π Azure App Service FTP deployments are not disabled π’
- Contextual name: π FTP deployments are not disabled π’
- ID:
/ce/ca/azure/app-service/disable-ftp-deployments
- Located in: π Azure App Service
Flagsβ
- π’ Policy with categories
- π’ Policy with type
- π’ Production policy
Our Metadataβ
- Policy Type:
COMPLIANCE_POLICY
- Policy Category:
SECURITY
Similar Policiesβ
- Cloud Conformity
- Internal
dec-x-c0a7793e
Similar Internal Rulesβ
Rule | Policies | Flags |
---|---|---|
βοΈ dec-x-c0a7793e | 1 |
Logicβ
- π§ prod.logic.yaml π’
Descriptionβ
Descriptionβ
By default, App Services can be deployed over FTP. If FTP is required for an essential deployment workflow, FTPS should be required for FTP login for all App Services.
If FTPS is not expressly required for the App, the recommended setting is
Disabled
.Rationaleβ
FTP is an unencrypted network protocol that will transmit data - including passwords - in clear-text. The use of this protocol can lead to both data and credential compromise, and can present opportunities for exfiltration, persistence, and lateral movement.
Impactβ
Any deployment workflows that rely on FTP or FTPs rather than the WebDeploy or HTTPs endpoints may be affected.
Auditβ
From Azure Portalβ
- Go to the Azure Portal.
- Select
App Services
.- Click on an app.
- Select
Settings
and thenConfiguration
.- Under
General Settings
, for thePlatform Settings
, theFTP state
should not be set toAll allowed
.From Azure CLIβ
List webapps to obtain the ids:
az webapp list
List the publish profiles to obtain the username, password and ftp server url:
... see more
Remediationβ
Remediationβ
From Azure Portalβ
- Go to the Azure Portal.
- Select
App Services
.- Click on an app.
- Select
Settings
and thenConfiguration
.- Under
General Settings
, for thePlatform Settings
, theFTP state
should be set toDisabled
orFTPS Only
.From Azure CLIβ
For each out of compliance application, run the following choosing either
disabled
orFtpsOnly
as appropriate:az webapp config set --resource-group <resource group name> --name <app name> --ftps-state [disabled|FtpsOnly]
From PowerShellβ
For each out of compliance application, run the following:
Set-AzWebApp -ResourceGroupName <resource group name> -Name <app name> -FtpsState <Disabled or FtpsOnly>