π Azure SQL Server Public Network Access is not disabled π’
- Contextual name: π Server Public Network Access is not disabled π’
- ID:
/ce/ca/azure/sql-database/disable-server-public-network-access
- Located in: π Azure SQL Database
Flagsβ
- π’ Policy with categories
- π’ Policy with type
- π’ Production policy
Our Metadataβ
- Policy Type:
COMPLIANCE_POLICY
- Policy Category:
SECURITY
Similar Policiesβ
- Internal
dec-x-4f30f24e
Similar Internal Rulesβ
Rule | Policies | Flags |
---|---|---|
βοΈ dec-x-4f30f24e | 1 |
Logicβ
- π§ prod.logic.yaml π’
Descriptionβ
Descriptionβ
Disabling public network access restricts the service from accessing public networks.
Rationaleβ
A secure network architecture requires carefully constructed network segmentation. Public Network Access tends to be overly permissive and introduces unintended vectors for threat activity.
Impactβ
Some architectural consideration may be necessary to ensure that required network connectivity is still made available. No additional cost or performance impact is required to deploy this recommendation.
Auditβ
From Azure Portalβ
- Go to
SQL servers
.- For each SQL server, under
Security
, clickNetworking
.- Ensure that
Public network access
is set toDisable
.Default Valueβ
By default, Azure SQL Server's Public network access is set to
Disable
.Referencesβ
Remediationβ
Remediationβ
From Azure Portalβ
- Go to
SQL servers
.- For each SQL server, under
Security
, clickNetworking
.- Set
Public network access
toDisable
.- Click
Save
.