Checks/Azure/Test-SqlserverUnrestrictedInboundAccess.ps1

function Test-SqlserverUnrestrictedInboundAccess {
    <#
    .SYNOPSIS
        Azure SQL Server does not have firewall rules allowing 0.0.0.0-255.255.255.255

    .DESCRIPTION
        **Azure SQL Server** server-level firewall rules are evaluated for an entry that allows the entire IPv4 space (`0.0.0.0` to `255.255.255.255`).
        
        The finding identifies presence of this Internet-wide rule on the server firewall.

    .PARAMETER Check
        CIEMCheck object containing check metadata.
    #>

    [CmdletBinding()]
    [OutputType([PSCustomObject[]])]
    param(
        [Parameter(Mandatory)]
        [CIEMCheck]$Check
    )

    $ErrorActionPreference = 'Stop'

    # TODO: Implement check logic based on Prowler check: sqlserver_unrestricted_inbound_access

    [CIEMScanResult]::Create($Check, 'MANUAL', 'This check requires manual implementation. See Prowler check sqlserver_unrestricted_inbound_access for reference.', 'N/A', 'sqlserver Resources')
}