standard
turbot/azure_compliance
Get Involved
Version
Pipeline: Detect & correct Security Centers with Azure Defender disabled for open-source relational database
Detect Security Centers with Azure Defender disabled for open-source relational database and then enable Azure Defender for open-source relational database.
Run the pipeline
To run this pipeline from your terminal:
flowpipe pipeline run azure_compliance.pipeline.detect_and_correct_securitycenters_with_azure_defender_for_open_source_relational_db_disabled
Use this pipeline
To call this pipeline from your pipeline, use a step:
step "pipeline" "step_name" { pipeline = azure_compliance.pipeline.detect_and_correct_securitycenters_with_azure_defender_for_open_source_relational_db_disabled }
Params
Name | Type | Required | Description | Default |
---|---|---|---|---|
database | connection.steampipe | Yes | Database connection string. | connection.steampipe.default |
notifier | notifier | Yes | The name of the notifier to use for sending notification messages. | notifier.default |
notification_level | string verbose , info , error | Yes | The verbosity level of notification messages to send. Valid options are 'verbose', 'info', 'error'. | info |
approvers | list(notifier) | Yes | List of notifiers to be used for obtaining action/approval decisions. | notifier.default |
default_action | string notify , skip , enable_open_source_relational_db_azure_defender | Yes | The default action to use when there are no approvers. | notify |
enabled_actions | list(string) skip , enable_open_source_relational_db_azure_defender | Yes | The list of enabled actions to provide to approvers for selection. |
|
Outputs
This pipeline has no outputs.
Tags
category = Compliance
plugin = azure
service = Azure/SecurityCenter