Ensure that your Microsoft Azure network security groups (NSGs) allow inbound/ingress access on TCP port 5432 to trusted IP addresses only, in order to implement the principle of least privilege and greatly reduce the attack surface. TCP port 5432 is used by the PostgreSQL Database Server, an object-relational database management system (RDBMS) server developed by PostgreSQL Global Development Group.
This rule resolution is part of the Conformity Security & Compliance tool for Azure.
Allowing unrestricted access on TCP port 5432 (PostgreSQL Database) via Azure network security groups (NSGs) can increase opportunities for malicious activities such as brute force attacks, DDoS and SQL injection attacks.
Audit
To determine if your Microsoft Azure network security groups allow unrestricted access on TCP port 5432, perform the following actions:
Remediation / Resolution
To reconfigure your Azure NSG rules in order to allow access on TCP port 5432 to trusted entities such as administrator IP addresses or IP ranges, perform the following actions:
References
- Azure Official Documentation
- Azure network security overview
- Network security groups
- Create, change, or delete a network security group
- Azure best practices for network security
- Azure PowerShell Documentation
- az mysql server
- az network nsg list
- az network nsg rule list
- az network nsg rule update
Unlock the Remediation Steps
Free 30-day Trial
Automatically audit your configurations with Conformity
and gain access to our cloud security platform.
You are auditing:
Check for Unrestricted PostgreSQL Database Access
Risk Level: High