Ensure Azure MariaDB servers dont have public network access
ID |
mariadb_public_access |
Severity |
high |
Vendor |
Azure |
Resource |
MariaDB Server |
Tags |
reachable |
Description
To enhance the security of your MariaDB servers, it is advisable to disable public network access by setting the 'public network access' option to 'False.'
This practice restricts server accessibility exclusively to your private network, guarding against unauthorized external connections. This precaution is particularly vital when your MariaDB servers house sensitive or confidential data, as it ensures that only trusted entities within your organization can access the database, reducing the risk of potential security breaches and safeguarding critical information effectively.
Examples
Terraform
resource "azurerm_mariadb_server"{
name = var.server_name
location = var.resource_group.location
resource_group_name = var.resource_group.name
sku_name = "B_Gen5_2"
storage_mb = 5120
version = "10.2"
auto_grow_enabled = true
backup_retention_days = 7
geo_redundant_backup_enabled = false
public_network_access_enabled = true (1)
ssl_enforcement_enabled = true
}
1 | Public access is enabled. (The default option is also true) |
Mitigation / Fix
Buildtime
Terraform
resource "azurerm_mariadb_server"{
name = var.server_name
location = var.resource_group.location
resource_group_name = var.resource_group.name
sku_name = "B_Gen5_2"
storage_mb = 5120
version = "10.2"
auto_grow_enabled = true
backup_retention_days = 7
geo_redundant_backup_enabled = false
public_network_access_enabled = false (1)
ssl_enforcement_enabled = true
}
1 | Ensure public access is explicitly disabled. |