Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-255346 | ASQL-00-011900 | SV-255346r961470_rule | Medium |
Description |
---|
Use of nonsecure firewall settings, such as allowing public access, exposes the system to avoidable threats. |
STIG | Date |
---|---|
Microsoft Azure SQL Database Security Technical Implementation Guide | 2024-06-10 |
Check Text ( C-59019r871162_chk ) |
---|
Azure SQL Database must only use approved firewall settings, including denying public network access. This value is allowed by default in Azure SQL Database and should be disabled if not otherwise documented and approved. Obtain a list of approved firewall settings from the database documentation. Verify that the public network access option is set to disabled. If the value is enabled and not in use and specifically approved in the database documentation, this is a finding. 1. From the Azure Portal Dashboard, click "Set Server Firewall". 2. Review the Allow Azure services and resources to access this server option. |
Fix Text (F-58963r871163_fix) |
---|
Assign the approved policy to Azure SQL Database. 1. From the Azure Portal Dashboard, click on the database. 2. Click "Set Server Firewall". 3. Review the public network access option. 4. Check the box to "Disable" public network access. 5. Click "Save". For more information about connection policies: https://docs.microsoft.com/en-us/azure/azure-sql/database/connectivity-architecture |