다음을 통해 공유


Express 구성 PowerShell 래퍼 모듈

이 문서에는 SQL 취약성 평가 빠른 구성을 위한 PowerShell 래퍼가 포함되어 있습니다.

스크립트의 로컬 복사본을 만들고 다음 파일 이름 SqlVulnerabilityAssessmentCommands.psm1로 파일을 저장해야 합니다.

래퍼의 로컬 복사본을 만든 후에는 Express 구성 PowerShell 명령 참조를 사용해야 합니다.

SqlVulnerabilityAssessmentCommands.psm1

#Requires -Modules @{ ModuleName="Az.Sql"; ModuleVersion="3.11.0" }
#Requires -Modules @{ ModuleName="Az.Accounts"; ModuleVersion="2.9.1" }
#Requires -Version 5.1

######SQL Vulnerability Assessment PowerShell Commands ######
#############################################################

###Sql Vulnerability Assessment Baseline###

# Create Or Update
function Set-SqlVulnerabilityAssessmentBaseline([parameter(mandatory)] [string] $SubscriptionId, [parameter(mandatory)] [string] $ResourceGroupName, [parameter(mandatory)] [string] $ServerName, [parameter(mandatory)] [string] $DatabaseName, [parameter(mandatory)] [string] $Body) {
    <#
        .SYNOPSIS
        Sets vulnerability assessment baselines on the database.

        .DESCRIPTION
        Sets vulnerability assessment baselines on the database.

        .PARAMETER SubscriptionId
        Subscription id.

        .PARAMETER ResourceGroupName
        Resource group name.

        .PARAMETER ServerName
        Server name.

        .PARAMETER DatabaseName
        Database name.

        .PARAMETER Body
        Baseline.

        .EXAMPLE
        Set-SqlVulnerabilityAssessmentBaseline -SubscriptionId 00000000-1111-2222-3333-444444444444 -ResourceGroupName vulnerabilityaseessmenttestRg -ServerName vulnerabilityaseessmenttest -DatabaseName db -Body '{  "properties": {    "latestScan": true,    "results": {}  }}'
        Headers    : {[Pragma, System.String[]], [x-ms-request-id, System.String[]], [x-ms-ratelimit-remaining-subscription-writes, System.String[]], [x-ms-correlation-request-id, System.String[]]...}
        Version    : 1.1
        StatusCode : 200
        Method     : PUT
        Content    : {"properties":{"results":{"VA1143":[["True"]],"VA1219":[["False"]]}},"id":"/subscriptions/00000000-1111-2222-3333-444444444444/resourceGroups/vulnerabilityaseessmenttestRg/providers/Microsoft.Sql/serv
                    ers/vulnerabilityaseessmenttest/databases/db/sqlVulnerabilityAssessments/Default/baselines/Default","name":"Default","type":"Microsoft.Sql/servers/databases/sqlVulnerabilityAssessments/baselines"}

        .EXAMPLE
        Set-SqlVulnerabilityAssessmentBaseline -SubscriptionId 00000000-1111-2222-3333-444444444444-ResourceGroupName vulnerabilityaseessmenttestRg -ServerName vulnerabilityaseessmenttest -DatabaseName db -Body '{
            "properties": {
                "latestScan": false,
                "results": {
                    "VA2062": [
                        [
                            "AllowAll",
                            "0.0.0.0",
                            "255.255.255.255"
                        ]
                    ]
                }
            }
        }'
        Headers    : {[Pragma, System.String[]], [x-ms-request-id, System.String[]], [x-ms-ratelimit-remaining-subscription-writes, System.String[]], [x-ms-correlation-request-id, System.String[]]...}
        Version    : 1.1
        StatusCode : 200
        Method     : PUT
        Content    : {"properties":{"results":{"VA2062":[["AllowAll","0.0.0.0","255.255.255.255"]]}},"id":"/subscriptions/00000000-1111-2222-3333-444444444444/resourceGroups/vulnerabilityaseessmenttestRg/providers/Microso
                    ft.Sql/servers/vulnerabilityaseessmenttest/databases/db/sqlVulnerabilityAssessments/Default/baselines/Default","name":"Default","type":"Microsoft.Sql/servers/databases/sqlVulnerabilityAssessments/baseline
                    s"}
    #>
    if ($DatabaseName -eq 'master') {
        $Uri = "/subscriptions/$SubscriptionId/resourceGroups/$ResourceGroupName/providers/Microsoft.Sql/servers/$ServerName/sqlVulnerabilityAssessments/default/baselines/default?api-version=2022-02-01-preview&systemDatabaseName=master"
    } else {
        $Uri = "/subscriptions/$SubscriptionId/resourceGroups/$ResourceGroupName/providers/Microsoft.Sql/servers/$ServerName/databases/$DatabaseName/sqlVulnerabilityAssessments/default/baselines/default?api-version=2022-02-01-preview"
    }

    return SendRestRequest -Method "Put" -Uri $Uri -Body $Body
}

# Get
function Get-SqlVulnerabilityAssessmentBaseline([parameter(mandatory)] [string] $SubscriptionId, [parameter(mandatory)] [string] $ResourceGroupName, [parameter(mandatory)] [string] $ServerName, [parameter(mandatory)] [string] $DatabaseName) {
    <#
        .SYNOPSIS
        Gets vulnerability assessment baselines for the user database.

