Ensure that an Azure activity log alert is fired whenever “Create”, “Update” or “Delete SQL Server Firewall Rule” events are triggered in your Microsoft Azure cloud account. Activity log alerts get activated when a new activity log event that matches the condition specified in the alert occurs. In this case, the condition required for the alert is 'Whenever the Administrative Activity Log "Create/Update server firewall rule (Microsoft.Sql/servers/firewallRules)" has "any" level, with "any" status and event is initiated by "any"'.
This rule resolution is part of the Conformity Security & Compliance tool for Azure.
Monitoring your Microsoft Azure account for “Create”, “Update” or “Delete SQL Server Firewall Rule” events can give you insight into the changes made at the SQL servers firewall level and can help reduce the time it takes to detect suspicious activity.
Audit
To determine if there is an activity log alert created for “Create/Update/Delete SQL Server Firewall Rule” events in your Azure cloud account, perform the following actions:
Remediation / Resolution
To create a Microsoft Azure activity log alert for “Create/Update/Delete SQL Server Firewall Rule” events, perform the following actions:
References
- Azure Official Documentation
- Create, view, and manage activity log alerts by using Azure Monitor
- Action rules
- CIS Microsoft Azure Foundations
- Azure Command Line Interface (CLI) Documentation
- az monitor log-profiles
- az monitor activity-log alert list
- az monitor activity-log alert show
- az monitor activity-log alert create