More Info:

Monitoring for ‘Delete SQL Server Firewall Rule’ events gives insight into network access changes and may reduce the time it takes to detect suspicious activity.

Risk Level

Low

Address

Security, Operational Maturity

Compliance Standards

ISO27001, HIPAA

Triage and Remediation

Remediation

To remediate the misconfiguration “Ensure Activity Log Alert exists for Delete SQL Server Firewall Rule” in Azure using Azure console, follow the below steps:

  1. Login to Azure portal (https://portal.azure.com/).

  2. Navigate to the SQL server for which you want to create the activity log alert.

  3. Under the Security section, click on “Firewalls and virtual networks”.

  4. Click on the “Activity Log Alerts” tab.

  5. Click on the “Add Activity Log Alert” button.

  6. In the “Create Activity Log Alert” window, provide the following details:

    a. Name: Provide a name for the alert.

    b. Description: Provide a description for the alert.

    c. Subscription: Select the subscription in which you want to create the alert.

    d. Resource Group: Select the resource group in which the SQL server is located.

    e. Resource Type: Select “Microsoft.Sql/servers/firewallRules” from the dropdown.

    f. Resource Name: Select the name of the SQL server for which you want to create the alert.

    g. Alert criteria: Under the “Alert criteria” section, select “Delete” from the “Operation Name” dropdown.

  7. Under the “Actions” section, select the action you want to perform when the alert is triggered. You can choose to send an email or a webhook notification.

  8. Click on the “Create Alert” button to create the activity log alert.

Once the activity log alert is created, you will receive a notification whenever a firewall rule is deleted from the SQL server.

Additional Reading: