Description
Turning on Microsoft Defender for Azure SQL Databases enables threat detection for Managed Instance Azure SQL databases, providing threat intelligence, anomaly detection, and behavior analytics in Microsoft Defender for Cloud.
Rationaleβ
Enabling Microsoft Defender for Azure SQL Databases allows for greater defense-in-depth, includes functionality for discovering and classifying sensitive data, surfacing and mitigating potential database vulnerabilities, and detecting anomalous activities that could indicate a threat to your database.
Impactβ
Turning on Microsoft Defender for Azure SQL Databases incurs an additional cost per resource.
Auditβ
From Azure Portalβ
- Go to
Microsoft Defender for Cloud
. - Under
Management
, selectEnvironment Settings
. - Click on the subscription name.
- Select the
Defender plans
blade. - Click
Select types >
in the row forDatabases
. - Ensure the toggle switch next to
Azure SQL Databases
is set toOn
.
From Azure CLIβ
Run the following command:
az security pricing show -n SqlServers
Ensure PricingTier
is set to Standard
.
From PowerShellβ
Run the following command:
Get-AzSecurityPricing -Name 'SqlServers' | Select-Object Name,PricingTier
Ensure the PricingTier
is set to Standard
.
From Azure Policyβ
If referencing a digital copy of this Benchmark, clicking a Policy ID will open a link to the associated Policy definition in Azure.
-
Policy ID: 7fe3b40f-802b-4cdd-8bd4-fd799c948cc2 - Name:
Azure Defender for Azure SQL Database servers should be enabled
-
Policy ID: abfb7388-5bf4-4ad7-ba99-2cd2f41cebb9 - Name:
Azure Defender for SQL should be enabled for unprotected SQL Managed Instances
Default Valueβ
By default, Microsoft Defender plan is off
.
Referencesβ
- https://docs.microsoft.com/en-us/azure/security-center/security-center-detection-capabilities
- https://docs.microsoft.com/en-us/rest/api/securitycenter/pricings/list
- https://docs.microsoft.com/en-us/rest/api/securitycenter/pricings/update
- https://docs.microsoft.com/en-us/powershell/module/az.security/get-azsecuritypricing
- https://learn.microsoft.com/en-us/security/benchmark/azure/mcsb-data-protection#dp-2-monitor-anomalies-and-threats-targeting-sensitive-data
- https://learn.microsoft.com/en-us/security/benchmark/azure/mcsb-logging-threat-detection#lt-1-enable-threat-detection-capabilities