Skip to main content

๐Ÿ›ก๏ธ Azure App Service Minimum TLS Version is not set to TLS 1.2 or higher๐ŸŸข

  • Contextual name: ๐Ÿ›ก๏ธ Minimum TLS Version is not set to TLS 1.2 or higher๐ŸŸข
  • ID: /ce/ca/azure/app-service/minimum-tls-version
  • Tags:
  • Policy Type: COMPLIANCE_POLICY
  • Policy Categories: SECURITY

Logicโ€‹

Similar Policiesโ€‹

Similar Internal Rulesโ€‹

RulePoliciesFlags
โœ‰๏ธ dec-x-2ace19521

Descriptionโ€‹

Open File

Descriptionโ€‹

The TLS (Transport Layer Security) protocol secures transmission of data over the internet using standard encryption technology. Encryption should be set with the latest version of TLS. App service allows TLS 1.2 by default, which is the recommended TLS level by industry standards such as PCI DSS.

Rationaleโ€‹

App service currently allows the web app to set TLS versions 1.0, 1.1 and 1.2. It is highly recommended to use the latest TLS 1.2 version for web app secure connections.

Auditโ€‹

From Azure Portalโ€‹
  1. Login to Azure Portal using https://portal.azure.com.
  2. Go to App Services.
  3. Click on each App.
  4. Under Setting section, Click on TLS/SSL settings.
  5. Under the Bindings pane, ensure that Minimum TLS Version set to 1.2 under Protocol Settings.
From Azure CLIโ€‹

To check TLS Version for an existing app, run the following command:

az webapp config show --resource-group <RESOURCE_GROUP_NAME> --name <APP_NAME> --query minTlsVersion

The output should return 1.2 if TLS Version is set to 1.2 (Which is currently the latest version).

... see more

Remediationโ€‹

Open File

Remediationโ€‹

From Azure Portalโ€‹

  1. Login to Azure Portal using https://portal.azure.com.
  2. Go to App Services.
  3. Click on each App.
  4. Under Setting section, Click on SSL settings.
  5. Under the Bindings pane, set Minimum TLS Version to 1.2 under Protocol Settings section.

From Azure CLIโ€‹

To set TLS Version for an existing app, run the following command:

az webapp config set --resource-group <RESOURCE_GROUP_NAME> --name <APP_NAME> --min-tls-version 1.2

From PowerShellโ€‹

Set-AzWebApp -ResourceGroupName <RESOURCE_GROUP_NAME> -Name <APP_NAME> -MinTlsVersion 1.2

policy.yamlโ€‹

Open File

Linked Framework Sectionsโ€‹

SectionSub SectionsInternal RulesPoliciesFlagsCompliance
๐Ÿ’ผ APRA CPG 234 โ†’ ๐Ÿ’ผ 54 Cryptographic techniques can be used to control access to sensitive data, both in storage and in transit. The strength of the cryptographic techniques deployed would be commensurate with the sensitivity and criticality of the data as well as other supplementary or compensating controls (refer to Attachment E for further guidance).2122no data
๐Ÿ’ผ CIS Azure v2.1.0 โ†’ ๐Ÿ’ผ 9.3 Ensure Web App is using the latest version of TLS encryption - Level 1 (Automated)1no data
๐Ÿ’ผ CIS Azure v3.0.0 โ†’ ๐Ÿ’ผ 9.4 Ensure Web App is using the latest version of TLS encryption (Automated)1no data
๐Ÿ’ผ Cloudaware Framework โ†’ ๐Ÿ’ผ Data Encryption44no data
๐Ÿ’ผ FedRAMP High Security Controls โ†’ ๐Ÿ’ผ AC-4(4) Flow Control of Encrypted Information (H)2526no data
๐Ÿ’ผ FedRAMP High Security Controls โ†’ ๐Ÿ’ผ AC-17(2) Protection of Confidentiality and Integrity Using Encryption (M)(H)17no data
๐Ÿ’ผ FedRAMP Moderate Security Controls โ†’ ๐Ÿ’ผ AC-17(2) Protection of Confidentiality and Integrity Using Encryption (M)(H)17no data
๐Ÿ’ผ NIST SP 800-53 Revision 5 โ†’ ๐Ÿ’ผ AC-4(2) Information Flow Enforcement _ Processing Domains3032no data
๐Ÿ’ผ NIST SP 800-53 Revision 5 โ†’ ๐Ÿ’ผ AC-17(2) Remote Access _ Protection of Confidentiality and Integrity Using Encryption1217no data