ensure your SQL Server data at rest is protected with a key from your own Azure key vault. More info
SQL databases (3)
Database name Location Server Kind Created Status Security issues
masterEast USprevasio-sql-serverV12.0,system Online 1 Medium + 1 other (details)
my-sql-dbEast USprevasio-sql-serverV12.0,user,vcore Online 2 Medium (details)
masterWest USprevasio-sql-server2V12.0,system Online 2 Medium + 1 other (details)
SQL servers (2)
Server name Location Resource group Status Kind Minimal TLS version Public network access Security issues
prevasio-sql-serverEast USprevasio-web-app_group Readyv12.01.1Enabled 1 High + 3 others (details)
prevasio-sql-server2West UStest-clust_group Readyv12.0TLSEnforcementDisabledEnabled 1 High + 9 others (details)