Checks/Azure/Test-SqlserverUnrestrictedInboundAccess.ps1
|
function Test-SqlserverUnrestrictedInboundAccess { <# .SYNOPSIS Azure SQL Server does not have firewall rules allowing 0.0.0.0-255.255.255.255 .DESCRIPTION **Azure SQL Server** server-level firewall rules are evaluated for an entry that allows the entire IPv4 space (`0.0.0.0` to `255.255.255.255`). The finding identifies presence of this Internet-wide rule on the server firewall. .PARAMETER Check CIEMCheck object containing check metadata. #> [CmdletBinding()] [OutputType([PSCustomObject[]])] param( [Parameter(Mandatory)] [CIEMCheck]$Check ) $ErrorActionPreference = 'Stop' # TODO: Implement check logic based on Prowler check: sqlserver_unrestricted_inbound_access [CIEMScanResult]::Create($Check, 'MANUAL', 'This check requires manual implementation. See Prowler check sqlserver_unrestricted_inbound_access for reference.', 'N/A', 'sqlserver Resources') } |