        .DESCRIPTION
        Gets vulnerability assessment baselines for the user database.

        .PARAMETER SubscriptionId
        Subscription id.

        .PARAMETER ResourceGroupName
        Resource group name.

        .PARAMETER ServerName
        Server name.

        .PARAMETER DatabaseName
        Database name.

        .EXAMPLE
        Get-SqlVulnerabilityAssessmentBaseline -SubscriptionId 00000000-1111-2222-3333-444444444444-ResourceGroupName vulnerabilityaseessmenttestRg -ServerName vulnerabilityaseessmenttest -DatabaseName db
        Headers    : {[Pragma, System.String[]], [x-ms-request-id, System.String[]], [x-ms-ratelimit-remaining-subscription-reads, System.String[]], [x-ms-correlation-request-id, System.String[]]...}
        Version    : 1.1
        StatusCode : 200
        Method     : GET
        Content    : {"properties":{"results":{"VA1143":[["True"]],"VA1219":[["False"]]}},"id":"/subscriptions/00000000-1111-2222-3333-444444444444/resourceGroups/vulnerabilityaseessmenttestRg/providers/Microsoft.Sql/serv
                    ers/vulnerabilityaseessmenttest/databases/db/sqlVulnerabilityAssessments/Default/baselines/Default","name":"Default","type":"Microsoft.Sql/servers/databases/sqlVulnerabilityAssessments/baselines"}
    #>

    if ($DatabaseName -eq 'master') {
        $Uri = "/subscriptions/$SubscriptionId/resourceGroups/$ResourceGroupName/providers/Microsoft.Sql/servers/$ServerName/sqlVulnerabilityAssessments/default/baselines/default?api-version=2022-02-01-preview&systemDatabaseName=master"
    } else {
        $Uri = "/subscriptions/$SubscriptionId/resourceGroups/$ResourceGroupName/providers/Microsoft.Sql/servers/$ServerName/databases/$DatabaseName/sqlVulnerabilityAssessments/default/baselines/default?api-version=2022-02-01-preview"
    }
    return SendRestRequest -Method "Get" -Uri $Uri
}

###Database Sql Vulnerability Assessment Rule Baselines###

# Create Or Update
function Set-SqlVulnerabilityAssessmentBaselineRule([parameter(mandatory)] [string] $SubscriptionId, [parameter(mandatory)] [string] $ResourceGroupName, [parameter(mandatory)] [string] $ServerName, [parameter(mandatory)] [string] $DatabaseName, [parameter(mandatory)] [string] $RuleId, [parameter(mandatory)] [string] $Body) {
    <#
        .SYNOPSIS
        Sets vulnerability assessment baseline for a specific rule on the database.

        .DESCRIPTION
        Sets vulnerability assessment baseline for a specific rule on the database.

        .PARAMETER SubscriptionId
        Subscription id.

        .PARAMETER ResourceGroupName
        Resource group name.

        .PARAMETER ServerName
        Server name.

        .PARAMETER DatabaseName
        Database name.

        .PARAMETER RuleId
        Rule id.

        .PARAMETER Body
        Baseline.

        .EXAMPLE
        Set-SqlVulnerabilityAssessmentBaselineRule -SubscriptionId 00000000-1111-2222-3333-444444444444-ResourceGroupName vulnerabilityaseessmenttestRg -ServerName vulnerabilityaseessmenttest -DatabaseName db -RuleId VA2062 -Body '{
        "properties": {
            "latestScan": false,
            "results": [
                [
                "AllowAll",
                "0.0.0.0",
                "255.255.255.255"
                ]
            ]
        }
        }'
        Headers    : {[Cache-Control, System.String[]], [Pragma, System.String[]], [x-ms-request-id, System.String[]], [Server,
                    System.String[]]…}
        Version    : 1.1
        StatusCode : 200
        Method     : PUT
        Content    : {"properties":{"results":[["AllowAll","0.0.0.0","255.255.255.255"]]},"id":"/subscriptions/00000000-1111-2222-3333-444444444444/resourceGroups/vulnerabilityaseessmenttestRg/providers/Microsoft.Sql/servers/vulnerabilityaseessmenttest/dat
                    abases/db/sqlVulnerabilityAssessments/Default/baselines/default/rules/VA2062","name":"VA2062","type":"Mic
                    rosoft.Sql/servers/databases/sqlVulnerabilityAssessments/baselines"}
    #>
    if ($DatabaseName -eq 'master') {
        $Uri = "/subscriptions/$SubscriptionId/resourceGroups/$ResourceGroupName/providers/Microsoft.Sql/servers/$ServerName/sqlVulnerabilityAssessments/default/baselines/default/rules/$RuleId" + "?api-version=2022-02-01-preview&systemDatabaseName=master"
    } else {
        $Uri = "/subscriptions/$SubscriptionId/resourceGroups/$ResourceGroupName/providers/Microsoft.Sql/servers/$ServerName/databases/$DatabaseName/sqlVulnerabilityAssessments/default/baselines/default/rules/$RuleId" + "?api-version=2022-02-01-preview"
    }

    return SendRestRequest -Method "Put" -Uri $Uri -Body $Body
}

# Get
function Get-SqlVulnerabilityAssessmentBaselineRule([parameter(mandatory)] [string] $SubscriptionId, [parameter(mandatory)] [string] $ResourceGroupName, [parameter(mandatory)] [string] $ServerName, [parameter(mandatory)] [string] $DatabaseName, $RuleId) {
    <#
        .SYNOPSIS
        Gets vulnerability assessment baseline for a specific rule from the database.

