Azure Synapse SQL Pool Vulnerability Assessment

This page shows how to write Terraform and Azure Resource Manager for Synapse SQL Pool Vulnerability Assessment and write them securely.

azurerm_synapse_sql_pool_vulnerability_assessment (Terraform)

The SQL Pool Vulnerability Assessment in Synapse can be configured in Terraform with the resource name azurerm_synapse_sql_pool_vulnerability_assessment. The following sections describe how to use the resource and its parameters.

Example Usage from GitHub

An example could not be found in GitHub.

Review your Terraform file for Azure best practices

Shisho Cloud, our free checker to make sure your Terraform configuration follows best practices, is available (beta).

Parameters

The following arguments are supported:

  • sql_pool_security_alert_policy_id - (Required) The ID of the security alert policy of the Synapse SQL Pool. Changing this forces a new resource to be created.

  • storage_container_path - (Required) A blob storage container path to hold the scan results (e.g. https://myStorage.blob.core.windows.net/VaScans/).

  • storage_account_access_key - (Optional) Specifies the identifier key of the storage account for vulnerability assessment scan results. If storage_container_sas_key isn't specified, storage_account_access_key is required.

  • storage_container_sas_key - (Optional) A shared access signature (SAS Key) that has write access to the blob container specified in storage_container_path parameter. If storage_account_access_key isn't specified, storage_container_sas_key is required.

  • recurring_scans - (Optional) The recurring scans settings. The recurring_scans block supports fields documented below.


recurring_scans supports the following:

  • enabled - (Optional) Boolean flag which specifies if recurring scans is enabled or disabled. Defaults to false.
  • email_subscription_admins_enabled - (Optional) Boolean flag which specifies if the schedule scan notification will be sent to the subscription administrators. Defaults to false.
  • emails - (Optional) Specifies an array of e-mail addresses to which the scan notification is sent.

The following attributes are exported:

  • id - The ID of the Synapse SQL Pool Vulnerability Assessment.

Explanation in Terraform Registry

Manages the Vulnerability Assessment for a Synapse SQL Pool.

Tips: Best Practices for The Other Azure Synapse Resources

In addition to the azurerm_synapse_workspace, Azure Synapse has the other resources that should be configured for security reasons. Please check some examples of those resources and precautions.

risk-label

azurerm_synapse_workspace

Ensure to enable the managed virtual network

It is better to enable the managed virtual network, which is disabled as the default.

Review your Azure Synapse settings

In addition to the above, there are other security points you should be aware of making sure that your .tf files are protected in Shisho Cloud.

Microsoft.Synapse/workspaces/sqlPools/vulnerabilityAssessments (Azure Resource Manager)

The workspaces/sqlPools/vulnerabilityAssessments in Microsoft.Synapse can be configured in Azure Resource Manager with the resource name Microsoft.Synapse/workspaces/sqlPools/vulnerabilityAssessments. The following sections describe how to use the resource and its parameters.

Example Usage from GitHub

An example could not be found in GitHub.

Parameters

  • apiVersion required - string
  • name required - string

    The name of the vulnerability assessment.

  • properties required
      • recurringScans optional
          • emails optional - array

            Specifies an array of e-mail addresses to which the scan notification is sent.

          • emailSubscriptionAdmins optional - boolean

            Specifies that the schedule scan notification will be is sent to the subscription administrators.

          • isEnabled optional - boolean

            Recurring scans state.

      • storageAccountAccessKey optional - string

        Specifies the identifier key of the storage account for vulnerability assessment scan results. If 'StorageContainerSasKey' isn't specified, storageAccountAccessKey is required.

      • storageContainerPath optional - string

        A blob storage container path to hold the scan results (e.g. https://myStorage.blob.core.windows.net/VaScans/). It is required if server level vulnerability assessment policy doesn't set

      • storageContainerSasKey optional - string

        A shared access signature (SAS Key) that has write access to the blob container specified in 'storageContainerPath' parameter. If 'storageAccountAccessKey' isn't specified, StorageContainerSasKey is required.

  • type required - string

Frequently asked questions

What is Azure Synapse SQL Pool Vulnerability Assessment?

Azure Synapse SQL Pool Vulnerability Assessment is a resource for Synapse of Microsoft Azure. Settings can be wrote in Terraform.