Skip to main content

๐Ÿ’ผ 6.3 Ensure no SQL Databases allow ingress 0.0.0.0/0 (ANY IP) - Level 1 (Automated).

  • Contextual name: ๐Ÿ’ผ 6.3 Ensure no SQL Databases allow ingress 0.0.0.0/0 (ANY IP) - Level 1 (Automated).
  • ID: /frameworks/cis-azure-v1.4.0/06/03
  • Located in: ๐Ÿ’ผ 6 Networking

Descriptionโ€‹

Ensure that no SQL Databases allow ingress from 0.0.0.0/0 (ANY IP). Implementation note: CIS instructs to fail any SQL database that has a firewall rule that has โ€˜Start IPโ€™ of 0.0.0.0. This does not align with the rule title and description - to block any ingress traffic. Therefore, the assigned policy of this rule will fail for any SQL Server that has a firewall rule with โ€˜Start IPโ€™ 0.0.0.0 and โ€˜End IPโ€™ 255.255.255.255. This range covers any IP (0.0.0.0/0). In addition, the benchmark instructs to make sure 'Allow Azure services and resources to access this service' is disabled. This option has nothing to do with ANY IP. It simply checks if the Server allows traffic from Azure services (from any subscription). We decided to create a dedicated rule to check if this feature is enabled.

Similarโ€‹

  • Internal
    • ID: dec-c-b69e7300

Sub Sectionsโ€‹

SectionSub SectionsInternal RulesPoliciesFlags

Policies (1)โ€‹

PolicyLogic CountFlags
๐Ÿ“ Azure SQL Database allows ingress from 0.0.0.0/0 (ANY IP) ๐ŸŸข1๐ŸŸข x6

Internal Rulesโ€‹

RulePoliciesFlags
โœ‰๏ธ dec-x-0289e9c91