UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

Azure SQL Database must only use approved firewall settings deemed by the organization to be secure, including denying public network access.


Overview

Finding ID Version Rule ID IA Controls Severity
V-255346 ASQL-00-011900 SV-255346r961470_rule Medium
Description
Use of nonsecure firewall settings, such as allowing public access, exposes the system to avoidable threats.
STIG Date
Microsoft Azure SQL Database Security Technical Implementation Guide 2024-06-10

Details

Check Text ( C-59019r871162_chk )
Azure SQL Database must only use approved firewall settings, including denying public network access. This value is allowed by default in Azure SQL Database and should be disabled if not otherwise documented and approved.

Obtain a list of approved firewall settings from the database documentation.

Verify that the public network access option is set to disabled.

If the value is enabled and not in use and specifically approved in the database documentation, this is a finding.

1. From the Azure Portal Dashboard, click "Set Server Firewall".
2. Review the Allow Azure services and resources to access this server option.
Fix Text (F-58963r871163_fix)
Assign the approved policy to Azure SQL Database.
1. From the Azure Portal Dashboard, click on the database.
2. Click "Set Server Firewall".
3. Review the public network access option.
4. Check the box to "Disable" public network access.
5. Click "Save".

For more information about connection policies:
https://docs.microsoft.com/en-us/azure/azure-sql/database/connectivity-architecture