        .DESCRIPTION
        Gets vulnerability assessment baseline for a specific rule from the database.

        .PARAMETER SubscriptionId
        Subscription id.

        .PARAMETER ResourceGroupName
        Resource group name.

        .PARAMETER ServerName
        Server name.

        .PARAMETER DatabaseName
        Database name.

        .PARAMETER RuleId
        Rule id.

        .EXAMPLE
        Get-SqlVulnerabilityAssessmentBaselineRule -SubscriptionId 00000000-1111-2222-3333-444444444444-ResourceGroupName vulnerabilityaseessmenttestRg -ServerName vulnerabilityaseessmenttest -DatabaseName db -RuleId VA2062
        Headers    : {[Cache-Control, System.String[]], [Pragma, System.String[]], [x-ms-request-id, System.String[]], [Server,
                    System.String[]]…}
        Version    : 1.1
        StatusCode : 200
        Method     : GET
        Content    : {"properties":{"results":[["AllowAll","0.0.0.0","255.255.255.255"]]},"id":"/subscriptions/00000000-1111-2222-3333-444444444444/resourceGroups/vulnerabilityaseessmenttestRg/providers/Microsoft.Sql/servers/vulnerabilityaseessmenttest/dat
                    abases/db/sqlVulnerabilityAssessments/Default/baselines/default/rules/VA2062","name":"VA2062","type":"Mic
                    rosoft.Sql/servers/databases/sqlVulnerabilityAssessments/baselines"}

        .EXAMPLE
        Get-SqlVulnerabilityAssessmentBaselineRule -SubscriptionId 00000000-1111-2222-3333-444444444444-ResourceGroupName vulnerabilityaseessmenttestRg -ServerName vulnerabilityaseessmenttest -DatabaseName db
        Headers    : {[Cache-Control, System.String[]], [Pragma, System.String[]], [x-ms-request-id, System.String[]], [Server,
                    System.String[]]…}
        Version    : 1.1
        StatusCode : 200
        Method     : GET
        Content    : {"value":[{"properties":{"results":[["True"]]},"id":"/subscriptions/00000000-1111-2222-3333-444444444444/r
                    esourceGroups/vulnerabilityaseessmenttestRg/providers/Microsoft.Sql/servers/vulnerabilityaseessmenttest/databases/db/sqlVulnerab
                    ilityAssessments/Default/baselines/default/rules/VA1143","name":"VA1143","type":"Microsoft.Sql/servers/dat
                    abases/sqlVulnerabilityAssessments/baselines"},{"properties":{"results":[["False"]]},"id":"/subscriptions/
                    00000000-1111-2222-3333-444444444444/resourceGroups/vulnerabilityaseessmenttestRg/providers/Microsoft.Sql/servers/m
                    igrationsql1/databases/db/sqlVulnerabilityAssessments/Default/baselines/default/rules/VA1219","name":"VA1
                    219","type":"Microsoft.Sql/servers/databases/sqlVulnerabilityAssessments/baselines"},{"properties":{"resul
                    ts":[["AllowAll","0.0.0.0","255.255.255.255"]]},"id":"/subscriptions/00000000-1111-2222-3333-444444444444/
                    resourceGroups/vulnerabilityaseessmenttestRg/providers/Microsoft.Sql/servers/vulnerabilityaseessmenttest/databases/db/sqlVulnera
                    bilityAssessments/Default/baselines/default/rules/VA2062","name":"VA2062","type":"Microsoft.Sql/servers/da
                    tabases/sqlVulnerabilityAssessments/baselines"}]}
    #>
        if ($DatabaseName -eq 'master') {
            $Uri = "/subscriptions/$SubscriptionId/resourceGroups/$ResourceGroupName/providers/Microsoft.Sql/servers/$ServerName/sqlVulnerabilityAssessments/default/baselines/default/rules/$RuleId" + "?api-version=2022-02-01-preview&systemDatabaseName=master"
        } else {
            $Uri = "/subscriptions/$SubscriptionId/resourceGroups/$ResourceGroupName/providers/Microsoft.Sql/servers/$ServerName/databases/$DatabaseName/sqlVulnerabilityAssessments/default/baselines/default/rules/$RuleId" + "?api-version=2022-02-01-preview"
        }

    return SendRestRequest -Method "Get" -Uri $Uri
}

# Remove
function Remove-SqlVulnerabilityAssessmentBaselineRule([parameter(mandatory)] [string] $SubscriptionId, [parameter(mandatory)] [string] $ResourceGroupName, [parameter(mandatory)] [string] $ServerName, [parameter(mandatory)] [string] $DatabaseName, [parameter(mandatory)] [string] $RuleId) {
    <#
        .SYNOPSIS
        Deletes vulnerability assessment baseline for a specific rule from the database.

        .DESCRIPTION
        Deletes vulnerability assessment baseline for a specific rule from the database.

