Ensure that your Microsoft Azure network security groups (NSGs) restrict inbound/ingress access on TCP port 1521 to trusted entities only (i.e. IP addresses) in order to implement the principle of least privilege and vastly reduce the attack surface. TCP port 1521 is used by Oracle Database Server, which is an object-relational database management system (RDBMS) server developed by Oracle Corporation.
This rule resolution is part of the Conformity Security & Compliance tool for Azure.
Allowing unrestricted access on TCP port 1521 (Oracle Database Server) via Azure network security groups (NSGs) can increase opportunities for malicious activities such as denial-of-service (DoS) and SQL injections attacks, and ultimately lead to data leak and data loss.
Audit
To determine if your Microsoft Azure network security groups allow unrestricted access on TCP port 1521, perform the following actions:
Remediation / Resolution
To reconfigure your Azure NSG rules in order to allow access on TCP port 1521 to trusted IP addresses only, perform the following actions:
References
- Azure Official Documentation
- Azure network security overview
- Network security groups
- Create, change, or delete a network security group
- Azure best practices for network security
- Azure PowerShell Documentation
- az mysql server
- az network nsg list
- az network nsg rule list
- az network nsg rule update