π‘οΈ Azure App Service FTP deployments are not disabledπ’
- Contextual name: π‘οΈ FTP deployments are not disabledπ’
- ID:
/ce/ca/azure/app-service/disable-ftp-deployments - Tags:
- π’ Policy with categories
- π’ Policy with type
- π’ Production policy
- Policy Type:
COMPLIANCE_POLICY - Policy Categories:
SECURITY
Logicβ
- π§ prod.logic.yamlπ’
Similar Policiesβ
- Cloud Conformity: Disable Plain FTP Deployment
- Internal:
dec-x-c0a7793e
Similar Internal Rulesβ
| Rule | Policies | Flags |
|---|---|---|
| βοΈ dec-x-c0a7793e | 1 |
Descriptionβ
Descriptionβ
By default, App Services can be deployed over FTP. If FTP is required for an essential deployment workflow, FTPS should be required for FTP login for all App Services.
If FTPS is not expressly required for the App, the recommended setting is
Disabled.Rationaleβ
FTP is an unencrypted network protocol that will transmit data - including passwords - in clear-text. The use of this protocol can lead to both data and credential compromise, and can present opportunities for exfiltration, persistence, and lateral movement.
Impactβ
Any deployment workflows that rely on FTP or FTPs rather than the WebDeploy or HTTPs endpoints may be affected.
Auditβ
From Azure Portalβ
- Go to the Azure Portal.
- Select
App Services.- Click on an app.
- Select
Settingsand thenConfiguration.- Under
General Settings, for thePlatform Settings, theFTP stateshould not be set toAll allowed.From Azure CLIβ
List webapps to obtain the ids:
az webapp listList the publish profiles to obtain the username, password and ftp server url:
... see more
Remediationβ
Remediationβ
From Azure Portalβ
- Go to the Azure Portal.
- Select
App Services.- Click on an app.
- Select
Settingsand thenConfiguration.- Under
General Settings, for thePlatform Settings, theFTP stateshould be set toDisabledorFTPS Only.From Azure CLIβ
For each out of compliance application, run the following choosing either
disabledorFtpsOnlyas appropriate:az webapp config set --resource-group <resource group name> --name <app name> --ftps-state [disabled|FtpsOnly]From PowerShellβ
For each out of compliance application, run the following:
Set-AzWebApp -ResourceGroupName <resource group name> -Name <app name> -FtpsState <Disabled or FtpsOnly>