Azure Synapse SQL Pool Vulnerability Assessment Baseline

This page shows how to write Terraform and Azure Resource Manager for Synapse SQL Pool Vulnerability Assessment Baseline and write them securely.

azurerm_synapse_sql_pool_vulnerability_assessment_baseline (Terraform)

The SQL Pool Vulnerability Assessment Baseline in Synapse can be configured in Terraform with the resource name azurerm_synapse_sql_pool_vulnerability_assessment_baseline. The following sections describe how to use the resource and its parameters.

Example Usage from GitHub

An example could not be found in GitHub.

Review your Terraform file for Azure best practices

Shisho Cloud, our free checker to make sure your Terraform configuration follows best practices, is available (beta).

Parameters

The following arguments are supported:

  • name - (Required) The name which should be used for this Synapse SQL Pool Vulnerability Assessment Rule Baseline.

  • rule_name - (Required) The ID of the vulnerability assessment rule.

  • sql_pool_vulnerability_assessment_id - (Required) The ID of the Synapse SQL Pool Vulnerability Assessment. Changing this forces a new Synapse SQL Pool Vulnerability Assessment Rule Baseline to be created.


  • baseline - (Optional) One or more baseline blocks as defined below.

A baseline block supports the following:

  • result - (Required) Specifies a list of rule baseline result.

In addition to the Arguments listed above - the following Attributes are exported:

  • id - The ID of the Synapse SQL Pool Vulnerability Assessment Rule Baseline.

Explanation in Terraform Registry

Manages a Synapse SQL Pool Vulnerability Assessment Rule Baseline.

Tips: Best Practices for The Other Azure Synapse Resources

In addition to the azurerm_synapse_workspace, Azure Synapse has the other resources that should be configured for security reasons. Please check some examples of those resources and precautions.

risk-label

azurerm_synapse_workspace

Ensure to enable the managed virtual network

It is better to enable the managed virtual network, which is disabled as the default.

Review your Azure Synapse settings

In addition to the above, there are other security points you should be aware of making sure that your .tf files are protected in Shisho Cloud.

Microsoft.Synapse/workspaces/sqlPools/vulnerabilityAssessments/rules/baselines (Azure Resource Manager)

The workspaces/sqlPools/vulnerabilityAssessments/rules/baselines in Microsoft.Synapse can be configured in Azure Resource Manager with the resource name Microsoft.Synapse/workspaces/sqlPools/vulnerabilityAssessments/rules/baselines. The following sections describe how to use the resource and its parameters.

Example Usage from GitHub

An example could not be found in GitHub.

Parameters

  • apiVersion required - string
  • name required - string

    The name of the vulnerability assessment rule baseline (default implies a baseline on a Sql pool level rule and master for workspace level rule).

  • properties required
      • baselineResults required array
          • result required - array

            The rule baseline result

  • type required - string

Frequently asked questions

What is Azure Synapse SQL Pool Vulnerability Assessment Baseline?

Azure Synapse SQL Pool Vulnerability Assessment Baseline is a resource for Synapse of Microsoft Azure. Settings can be wrote in Terraform.