        .PARAMETER SubscriptionId
        Subscription id.

        .PARAMETER ResourceGroupName
        Resource group name.

        .PARAMETER ServerName
        Server name.

        .PARAMETER DatabaseName
        Database name.

        .PARAMETER RuleId
        Rule id.

        .EXAMPLE
        Remove-SqlVulnerabilityAssessmentBaselineRule -SubscriptionId 00000000-1111-2222-3333-444444444444-ResourceGroupName vulnerabilityaseessmenttestRg -ServerName vulnerabilityaseessmenttest -DatabaseName db -RuleId VA2062
        Headers    : {[Cache-Control, System.String[]], [Pragma, System.String[]], [x-ms-request-id, System.String[]], [Server,
                    System.String[]]…}
        Version    : 1.1
        StatusCode : 200
        Method     : DELETE
        Content    :
    #>
    if ($DatabaseName -eq 'master') {
        $Uri = "/subscriptions/$SubscriptionId/resourceGroups/$ResourceGroupName/providers/Microsoft.Sql/servers/$ServerName/sqlVulnerabilityAssessments/default/baselines/default/rules/$RuleId" + "?api-version=2022-02-01-preview&systemDatabaseName=master"
    } else {
        $Uri = "/subscriptions/$SubscriptionId/resourceGroups/$ResourceGroupName/providers/Microsoft.Sql/servers/$ServerName/databases/$DatabaseName/sqlVulnerabilityAssessments/default/baselines/default/rules/$RuleId" + "?api-version=2022-02-01-preview"
    }

    return SendRestRequest -Method "Delete" -Uri $Uri
}

###Sql Vulnerability Assessment Scan Result###

# Get
function Get-SqlVulnerabilityAssessmentScanResults([parameter(mandatory)] [string] $SubscriptionId, [parameter(mandatory)] [string] $ResourceGroupName, [parameter(mandatory)] [string] $ServerName, [parameter(mandatory)] [string] $DatabaseName, [parameter(mandatory)] [string] $ScanId, $RuleId) {
    <#
        .SYNOPSIS
        Gets vulnerability assessment scan results for a specific rule from the database.

        .DESCRIPTION
        Gets vulnerability assessment scan results for a specific rule from the database.

        .PARAMETER SubscriptionId
        Subscription id.

        .PARAMETER ResourceGroupName
        Resource group name.

        .PARAMETER ServerName
        Server name.

        .PARAMETER DatabaseName
        Database name.

        .PARAMETER ScanId
        Scan id.

        .PARAMETER RuleId
        Rule id.

        .EXAMPLE
        Get-SqlVulnerabilityAssessmentScanResults -SubscriptionId 00000000-1111-2222-3333-444444444444-ResourceGroupName vulnerabilityaseessmenttestRg -ServerName vulnerabilityaseessmenttest -DatabaseName db -ScanId latest -RuleId VA2062
        Headers    : {[Cache-Control, System.String[]], [Pragma, System.String[]], [x-ms-request-id, System.String[]], [Server,
                    System.String[]]…}
        Version    : 1.1
        StatusCode : 200
        Method     : GET
        Content    : {"properties":{"ruleId":"VA2062","status":"NonFinding","errorMessage":null,"isTrimmed":false,"queryResults
                    ":[],"remediation":{"description":"Remove database firewall rules that grant excessive access","scripts":[
                    ],"automated":false,"portalLink":""},"baselineAdjustedResult":null,"ruleMetadata":{"ruleId":"VA2062","seve
                    rity":"High","category":"SurfaceAreaReduction","ruleType":"NegativeList","title":"Database-level firewall
                    rules should not grant excessive access","description":"The Azure SQL Database-level firewall helps protec
                    t your data by preventing all access to your database until you specify which IP addresses have permission
                    . Database-level firewall rules grant access to the specific database based on the originating IP address
                    of each request.\n\nDatabase-level firewall rules for master and user databases can only be created and ma
                    naged through Transact-SQL (unlike server-level firewall rules which can also be created and managed using
                    the Azure portal or PowerShell). For more details please see: https://docs.microsoft.com/azure/sql-
                    database/sql-database-firewall-configure\n\nThis check verifies that each database-level firewall rule doe
                    s not grant access to more than 255 IP addresses.","rationale":"Often, administrators add rules that grant
                    excessive access as part of a troubleshooting process - to eliminate the firewall as the source of a prob
                    lem, they simply create a rule that allows all traffic to pass to the affected database.\n\nGranting exces
                    sive access using database firewall rules is a clear security concern, as it violates the principle of lea
                    st privilege by allowing unnecessary access to your database. In fact, it's the equivalent of placing the
                    database outside of the firewall.","queryCheck":{"query":"SELECT name AS [Firewall Rule Name]\n    ,start_
                    ip_address AS [Start Address]\n    ,end_ip_address AS [End Address]\nFROM sys.database_firewall_rules\nWHE
                    RE ( \n        (CONVERT(bigint, parsename(end_ip_address, 1)) +\n         CONVERT(bigint, parsename(end_ip
                    _address, 2)) * 256 + \n         CONVERT(bigint, parsename(end_ip_address, 3)) * 65536 + \n         CONVER
                    T(bigint, parsename(end_ip_address, 4)) * 16777216 ) \n        - \n        (CONVERT(bigint, parsename(star
                    t_ip_address, 1)) +\n         CONVERT(bigint, parsename(start_ip_address, 2)) * 256 + \n         CONVERT(b
                    igint, parsename(start_ip_address, 3)) * 65536 + \n         CONVERT(bigint, parsename(start_ip_address, 4)
                    ) * 16777216 )\n      ) > 255","expectedResult":[],"columnNames":["Firewall Rule Name","Start Address","En
                    d Address"]},"benchmarkReferences":[]}},"id":"/subscriptions/00000000-1111-2222-3333-444444444444/resource
                    Groups/vulnerabilityaseessmenttestRg/providers/Microsoft.Sql/servers/vulnerabilityaseessmenttest/databases/db/sqlVulnerabilityAs
                    sessments/Default/scans/VA2062/scanResults/VA2062","name":"VA2062","type":"Microsoft.Sql/servers/databases
                    /sqlVulnerabilityAssessments/scans/scanResults"}

