💼 6.1.1 Ensure That a MySQL Database Instance Does Not Allow Anyone To Connect With Administrative Privileges - Level 1 (Manual)
- ID:
/frameworks/cis-gcp-v3.0.0/06/01/01
Description
It is recommended to set a password for the administrative user (root by default) to prevent
unauthorized access to the SQL database instances.
This recommendation is applicable only for MySQL Instances. PostgreSQL does not offer any setting for No Password from the cloud console.
Similar
- Sections
/frameworks/cis-gcp-v2.0.0/06/01/01/frameworks/cis-gcp-v4.0.0/06/01/01
- Internal
- ID:
dec-c-875b8866
- ID:
Similar Sections (Take Policies From)
| Section | Sub Sections | Internal Rules | Policies | Flags | Compliance |
|---|---|---|---|---|---|
| 💼 CIS GCP v2.0.0 → 💼 6.1.1 Ensure That a MySQL Database Instance Does Not Allow Anyone To Connect With Administrative Privileges - Level 1 (Manual) | 1 | no data | |||
| 💼 CIS GCP v4.0.0 → 💼 6.1.1 Ensure That a MySQL Instance Does Not Allow Anyone To Connect With Administrative Privileges - Level 1 (Manual) | 1 | no data |
Similar Sections (Give Policies To)
| Section | Sub Sections | Internal Rules | Policies | Flags | Compliance |
|---|---|---|---|---|---|
| 💼 CIS GCP v2.0.0 → 💼 6.1.1 Ensure That a MySQL Database Instance Does Not Allow Anyone To Connect With Administrative Privileges - Level 1 (Manual) | 1 | no data | |||
| 💼 CIS GCP v4.0.0 → 💼 6.1.1 Ensure That a MySQL Instance Does Not Allow Anyone To Connect With Administrative Privileges - Level 1 (Manual) | 1 | no data |
Sub Sections
| Section | Sub Sections | Internal Rules | Policies | Flags | Compliance |
|---|
Policies (1)
| Policy | Logic Count | Flags | Compliance |
|---|---|---|---|
| 🛡️ Google Cloud MySQL Instance allows anyone to connect with administrative privileges🟢⚪ | 🟢 x2, ⚪ x1 | no data |