Azure SQL Connection String

Detects Azure SQL Database connection string patterns specifically targeting the .database.windows.net domain. This pattern is based on a Microsoft Purview built-in sensitive information type. Users already running Purview may prefer to enable the built-in SIT directly, or use this version as a starting point for customisation.

Type
regex
Engine
universal
Confidence
high
Confidence justification
High confidence: .database.windows.net domain combined with credential parameters provides strong structural constraint unique to Azure SQL. Added context gating and exclusion rules improve precision and reduce incidental matches.
Detection quality
Verified
Jurisdictions
global
Regulations
Criminal Code Act 1995 (Cth)
Frameworks
CIS Controls, ISO 27001, NIST CSF, PCI-DSS, SOC 2
Data categories
credentials, security
Scope
specific
Risk rating
10
Platform compatibility
Purview: Compatible, GCP DLP: Compatible, Macie: Compatible, Zscaler: Compatible, Palo Alto: Degraded, Netskope: Unsupported

Pattern

(?i)(?:Server|Data Source)\s*=\s*[^;]*\.database\.windows\.net[^;]*;\s*(?:Database|Initial Catalog)\s*=\s*[^;]+;\s*(?:User Id|Uid)\s*=\s*[^;]+;\s*(?:Password|Pwd)\s*=\s*[^;]+

Corroborative evidence keywords

Azure SQL, SQL Database, database.windows.net, connection string, Server, Password, SQL Server, connectionString, api key, api_key, apikey, access key, access token, auth token, authorization, bearer, conn str, connectionstring, cookie, credential (+44 more)

Proximity: 300 characters

Should match

Should not match

Known false positives

References