        .EXAMPLE
        Get-SqlVulnerabilityAssessmentScanResults -SubscriptionId 00000000-1111-2222-3333-444444444444-ResourceGroupName vulnerabilityaseessmenttestRg -ServerName vulnerabilityaseessmenttest -DatabaseName db -ScanId latest
        Headers    : {[Cache-Control, System.String[]], [Pragma, System.String[]], [x-ms-request-id, System.String[]], [Server,
                    System.String[]]…}
        Version    : 1.1
        StatusCode : 200
        Method     : GET
        Content    : {"value":[
                    {"properties":{"ruleId":"VA1219","status":"No
                    nFinding","errorMessage":null,"isTrimmed":false,"queryResults":[["False"]],"remediation":{"description":"E
                    nable TDE on the affected databases","scripts":[],"automated":false,"portalLink":"EnableTDE"},"baselineAdj
                    ustedResult":{"baseline":{"expectedResults":[["False"]],"updatedTime":"2023-05-15T08:52:39.3476874+00:00"}
                    ,"status":"NonFinding","resultsNotInBaseline":[],"resultsOnlyInBaseline":[]},"ruleMetadata":{"ruleId":"VA1
                    219","severity":"Medium","category":"DataProtection","ruleType":"Binary","title":"Transparent data encrypt
                    ion should be enabled","description":"Transparent data encryption (TDE) helps to protect the database file
                    s against information disclosure by performing real-time encryption and decryption of the database, associ
                    ated backups, and transaction log files 'at rest', without requiring changes to the application. This rule
                    checks that TDE is enabled on the database.","rationale":"Transparent Data Encryption (TDE) protects data
                    'at rest', meaning the data and log files are encrypted when stored on disk.","queryCheck":{"query":"SELE
                    CT CASE\n        WHEN EXISTS (\n                SELECT *\n                FROM sys.databases\n
                        WHERE db_name(database_id) = db_name()\n                    AND is_encrypted = 0\n                )\n
                                THEN 1\n        ELSE 0\n        END AS [Violation]","expectedResult":[["0"]],"columnNames":["Vi
                    olation"]},"benchmarkReferences":[{"benchmark":"FedRAMP","reference":null}]}},"id":"/subscriptions/f000000
                    00-1111-2222-3333-444444444444/resourceGroups/vulnerabilityaseessmenttestRg/providers/Microsoft.Sql/servers/
                    vulnerabilityaseessmenttest/databases/db/sqlVulnerabilityAssessments/Default/scans/VA1219/scanResults/VA1219","name":"VA1219","
                    type":"Microsoft.Sql/servers/databases/sqlVulnerabilityAssessments/scans/scanResults"},{"prope
                    rties":{"ruleId":"VA1223","status":"NonFinding","errorMessage":null,"isTrimmed":false,"queryResults":[],"r
                    emediation":{"description":"Create new certificates, re-encrypt the data/sign-data using the new key, and
                    drop the affected keys.","scripts":[],"automated":false,"portalLink":""},"baselineAdjustedResult":null,"ru
                    leMetadata":{"ruleId":"VA1223","severity":"High","category":"DataProtection","ruleType":"NegativeList","ti
                    tle":"Certificate keys should use at least 2048 bits","description":"Certificate keys are used in RSA and
                    other encryption algorithms to protect data. These keys need to be of enough length to secure the user's d
                    ata. This rule checks that the key's length is at least 2048 bits for all certificates.","rationale":"Key
                    length defines the upper-bound on the encryption algorithm's security. Using short keys in encryption algo
                    rithms may lead to weaknesses in data-at-rest protection.","queryCheck":{"query":"SELECT name AS [Certific
                    ate Name], thumbprint AS [Thumbprint]\nFROM sys.certificates\nWHERE key_length < 2048","expectedResult":[]
                    ,"columnNames":["Certificate Name","Thumbprint"]},"benchmarkReferences":[{"benchmark":"FedRAMP","reference
                    ":null}]}},"id":"/subscriptions/00000000-1111-2222-3333-444444444444/resourceGroups/vulnerabilityaseessmenttestRg/p
                    roviders/Microsoft.Sql/servers/vulnerabilityaseessmenttest/databases/db/sqlVulnerabilityAssessments/Default/scans/VA122
                    3/scanResults/VA1223","name":"VA1223","type":"Microsoft.Sql/servers/databases/sqlVulnerabilityAssessments/
                    scans/scanResults"}]}
    #>

