π‘οΈ Azure App Service FTP deployments are not disabledπ’
- Contextual name: π‘οΈ FTP deployments are not disabledπ’
- ID:
/ce/ca/azure/app-service/disable-ftp-deployments - Tags:
- π’ Policy with categories
- π’ Policy with type
- π’ Production policy
- Policy Type:
COMPLIANCE_POLICY - Policy Categories:
SECURITY
Logicβ
- π§ prod.logic.yamlπ’
Similar Policiesβ
- Cloud Conformity: Disable Plain FTP Deployment
- Internal:
dec-x-c0a7793e
Similar Internal Rulesβ
| Rule | Policies | Flags |
|---|---|---|
| βοΈ dec-x-c0a7793e | 1 |
Descriptionβ
Descriptionβ
By default, App Services can be deployed over FTP. If FTP is required for an essential deployment workflow, FTPS should be required for FTP logins on all App Services.
If FTPS is not expressly required for the App, the recommended setting is
Disabled.Rationaleβ
FTP is an unencrypted network protocol that transmits data, including passwords, in clear text. The use of this protocol can lead to both data and credential compromise and can present opportunities for exfiltration, persistence, and lateral movement.
Impactβ
Any deployment workflows that rely on FTP or FTPS rather than the WebDeploy or HTTPS endpoints may be affected.
Auditβ
From Azure Portalβ
- Go to the Azure portal.
- Select
App Services.- Select an app.
- Select
Settingsand thenConfiguration.- Under
General Settings, inPlatform Settings, theFTP stateshould not be set toAll allowed.From Azure CLIβ
List web apps to obtain the IDs:
az webapp listList the publish profiles to obtain the username, password, and FTP server URL:
... see more
Remediationβ
Remediationβ
From Azure Portalβ
- Go to the Azure portal.
- Select
App Services.- Select an app.
- Select
Settingsand thenConfiguration.- Under
General Settings, inPlatform Settings, setFTP statetoDisabledorFTPS Only.From Azure CLIβ
For each out-of-compliance application, run the following, choosing either
disabledorFtpsOnlyas appropriate:az webapp config set \
--resource-group {{resource-group-name}} \
--name {{app-name}} \
--ftps-state [disabled|FtpsOnly]From PowerShellβ
For each out-of-compliance application, run the following:
Set-AzWebApp `
-ResourceGroupName {{resource-group-name}} `
-Name {{app-name}} `
-FtpsState {{Disabled or FtpsOnly}}