π‘οΈ Azure PostgreSQL Single Server Infrastructure Double Encryption is not enabledπ’
- Contextual name: π‘οΈ Single Server Infrastructure Double Encryption is not enabledπ’
- ID:
/ce/ca/azure/postgresql-database/single-server-infrastructure-double-encryption - Tags:
- π’ Policy with categories
- π’ Policy with type
- π’ Production policy
- Policy Type:
BEST_PRACTICE - Policy Categories:
SECURITY
Logicβ
- π§ prod.logic.yamlπ’
Similar Policiesβ
- Cloud Conformity: Enable Infrastructure Double Encryption for Single Servers
- Internal:
dec-x-6ed26167
Similar Internal Rulesβ
| Rule | Policies | Flags |
|---|---|---|
| βοΈ dec-x-6ed26167 | 1 |
Descriptionβ
Descriptionβ
Azure Database for PostgreSQL servers should be created with infrastructure double encryption enabled.
NOTE: This recommendation currently only applies to Single Server, not Flexible Server. See additional information below for details about the planned retirement of Azure PostgreSQL Single Server.
Rationaleβ
If double encryption is enabled, another layer of encryption is implemented at the hardware level before the storage or network level. Information is encrypted before it is accessed, preventing both interception of data in motion if the network layer encryption is broken and exposure of data at rest in system resources such as memory or processor cache. Encryption also applies to any backups taken of the database, so the key secures access to the data in all forms. For the most secure implementation of key based encryption, use a customer-managed asymmetric RSA 2048 key in Azure Key Vault.
Impactβ
Read and write performance is impacted if both default encryption and Infrastructure Encryption are enabled, as a secondary form of encryption requires more resource overhead for cryptography. This cost is justified for information security. Customer-managed keys are recommended for the most secure implementation, which adds overhead for key management. The key must also be backed up in a secure location, as loss of the key means loss of the data in the database.
... see more
Remediationβ
Remediationβ
It is not possible to enable infrastructure double encryption on an existing Azure Database for PostgreSQL server. The remediation steps describe creating a new Azure Database for PostgreSQL server with infrastructure double encryption enabled.
From Azure Portalβ
- Go through the normal process of database creation.
- On step 2 titled
Additional settings, ensure thatInfrastructure double encryption enabledis checked.- Acknowledge that you understand this will impact database performance.
- Finish database creation as normal.
From Azure CLIβ
az postgres server create \
--resource-group {{resource-group-name}} \
--name {{server-name}} \
--location {{location}} \
--admin-user {{admin-username}} \
--admin-password {{server-admin-password}} \
--sku-name GP_Gen4_2 \
--version 11 \
--infrastructure-encryption Enabled