standard
turbot/azure_compliance

Pipeline: Correct Security Center with Azure Defender disabled for open-source relational database

Enable Azure Defender for open-source relational database in Security Center with Azure Defender disabled for open-source relational database.

Run the pipeline

To run this pipeline from your terminal:

flowpipe pipeline run azure_compliance.pipeline.correct_one_securitycenter_with_azure_defender_for_open_source_relational_db_disabled \
--arg 'title=<string>' \
--arg 'name=<string>' \
--arg 'subscription_id=<string>' \
--arg 'conn=<connection.azure>'

Use this pipeline

To call this pipeline from your pipeline, use a step:

step "pipeline" "step_name" {
pipeline = azure_compliance.pipeline.correct_one_securitycenter_with_azure_defender_for_open_source_relational_db_disabled
args = {
title = <string>
name = <string>
subscription_id = <string>
conn = <connection.azure>
}
}

Params

NameTypeRequiredDescriptionDefault
title
string
YesTitle of the resource, to be used as a display name.-
name
string
YesThe name of the security center subscription pricing.-
subscription_id
string
YesAzure Subscription Id. Examples: d46d7416-f95f-4771-bbb5-529d4c766.-
conn
connection.azure
YesName of the connection to be used for any authenticated actions.-
notifier
notifier
YesThe name of the notifier to use for sending notification messages.notifier.default
notification_level
string
verbose, info, error
YesThe verbosity level of notification messages to send. Valid options are 'verbose', 'info', 'error'.info
approvers
list(notifier)
YesList of notifiers to be used for obtaining action/approval decisions.notifier.default
default_action
string
notify, skip, enable_open_source_relational_db_azure_defender
YesThe default action to use when there are no approvers.notify
enabled_actions
list(string)
skip, enable_open_source_relational_db_azure_defender
YesThe list of enabled actions to provide to approvers for selection.
[
"skip",
"enable_open_source_relational_db_azure_defender"
]

Outputs

This pipeline has no outputs.

Tags

category = Compliance
folder = Internal
plugin = azure
service = Azure/SecurityCenter