    if ($DatabaseName -eq 'master') {
        $Uri = "/subscriptions/$SubscriptionId/resourceGroups/$ResourceGroupName/providers/Microsoft.Sql/servers/$ServerName/sqlVulnerabilityAssessments/default/scans/$ScanId/scanResults/$RuleId" + "?api-version=2022-02-01-preview&systemDatabaseName=master"
    } else {
        $Uri = "/subscriptions/$SubscriptionId/resourceGroups/$ResourceGroupName/providers/Microsoft.Sql/servers/$ServerName/databases/$DatabaseName/sqlVulnerabilityAssessments/default/scans/$ScanId/scanResults/$RuleId" + "?api-version=2022-02-01-preview"
    }
    return SendRestRequest -Method "Get" -Uri $Uri
}

###Sql Vulnerability Assessment Scans###

# Get
function Get-SqlVulnerabilityAssessmentScans([parameter(mandatory)] [string] $SubscriptionId, [parameter(mandatory)] [string] $ResourceGroupName, [parameter(mandatory)] [string] $ServerName, [parameter(mandatory)] [string] $DatabaseName, $ScanId) {
    <#
        .SYNOPSIS
        Gets vulnerability assessment scan summary from the database.

        .DESCRIPTION
        Gets vulnerability assessment scan summary from the database.

        .PARAMETER SubscriptionId
        Subscription id.

        .PARAMETER ResourceGroupName
        Resource group name.

        .PARAMETER ServerName
        Server name.

        .PARAMETER DatabaseName
        Database name.

        .PARAMETER ScanId
        Scan id.

        .EXAMPLE
        Get-SqlVulnerabilityAssessmentScans -SubscriptionId 00000000-1111-2222-3333-444444444444-ResourceGroupName vulnerabilityaseessmenttestRg -ServerName vulnerabilityaseessmenttest -DatabaseName db -ScanId latest
        Headers    : {[Cache-Control, System.String[]], [Pragma, System.String[]], [x-ms-request-id, System.String[]], [Server,
                    System.String[]]…}
        Version    : 1.1
        StatusCode : 200
        Method     : GET
        Content    : {"properties":{"scanId":"f64d81a1-9d7b-4516-a623-a1bfc845ed7e","triggerType":"OnDemand","state":"Passed","
                    startTime":"2023-04-17T12:52:41.4142209Z","endTime":"2023-04-17T12:52:41.5235755Z","server":"vulnerabilityaseessmenttest
                    ","database":"db","sqlVersion":"16.0.5100","highSeverityFailedRulesCount":0,"mediumSeverityFailedRulesCou
                    nt":0,"lowSeverityFailedRulesCount":0,"totalPassedRulesCount":24,"totalFailedRulesCount":0,"totalRulesCoun
                    t":24,"isBaselineApplied":true},"id":"/subscriptions/00000000-1111-2222-3333-444444444444/resourceGroups/m
                    igrationscripttests/providers/Microsoft.Sql/servers/vulnerabilityaseessmenttest/databases/db/vulnerabilityAssessments/D
                    efault/scans/f64d81a1-9d7b-4516-a623-a1bfc845ed7e","name":"f64d81a1-9d7b-4516-a623-a1bfc845ed7e","type":"M
                    icrosoft.Sql/servers/databases/vulnerabilityAssessments/scans"}

        .EXAMPLE
        Get-SqlVulnerabilityAssessmentScans -SubscriptionId 00000000-1111-2222-3333-444444444444-ResourceGroupName vulnerabilityaseessmenttestRg -ServerName vulnerabilityaseessmenttest -DatabaseName db
        Headers    : {[Cache-Control, System.String[]], [Pragma, System.String[]], [x-ms-request-id, System.String[]], [Server,
                    System.String[]]…}
        Version    : 1.1
        StatusCode : 200
        Method     : GET
        Content    : {"value":[{"properties":{"scanId":"f64d81a1-9d7b-4516-a623-a1bfc845ed7e","triggerType":"OnDemand","state":
                    "Passed","startTime":"2023-04-17T12:52:41.4142209Z","endTime":"2023-04-17T12:52:41.5235755Z","server":
                    "vulnerabilityaseessmenttest","database":"db","sqlVersion":"16.0.5100","highSeverityFailedRulesCount":0,"mediumSeverityFail
                    edRulesCount":0,"lowSeverityFailedRulesCount":0,"totalPassedRulesCount":24,"totalFailedRulesCount":0,"tota
                    lRulesCount":24,"isBaselineApplied":true},"id":"/subscriptions/00000000-1111-2222-3333-444444444444/resour
                    ceGroups/vulnerabilityaseessmenttestRg/providers/Microsoft.Sql/servers/vulnerabilityaseessmenttest/databases/db/vulnerabilityAss
                    essments/Default/scans/f64d81a1-9d7b-4516-a623-a1bfc845ed7e","name":"f64d81a1-9d7b-4516-a623-a1bfc845ed7e"
                    ,"type":"Microsoft.Sql/servers/databases/vulnerabilityAssessments/scans"}]}
    #>
    if ($DatabaseName -eq 'master') {
        $Uri = "/subscriptions/$SubscriptionId/resourceGroups/$ResourceGroupName/providers/Microsoft.Sql/servers/$ServerName/sqlVulnerabilityAssessments/default/scans/$ScanId" + "?api-version=2022-02-01-preview&systemDatabaseName=master"
    } else {
        $Uri = "/subscriptions/$SubscriptionId/resourceGroups/$ResourceGroupName/providers/Microsoft.Sql/servers/$ServerName/databases/$DatabaseName/sqlVulnerabilityAssessments/default/scans/$ScanId" + "?api-version=2022-02-01-preview"
    }
    return SendRestRequest -Method "Get" -Uri $Uri
}


