Ensure that your Microsoft Azure network security groups (NSGs) allow inbound/ingress access on TCP port 5432 to trusted IP addresses only, in order to implement the principle of least privilege and greatly reduce the attack surface. TCP port 5432 is used by the PostgreSQL Database Server, an object-relational database management system (RDBMS) server developed by PostgreSQL Global Development Group.
This rule resolution is part of the Conformity Security & Compliance tool for Azure.
Allowing unrestricted access on TCP port 5432 (PostgreSQL Database) via Azure network security groups (NSGs) can increase opportunities for malicious activities such as brute force attacks, DDoS and SQL injection attacks.
Audit
To determine if your Microsoft Azure network security groups allow unrestricted access on TCP port 5432, perform the following actions:
Remediation / Resolution
To reconfigure your Azure NSG rules in order to allow access on TCP port 5432 to trusted entities such as administrator IP addresses or IP ranges, perform the following actions:
References
- Azure Official Documentation
- Azure network security overview
- Network security groups
- Create, change, or delete a network security group
- Azure best practices for network security
- Azure PowerShell Documentation
- az mysql server
- az network nsg list
- az network nsg rule list
- az network nsg rule update