###Sql Vulnerability Assessment Execute Scan###

# Invoke
function Invoke-SqlVulnerabilityAssessmentScan([parameter(mandatory)] [string] $SubscriptionId, [parameter(mandatory)] [string] $ResourceGroupName, [parameter(mandatory)] [string] $ServerName, [parameter(mandatory)] [string] $DatabaseName) {
    <#
        .SYNOPSIS
        Runs vulnerability assessment scan on the database.

        .DESCRIPTION
        Runs vulnerability assessment scan on the database.

        .PARAMETER SubscriptionId
        Subscription id.

        .PARAMETER ResourceGroupName
        Resource group name.

        .PARAMETER ServerName
        Server name.

        .PARAMETER DatabaseName
        Database name.

        .EXAMPLE
        Invoke-SqlVulnerabilityAssessmentScan -SubscriptionId 00000000-1111-2222-3333-444444444444-ResourceGroupName vulnerabilityaseessmenttestRg -ServerName vulnerabilityaseessmenttest -DatabaseName db
        Headers    : {[Cache-Control, System.String[]], [Pragma, System.String[]], [Location, System.String[]], [Retry-After, S
                    ystem.String[]]…}
        Version    : 1.1
        StatusCode : 202
        Method     : POST
        Content    : {"operation":"ExecuteDatabaseVulnerabilityAssessmentScan","startTime":"2023-05-15T10:58:48.367Z"}
    #>
    if ($DatabaseName -eq 'master') {
        $Uri = "/subscriptions/$SubscriptionId/resourceGroups/$ResourceGroupName/providers/Microsoft.Sql/servers/$ServerName/sqlVulnerabilityAssessments/default/initiateScan?api-version=2022-02-01-preview&systemDatabaseName=master"
    } else {
        $Uri = "/subscriptions/$SubscriptionId/resourceGroups/$ResourceGroupName/providers/Microsoft.Sql/servers/$ServerName/databases/$DatabaseName/sqlVulnerabilityAssessments/default/initiateScan?api-version=2022-02-01-preview"
    }
    SendRestRequest -Method "Post" -Uri $Uri
}


###Sql Vulnerability Assessments Settings###

# Get
function Get-SqlVulnerabilityAssessmentServerSetting([parameter(mandatory)] [string] $SubscriptionId, [parameter(mandatory)] [string] $ResourceGroupName, [parameter(mandatory)] [string] $ServerName) {
    <#
        .SYNOPSIS
        Gets vulnerability assessment settings of the server.

        .DESCRIPTION
        Gets vulnerability assessment settings of the server.

        .PARAMETER SubscriptionId
        Subscription id.

        .PARAMETER ResourceGroupName
        Resource group name.

        .PARAMETER ServerName
        Server name.

        .EXAMPLE
        Get-SqlVulnerabilityAssessmentServerSetting -SubscriptionId 00000000-1111-2222-3333-444444444444-ResourceGroupName vulnerabilityaseessmenttestRg -ServerName vulnerabilityaseessmenttest
        Headers    : {[Cache-Control, System.String[]], [Pragma, System.String[]], [x-ms-request-id, System.String[]], [Server,
                    System.String[]]…}
        Version    : 1.1
        StatusCode : 200
        Method     : GET
        Content    : {"properties":{"state":"Enabled"},"id":"/subscriptions/00000000-1111-2222-3333-444444444444/resourceGroups
                    /vulnerabilityaseessmenttestRg/providers/Microsoft.Sql/servers/vulnerabilityaseessmenttest/sqlVulnerabilityAssessments/Default","
                    name":"Default","type":"Microsoft.Sql/servers/sqlVulnerabilityAssessments"}
    #>
    $Uri = "/subscriptions/$SubscriptionId/resourceGroups/$ResourceGroupName/providers/Microsoft.Sql/servers/$ServerName/sqlVulnerabilityAssessments/default?api-version=2022-02-01-preview"
    return SendRestRequest -Method "Get" -Uri $Uri
}

# Set
function Set-SqlVulnerabilityAssessmentServerSetting([parameter(mandatory)] [string] $SubscriptionId, [parameter(mandatory)] [string] $ResourceGroupName, [parameter(mandatory)] [string] $ServerName, [parameter(mandatory)] [string] $State) {
    <#
        .SYNOPSIS
        Sets vulnerability assessment settings on the server.

        .DESCRIPTION
        Sets vulnerability assessment settings on the server.

        .PARAMETER SubscriptionId
        Subscription id.

        .PARAMETER ResourceGroupName
        Resource group name.

        .PARAMETER ServerName
        Server name.

        .PARAMETER State
        Setting's state.

        .EXAMPLE
        Set-SqlVulnerabilityAssessmentServerSetting -SubscriptionId 00000000-1111-2222-3333-444444444444-ResourceGroupName vulnerabilityaseessmenttestRg -ServerName vulnerabilityaseessmenttest -State 'Enabled'
        Headers    : {[Cache-Control, System.String[]], [Pragma, System.String[]], [x-ms-request-id, System.String[]], [Server,
                    System.String[]]…}
        Version    : 1.1
        StatusCode : 200
        Method     : PUT
        Content    : {"properties":{"state":"Enabled"},"id":"/subscriptions/00000000-1111-2222-3333-444444444444/resourceGroups
                    /vulnerabilityaseessmenttestRg/providers/Microsoft.Sql/servers/vulnerabilityaseessmenttest/sqlVulnerabilityAssessments/Default","
                    name":"Default","type":"Microsoft.Sql/servers/sqlVulnerabilityAssessments"}

        .EXAMPLE
        Set-SqlVulnerabilityAssessmentServerSetting -SubscriptionId 00000000-1111-2222-3333-444444444444-ResourceGroupName vulnerabilityaseessmenttestRg -ServerName vulnerabilityaseessmenttest -State 'Disabled'
        Headers    : {[Cache-Control, System.String[]], [Pragma, System.String[]], [x-ms-request-id, System.String[]], [Server,
                    System.String[]]…}
        Version    : 1.1
        StatusCode : 200
        Method     : PUT
        Content    : {"properties":{"state":"Disabled"},"id":"/subscriptions/00000000-1111-2222-3333-444444444444/resourceGroup
                    s/vulnerabilityaseessmenttestRg/providers/Microsoft.Sql/servers/vulnerabilityaseessmenttest/sqlVulnerabilityAssessments/Default",
                    "name":"Default","type":"Microsoft.Sql/servers/sqlVulnerabilityAssessments"}
    #>
    $Body = @{
        properties = @{
            state = $State
        }
    }
    $Body = $Body | ConvertTo-Json

    $Uri = "/subscriptions/$SubscriptionId/resourceGroups/$ResourceGroupName/providers/Microsoft.Sql/servers/$ServerName/sqlVulnerabilityAssessments/default?api-version=2022-02-01-preview"
    return SendRestRequest -Method "Put" -Uri $Uri -Body $Body
}

# Remove
function Remove-SqlVulnerabilityAssessmentServerSetting([parameter(mandatory)] [string] $SubscriptionId, [parameter(mandatory)] [string] $ResourceGroupName, [parameter(mandatory)] [string] $ServerName) {
    <#
        .SYNOPSIS
        Deletes vulnerability assessment settings on the server.

        .DESCRIPTION
        Deletes vulnerability assessment settings on the server.

        .PARAMETER SubscriptionId
        Subscription id.

        .PARAMETER ResourceGroupName
        Resource group name.

        .PARAMETER ServerName
        Server name.

        .EXAMPLE
        Headers    : {[Pragma, System.String[]], [x-ms-request-id, System.String[]], [x-ms-ratelimit-remaining-subscription-deletes, System.String[]], [x-ms-correlation-request-id, System.String[]]...}
        Version    : 1.1
        StatusCode : 200
        Method     : DELETE
        Content    :
    #>

    $Uri = "/subscriptions/$SubscriptionId/resourceGroups/$ResourceGroupName/providers/Microsoft.Sql/servers/$ServerName/sqlVulnerabilityAssessments/default?api-version=2022-02-01-preview"
    return SendRestRequest -Method "Delete" -Uri $Uri
}


function SendRestRequest(
    [Parameter(Mandatory = $True)]
    [string] $Method,
    [Parameter(Mandatory = $True)]
    [string] $Uri,
    [parameter( Mandatory = $false )]
    [string] $Body = "DEFAULT") {

    $Params = @{
        Method       = $Method
        Path         = $Uri
    }

    if (!($Body -eq "DEFAULT")) {
        $Params = @{
            Method       = $Method
            Path         = $Uri
            Payload      = $Body
        }
    }

    Invoke-AzRestMethod @Params
}

# Exported functions
Export-ModuleMember -Function Set-SqlVulnerabilityAssessmentBaseline
Export-ModuleMember -Function Get-SqlVulnerabilityAssessmentBaseline

Export-ModuleMember -Function Set-SqlVulnerabilityAssessmentBaselineRule
Export-ModuleMember -Function Get-SqlVulnerabilityAssessmentBaselineRule
Export-ModuleMember -Function Remove-SqlVulnerabilityAssessmentBaselineRule

Export-ModuleMember -Function Get-SqlVulnerabilityAssessmentScanResults

Export-ModuleMember -Function Get-SqlVulnerabilityAssessmentScans

Export-ModuleMember -Function Invoke-SqlVulnerabilityAssessmentScan

Export-ModuleMember -Function Get-SqlVulnerabilityAssessmentServerSetting
Export-ModuleMember -Function Set-SqlVulnerabilityAssessmentServerSetting
Export-ModuleMember -Function Remove-SqlVulnerabilityAssessmentServerSetting

다음 단계

빠른 구성 PowerShell 명령 참조.